Alternatives to nChronos

Compare nChronos alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to nChronos in 2026. Compare features, ratings, user reviews, pricing, and more from nChronos competitors and alternatives in order to make an informed decision for your business.

  • 1
    Obkio

    Obkio

    Obkio

    Network Performance Monitoring Made Easy. Obkio is a simple Network Monitoring and Troubleshooting SaaS solution that allows users to continuously monitor the health of their network and core business applications to improve the end-user experience. The innovative software application identifies the causes of intermittent network, VoIP, video, and applications slowdown in seconds and collect information to quickly troubleshoot problems before they affect your end-users. Deploy network monitoring Agents at strategic locations in a company's offices or network destinations such as data sites, remote sites, external client sites, or public or private clouds to continuously monitor performance using synthetic traffic exchanged every 500ms. Obkio's Agents give you a 360-degree overview of your network by measuring the network metrics like matter most (jitter, latency, packet loss, VoIP quality), and alerting you of any performance degradation.
    Starting Price: $399 per month
  • 2
    SolarWinds Network Bandwidth Analyzer Pack
    Comprehensive network bandwidth analysis and performance monitoring. Detect, diagnose, and resolve network performance issues. Track response time, availability, and uptime of routers, switches, and other SNMP-enabled devices. Monitor and analyze network bandwidth performance and traffic patterns. Find bandwidth hogs on a network and see which applications are using the most bandwidth. View visual hop-by-hop analysis for devices along the delivery path with NetPath. Enterprise Command Center. Reduce network outages and quickly detect, diagnose, and resolve multi-vendor network performance issues with affordable, easy-to-use network monitoring software.
  • 3
    Chrono Platform

    Chrono Platform

    Chrono Platform

    Chrono Platform is an engineering-intelligence and automated time-tracking solution that integrates with the tools your team already uses, like Jira, Slack, Azure DevOps, Asana, Google Calendar, Teams, and others, to passively capture, categorize, and analyze work without requiring manual timesheet entries. Once connected, Chrono automatically ingests data such as commits, ticket activity, calendar events, and communication logs, then applies AI-powered categorization to convert that activity into normalized time entries tied to the correct project, task, or activity. On top of raw time tracking, Chrono surfaces high-level insights for engineering leaders: it offers real-time project tracking, resource allocation and budget monitoring, risk and delay detection, and ROI-driven visibility into how engineering time translates into business value.
    Starting Price: $2,000 per claim
  • 4
    ChronoScan

    ChronoScan

    Digital File

    Virtually improve every data capture need you have with the multitude of features that comprise ChronoScan. Built on a server-client infrastructure ChronoScan Enterprise can be used to process a very wide range of different documents and partially or fully automate your workflow. The windows service architecture gives the flexibility and the power to the system administrator. The thin client interface can be accessed from any web browser and from anywhere, anytime. It gives the user all the power of ChronoScan without the need for extra software installation. Select the desired notifications and email lists for each Job and keep everyone notified. ChronoScan Enterprise includes a scanner plugin that will allow any client machine to scan directly into the program using a local scanner. Helps you with data Entry with OCR & Assisted auto fields. Extract text from PDF Files and convert to indexed data. Upload documents to the Cloud.
    Starting Price: €245 one-time payment
  • 5
    ChronoSync

    ChronoSync

    Econ Technologies

    ChronoSync is a complete, all-in-one solution for file syncs, backups, bootable backups, and cloud storage for your Mac. In use by thousands of photographers, video editors, filmmakers, musicians, and other data professionals. It’s simply the best way to backup and syncs your Mac. No other app can compare! Whatever your backup and sync scenario, ChronoSync has got you covered! Synchronization makes two sets of files identical to each other. A classic example is having a desktop computer in the office and a laptop for your travels. You would sync your documents before leaving and again when you return. ChronoSync excels at this task!​ A backup creates redundant copies of your files to protect against data loss. Backups to external hard drives and archiving old data are a must. For added redundancy, backup to remote devices and even the cloud. ChronoSync can handle all this and more!​
    Starting Price: $49.99 one-time payment
  • 6
    Quasima Chrono Tracker

    Quasima Chrono Tracker

    Quasima Software

    Chrono Tracker is a time tracking application for Windows desktop. It allows you to keep track of multiple projects and categorize how much time you spent working on each of them. Chrono Tracker allows you to organize your projects into a hierarchical structure that resembles layout of folders on a disk. You can add, delete, and sort projects so that they best represent your business activity. Every single piece of time you spent working on a project (called here a task) is registered and saved in relation to that project. Usually tasks are registered while you are working, but you can also add them later. Chrono Tracker does not limit how many projects or tasks you can create. The application is designed to handle smoothly hundreds of projects and thousands of tasks.
  • 7
    DrChrono

    DrChrono

    DrChrono

    Increase the efficiency of your medical practice with an all-in-one practice management, electronic health records, and medical billing platform from DrChrono. With its modern and simple interface and dozens of advanced features, DrChrono empowers medical practitioners to better serve their patients. Users can easily schedule patient appointments, check and edit patient charts, and manage billing with ease.
  • 8
    Chronos

    Chronos

    Chronos

    Chronos Time Tracking is a project-management and time-tracking app that helps freelancers and small business owners effortlessly track time, expenses, payments, and client billing against projects. It offers a “smart timer” or manual time entries, with smart notifications to avoid leaving the timer running accidentally, and lets you view total time logged, expenses incurred, and client payments owed at a glance. Chronos retains a full history of every project, including time entries, expenses, payments, and notes, and makes it easy to browse, edit, or review past projects. Its “Smart Estimates” feature analyzes how long previous jobs took and helps quote new jobs more accurately, reducing underquoting and helping increase revenue. Chronos also provides profit-and-loss reporting (overall or by project type) and accounts receivable reports so you can track which clients still owe you money.
    Starting Price: $9 per month
  • 9
    TX Chrono

    TX Chrono

    TeamExpand

    TX CHRONO is the first-time tracking tool that is both perfect for managers and easy for employees. Should you require an extension to the standard TX Chrono capabilities, TeamExpand will deliver the additional functionality to fully meet your business. Whenever you face a technical challenge when installing, configuring, or operating TX Chrono, the TeamExpand team of technical professionals will investigate your situation and provide you with a competent solution. It allows to track time on Work Items directly from TFS or VSTS fields, keep records for non-coding tasks, submit, approve and analyze timesheet submissions, create reports, and use custom notifications. Keep TFS/VSTS data accurate, up-to-date and 100% consistent with time sheets. Run time reports by Users, Projects over a custom date range. Available as a web-based tool. Integrated with TFS & VSTS. Projects and WIs are populated from TFS. Most user-friendly grid for weekly time input.
    Starting Price: $3 per month
  • 10
    LiveWire

    LiveWire

    BlueCat

    LiveWire is a high-performance network packet-capture and forensic-analysis platform that captures and stores detailed packet data across physical, virtual, on-premises, and cloud networks. It is designed to give Network-Ops and Security teams deep visibility into network traffic, from data centers to SD-WAN edges, remote sites, and cloud environments, filling in the blind spots left by telemetry-only monitoring. LiveWire delivers real-time packet capture that can be selectively stored and analyzed with advanced workflows, visualizations, and correlation tools; it can automatically detect encrypted traffic and store only what’s needed (headers or metadata), saving disk space while preserving forensics data. It supports “intelligent packet capture,” converting packet-level data into enriched flow-based metadata (called LiveFlow), which can feed into the companion monitoring platform BlueCat LiveNX.
  • 11
    ZetesChronos

    ZetesChronos

    Zetes FasTrace

    Every day millions of deliveries are efficiently made using ZetesChronos. ZetesChronos is an electronic proof of delivery software which helps control and improve your collection, delivery and related management processes. It connects your drivers, back-office workers and logistics management and gives you real-time visibility on goods, vehicles and returnable assets so you can ensure the perfect delivery, every time and offer your customers visibility on the status of their shipments. Using the mobile proof of delivery application, your drivers are guided precisely throughout the process registering all events during loading, delivery and collection. Information is relayed in real-time with the host system and back-office. Track & trace and reporting modules provide insights for both customers and management. From managing customer expectations and reducing operational costs, through to meeting greater regulatory compliance, the proof of delivery software has many benefits.
  • 12
    ChronoTrack Race Registration
    Meet the demand for increased services in the industry and eliminate the costly struggle of combining various software solutions by selecting ChronoTrack as your one-stop-shop. From Registration to Celebration, we’ve got you covered! As the gatekeeper of all things Race Day, ChronoTrack is the only Timing Company in the world that can deliver a non-replicable, flourishing event and membership experience for Athletes, Timers, Race Directors and Spectators. We take the guesswork out of Registration, Scoring and Results and focus on the integration of all your race day needs, all within one platform. As a Timer we offer you Industry-leading hardware trusted by some of the most high profile events across the globe. Our Event Dashboard takes event management to a whole new level of accuracy for the most complex to the most basic event needs. From Registration to Celebration, we provide a seamless turnkey solution for you at every step of your race journey.
  • 13
    ChronoForms

    ChronoForms

    ChronoEngine

    The Easiest forms builder to Create any kind of form for your Joomla or WordPress website, and it's FREE. Chronoforms was first released in 2006, currently we have the 6th version and the most amazing one. Build Mobile ready forms with ChronoForms. Easily design your form using the drag and drop form builder and preview how your form looks like before saving the changes. Build multi page forms easily using the advanced ChronoForms form builder. All form fields types are available, text, textarea, password, radios, checkboxes and dropdowns, with many advanced features like AutoCompletion and auto resizing. Read, Add, Update or delete data from one or more database tables, and connect to external database. Send any number of emails, encrypt the emails data if necessary (encryption requires server software), advanced email layout support, customize the email recipients, subject, from data and set CC and BCC addresses.
    Starting Price: $24.99 one-time payment
  • 14
    Nagios Network Analzyer

    Nagios Network Analzyer

    Nagios Enterprises

    Network Analyzer provides an in-depth look at all network traffic sources and potential security threats allowing system admins to quickly gather high-level information regarding the health of the network as well as highly granular data for complete and thorough network analysis. Network Analyzer provides a central view of your network traffic and bandwidth data as well as potential network compromises. The powerful home dashboard provides an at-a-glance view of critical netflow or sflow data sources, server system metrics, and abnormal network behavior for quick assessment of network health. Users can easily drill down to see specific information on individual IPs, source port, destination port, or any combination thereof. Network Analyzer’s advanced alerting and reporting capabilities provide IT staff with superior awareness of their network. Highly granular, down-to-the-packet data can be accessed and archived for further tracking and analysis.
    Starting Price: $1995.00
  • 15
    ntopng
    ntopng is the next generation version of the original ntop, a network traffic probe that monitors network usage. ntopng is based on libpcap/PF_RING and it has been written in a portable way in order to virtually run on every Unix platform, MacOS and on Windows as well. Produce long-term reports for several network metrics including throughput and L7 application protocols. Monitor and report live throughput, network and application latencies, Round Trip Time (RTT), TCP statistics (retransmissions, out-of-order packets, packet lost), and bytes and packets transmitted. Discover Layer-7 application protocols (Facebook, YouTube, BitTorrent, etc) by leveraging on nDPI, ntop Deep Packet Inspection (DPI) technology. Behavioral traffic analyses such as lateral movements and periodic traffic detection.
  • 16
    Telesoft CERNE
    With the rise in the global datasphere only set to accelerate with the advances in IoT and 5G technology, the cyber threat landscape will also continue to grow. Our intrusion detection system, the CERNE, helps protect, secure and guard our customers from attack. The CERNE provides real-time monitoring and historical intrusion detection capabilities helping security analysts detect intrusions, identify suspicious activity and monitor network security by storing IDS alert traffic while reducing unnecessary storage. The Telesoft CERNE combines a high rate 100Gbps IDS engine with an automated record of relevant network traffic for real-time and historical threat investigation and digital forensics. CERNE continuously scans and captures network packets and only stores traffic associated with an IDS alert, discarding all other traffic, giving an analyst rapid access to critical packets up to 2.4 seconds before an event.
  • 17
    ChronoBeans

    ChronoBeans

    17NorthSolutions

    Use multiple timers while you work or manual time entries later. All-time entries include a field to record project notes. And - your notes get organized in a separate log with your invoice - very professional! Great for recording billable hours on non-computer activities and for time not captured using a timer! If you need to edit a time entry or add an expense after previewing - no problem. ChronoBeans is easy to use. Confirm date range, time entries and expense items - then press Build. Tracks time your way - using timers while you work or entering time after you work. Generate work reports organized by client, project, and date. Keep all client and financial data local on your computer with push-button backup.
    Starting Price: $5 per month
  • 18
    Azure Network Watcher
    Monitor and diagnose networking issues without logging in to your virtual machines (VMs) using Network Watcher. Trigger packet capture by setting alerts, and gain access to real-time performance information at the packet level. When you see an issue, you can investigate in detail for better diagnoses. Build a deeper understanding of your network traffic pattern using network security group flow logs and virtual network flow logs. Information provided by flow logs helps you gather data for compliance, auditing and monitoring your network security profile. Network Watcher provides you the ability to diagnose your most common VPN gateway and connections issues. Allowing you, not only, to identify the issue but also to use the detailed logs created to help further investigate.
    Starting Price: $0.50 per GB
  • 19
    Core Network Insight

    Core Network Insight

    Core Security (Fortra)

    Instead of monitoring specific assets or the network itself, these security solutions constantly watch network traffic, creating a picture of what normal traffic patterns look like. With a baseline developed, NTA tools can then flag traffic abnormalities as possible security threats. Though there are multiple approaches to this, NTA tools should have some degree of analysis of anomalies to determine whether it’s a harmless abnormality, or a true threat. With network traffic monitoring, Network Insight observes device behavior in real time. It is continually capturing and correlating evidence using multiple detection engines to arrive at a verdict of "suspected" or "infected." The Case Analyzer, a context aware network traffic analysis and threat intelligence engine, confirms the infection, and a series of risk profilers assess and prioritize the infection based on the determined risk level.
  • 20
    Junos Traffic Vision

    Junos Traffic Vision

    Juniper Networks

    Junos Traffic Vision is a licensed traffic sampling application for MX Series 3D Universal Edge Routers. It provides details on network traffic flows that is useful for a wide variety of operations and planning activities. Junos Traffic Vision monitors packets as they are processed by the router, and captures details such as source and destination addresses, packet and byte count information. These details are aggregated and exported in a standards-based format for analysis and presentation by Juniper and third-party-based tools that support usage-based accounting, traffic profiling, traffic engineering, attack and intrusion detection, and SLA monitoring. Implemented inline and on service cards that provide high performance and scale, Junos Traffic Vision can be deployed in both active and passive configurations and can take place alongside lawful intercept filtering and port mirroring without impacting performance.
  • 21
    Jolata

    Jolata

    Jolata

    Jolata can monitor every packet at microsecond granularity and correlate at millisecond intervals. Jolata can process every packet and visualize the results within seconds on its beautiful, easy-to-use UI. Jolata can analyze every packet and flow, at any location across a nationwide network. Customers lack precise visibility into their network, making it difficult to pinpoint the exact source of performance degradation. Jolata provides segment-by-segment metrics, in real-time with actual network traffic. Customers need to evaluate vendor equipment to ensure equipment will meet performance claims. Jolata provides ability to compare equipments with actual traffic loads. Customers need to future-proof their network due to traffic mix change. Jolata enables operators to confirm whether current infrastucture will meet future expectations.
  • 22
    PaleoScan
    PaleoScan is a seismic interpretation software based on a semi-automated approach that produces chrono-stratigraphically consistent geological models. This unique technology, patented in 2009, allows our clients to accelerate their seismic interpretation cycle, scan the subsurface in real time to focus on high-potential areas, and identify hydrocarbon accumulation or CO2 storage areas. Another significant advantage of PaleoScan is its ability to produce a 3D geological model of the entire seismic cube, which allows the visualization and interpretation of the geological reservoirs as well as the overlying layers up to the seabed, in order to establish a reliable ranking of the storage reservoirs, taking into consideration the risks inherent to gas injection. At the confluence of powerful algorithms, computational power, and data analysis, our revolutionary technology pushes your seismic interpretation to an unprecedented level.
  • 23
    Trisul Network Analytics

    Trisul Network Analytics

    Trisul Network Analytics

    In today's bandwidth unconstrained, encrypted, cloud-centric networks you can no longer separate traffic analytics from security and investigation activities. Trisul helps organizations of all sizes deploy full-spectrum deep network monitoring which can serve as a single goto source of truth for performance monitoring, network design, security analytics, threat detection, and compliance. Traditional approaches based on SNMP, Netflow, Agents, or Packet Capture have a narrow focus and rigid vendor-supplied analytics. Trisul is the only platform that provides a rich and open platform you can innovate upon. Includes a tightly integrated backend datastore and a web UI. Yet, open enough to plug into a different backend or to drive Kibana, Grafana UIs. Our design goal is to pack as much performance as we can in a single node. For larger networks scale out by adding more probes and hubs.
    Starting Price: $950 one-time payment
  • 24
    StreamGroomer

    StreamGroomer

    Streamcore

    StreamGroomers monitor and regulate the traffic across Wide Area Networks (WAN). StreamGroomers integrate transparently, regardless of network architecture, between the LAN and WAN access router and are administered via an out-of-band management network. Continuous service is ensured using high-availability architectures. StreamGroomers analyze network traffic at wire speed, collecting comprehensive measurements and packet data at distributed points in your network. Indicators are calculated from this data in real-time to show current network performance. This data is aggregated and sent to a central repository with minimal network overhead, enabling fast drill down analysis and troubleshooting as well as providing detailed records for forensics. The StreamGroomer’s Deep Packet Inspection analyzes Layer 2-7 packet data to identify applications and user sessions against a predefined catalog of 400+ services.
  • 25
    Airtool 2

    Airtool 2

    Intuitibits

    Capture Wi-Fi traffic using your Mac’s adapter or Zigbee and BLE traffic using compatible USB dongles and automatically launch Wireshark for post-processing and analysis. Offers several flexible configuration options to accommodate the capture requirements of any packet analysis and troubleshooting task. Integrates with popular cloud services such as CloudShark and Packets to automatically upload, analyze, or share your captures. Capturing Wi-Fi traffic is an essential task of protocol analysis. Whether you’re trying to resolve Wi-Fi connectivity, roaming or configuration problems, analyzing your Wi-Fi network’s performance, you will certainly need to perform packet captures. Airtool lets you capture Wi-Fi packets in the easiest way possible. With advanced features such as automatic packet slicing and capture file limits and rotation, Airtool is a must-have tool for every wireless LAN professional.
    Starting Price: $36.61 one-time payment
  • 26
    ARIA SDS Packet Intelligence

    ARIA SDS Packet Intelligence

    ARIA Cybersecurity Solutions

    The ARIA Packet Intelligence (PI) application gives OEMs, service providers, and security professionals a better way to use SmartNIC technology to support two important use cases: advanced packet-level network analytics and cyber-threat detection, response, and containment. Network analytics: ARIA PI provides complete visibility into all network traffic and feeds valuable analytics data to packet delivery accounting tools, quality of service systems, and SLA monitoring applications. All of this helps companies provide better service and maximize revenues tied to usage-based billing. Cyber-threat detection, response, and containment: ARIA PI also feeds metadata to threat detection tools for complete visibility into all network traffic, including east-west data flows. This improves the effectiveness of existing security solutions, such as SIEMs and IDS/IPS tools, and gives security teams a better way to detect, respond, contain, and remediate even the most advanced cyber threats.
  • 27
    CommView

    CommView

    TamoSoft

    CommView is a powerful network monitor and analyzer designed for LAN administrators, security professionals, network programmers, home users…virtually anyone who wants a full picture of the traffic flowing through a PC or LAN segment. Loaded with many user-friendly features, CommView combines performance and flexibility with an ease of use unmatched in the industry. This application captures every packet on the wire to display important information such as a list of packets and network connections, vital statistics, protocol distribution charts, and so on. You can examine, save, filter, import and export captured packets, view protocol decodes down to the lowest layer with full analysis of over 100 supported protocols. With this information, CommView can help you pinpoint network problems and troubleshoot software and hardware. The newest CommView version 7.0 introduced SSL/TLS traffic decryption on the fly.
  • 28
    Noction IRP
    Noction IRP is an edge-deployed BGP optimization platform that analyzes traffic in real-time to detect congestion, link failures, and performance degradation. The system continuously probes network routes across all available providers, measuring latency, packet loss, and historical reliability to identify the best paths for both inbound and outbound traffic. IRP manages ingress and egress bandwidth intelligently, distributing traffic flows across providers to minimize costs while maintaining quality of service. The platform automatically reroutes traffic when the thresholds are reached, ensuring optimal delivery for all traffic types. Built-in Automatic Anomaly Detection (AAD) provides DDoS protection by analyzing traffic behavior and identifying deviations from established baselines. AAD detects volumetric floods, amplification attacks, TCP SYN floods, and application-layer threats, then executes mitigation automatically using BGP FlowSpec and RTBH mechanisms.
  • 29
    NETSCOUT vSTREAM
    Visibility for performance management, user experience, and cybersecurity in virtualized environments. NETSCOUT's vSTREAM virtual appliance complements existing Adaptive Session Intelligence (ASI)-based instrumentation to provide the same smart data visibility within virtualized and cloud infrastructures that are already possible in physical environments. The vSTREAM is ideal for monitoring service-critical traffic running within virtualized and/or cloud infrastructures. With deep packet inspection at scale, organizations have the end-through-end visibility needed to assure network and application performance and high-quality user experiences in virtual environments. Leverage end-through-end visibility across data centers, multi-cloud, and remote offices to assure high-quality user experiences anywhere. Scalable and simplified packet-data visibility and analysis is easy to deploy, manage, and fit into your organization’s budget.
  • 30
    Capsa

    Capsa

    Colasoft

    Capsa, a portable network performance analysis and diagnostics tool, provides tremendously powerful and comprehensive packet capture and analysis solution with an easy to use interface allowing both veteran and novice users the ability to protect and monitor networks in a critical business environment. Capsa aids in keeping you assessed of threats that may cause significant business outage. Capsa is a portable network analyzer application for both LANs and WLANs which performs real-time packet capturing capability, 24x7 network monitoring, advanced protocol analysis, in-depth packet decoding, and automatic expert diagnosis. Capsa's comprehensive high-level window view of entire network, gives quick insight to network administrators or network engineers allowing them to rapidly pinpoint and resolve application problems. With the most user-friendly interface and the most powerful data packet capture and analysis engine in the industry, Capsa is a necessary tool for network monitoring.
  • 31
    SolarWinds NetFlow Traffic Analyzer
    NetFlow analyzer and bandwidth monitoring software. NetFlow analysis and bandwidth monitoring shouldn’t be hard. Add NetFlow Traffic Analyzer to Network Performance Monitor to boost your NetFlow monitoring capabilities. Monitor your network, discover traffic patterns, and avoid bandwidth hogs with NetFlow Traffic Analyzer (NTA) and User Device Tracker NetFlow solutions. Faster troubleshooting, increased efficiency, and greater visibility into malicious or malformed traffic flows with NetFlow analyzer insights. Work seamlessly with Orion Platform products, including Network Performance Monitor and Network Configuration Manager. Combine NTA with Network Configuration Manager (NCM) to show traffic conversations by policy in the context of the NCM Policy Details page. View both IPv4 and IPv6 flow records. Monitor Cisco NetFlow, Juniper J-Flow, sFlow, Huawei NetStream, and IPFIX flow data identifying the applications and protocols consuming the most bandwidth.
  • 32
    GateSpeed

    GateSpeed

    GateSpeed

    Dramatic increases in demand for bi-directional content, robust data, and efficient processing, have significantly hampered network throughput performance, worsening traffic at critical choke points across data networks. GateSpeed’s unique network optimization platform drives data throughput and hardware efficiency improvements at these choke points, with performance benefits and cost savings that hit the bottom line. Whether deployed at the network edge, on network links and load balancers, or directly at the data center, GateSpeed technology offers single-point or end-to-end optimization for integration into your long-term network infrastructure and development strategy. With our innovative packet-forwarding engine, and customized Data Plane Development Kit (DPDK), GateSpeed achieves 5X and greater packet throughput over standard Linux deployments, and substantially greater throughput than standard DPDK solutions on the market today.
  • 33
    Elastiflow

    Elastiflow

    Elastiflow

    The most complete network observability solution for use with modern data platforms, providing unprecedented insights at any scale. ElastiFlow allows organizations to achieve unprecedented levels of network performance, availability, and security. ElastiFlow provides granular information about network traffic flows, including source and destination IP addresses, ports, protocols, and the amount of data transmitted. This information allows network administrators to gain deep insights into the network's performance and identify potential issues. ElastiFlow is highly valuable for diagnosing and troubleshooting network issues such as congestion, high latency, or packet loss. By analyzing the network traffic, administrators can pinpoint the cause of the problem and take appropriate action to resolve it. By leveraging ElastiFlow, organizations can improve their security posture, detect and respond to threats more effectively, and maintain compliance with regulatory requirements.
    Starting Price: Free
  • 34
    LanTopoLog 2

    LanTopoLog 2

    Yuriy Volokitin

    - Automatic physical network topology discovery based on SNMP - Provide detailed and searchable physical network topology map - LanTopoLog Switch Port Mapper tool maps the physical port connections of a switch to MAC and IP addresses of the attached devices - Shows VLAN assignment, port status, port's current speed, LACP/LAG ports - Detecting new devices in the network and notifying of this event - Display the Spanning Tree Status and STP events - Icon context menu for custom command - Monitoring device's state (active/inactive) in real-time using ICMP - Generating alarms when there are failures in the network - E-mail alerts notifying - Web browser-based access from anywhere in the network - LanTopoLog uses WMI queries to collect computer inventory information - Resolve ip to name, export computer list to csv file - Monitoring invalid and dropped packets (ifInErrors, ifInDiscards) - Notify the administrator when traffic thresholds are exceeded - Easy-to-use interface
    Starting Price: $50.00/one-time
  • 35
    ZoneRanger
    ZoneRanger enables network operations teams to fully extend their management applications to networks that are traditionally hampered by security restrictions. Now, 100% of management traffic of any protocol type can be captured safely, offering network operations complete visibility to the networks they manage. Deep packet inspection (DPI) offers enhanced security, secure remote airgap network monitoring, and narrower attack surface through minimized open firewall ports in your network, reducing the need for rule change management and the likelihood of human error. Confidently deploy management applications into traditional DMZ, hybrid-trust, and zero trust networks, providing transparency to management applications and end-devices, statistical analysis of UDP traffic, and accelerated network onboarding – especially useful for managed services providers or large company mergers/divestures.
  • 36
    ZyDoc Transcription
    Discover an easier, faster and more accurate system of medical documentation using your smartphone. ZyDoc enables physicians to effortlessly populate the appropriate sections of their EHR with highly accurate clinical notes using a dictation-based, mobile-friendly system of medical documentation. Schedule a free demo to learn more or sign up with one of our plans starting at 10 cents per line. We offer a 30-day money-back guarantee so you can discover risk-free how ZyDoc will simplify EHR charting and reduce clinical documentation tasks. From athenaClinicals to DrChrono, we have the technology to integrate with all cloud-based EHR systems using an API or HL7. Doctors can dictate anytime, and from anywhere by smartphone, digital recorder, tablet or telephone. Our specialty-specific medical typists and editors transform dictations into highly accurate documentation. Transcribed documents can be inserted into the appropriate sections of any EHR.
    Starting Price: $125/month
  • 37
    Barac

    Barac

    Venari Security

    Our unique solution works with your existing infrastructure to deliver instant analysis, detection and response to cyber threats carried within your encrypted data. Read our advisory paper, get insight into the encrypted traffic problem and understand why the use of TLS protocols and your existing infrastructure are raising the security risks for your critical data. Then read how our unique solution utilises the latest technology to ensure your business is cyber secure, crypto compliant and delivering ROI. Metadata is extracted from all incoming/outgoing encrypted data packets in real time, and forwarded to the Barac platform for analysis. Unique AI utilising machine learning and behavioural analytics (involving 200+ metrics) detects known threat vectors and abnormal traffic to discover potential threats. Alerts are sent to your specified security team SOC, SIEM or alternative, for immediate response.
  • 38
    NetFlow Analyzer

    NetFlow Analyzer

    ManageEngine

    NetFlow Analyzer is a comprehensive traffic analysis tool that leverages flow technologies to provide real-time visibility into network bandwidth performance. NetFlow Analyzer is primarily a bandwidth monitoring tool, which has optimized thousands of networks globally, offering a holistic view of your network bandwidth and traffic patterns. NetFlow Analyzer is a unified solution that collects, analyzes, and reports on your network's bandwidth usage, and by whom. NetFlow Analyzer is your partner in optimizing bandwidth usage across a million interfaces globally, as well as providing network forensics and network traffic analysis. Reconfigure policies with traffic shaping via ACLs or class-based policies to gain control of the applications that use the most bandwidth. NetFlow Analyzer leverages Cisco NBAR technology to give you deep visibility into Layer 7 traffic and recognize applications that use dynamic port numbers or hide behind known ports.
  • 39
    tcpdump

    tcpdump

    tcpdump

    Tcpdump is a powerful command-line packet analyzer that allows users to display the contents of network packets transmitted or received over a network to which the computer is attached. It operates on most Unix-like systems, including Linux, Solaris, FreeBSD, NetBSD, OpenBSD, and macOS, utilizing the libpcap library for network traffic capture. Tcpdump can read packets from a network interface card or from a previously created saved packet file, and it provides options to write packets to standard output or a file. Users can apply BPF-based filters to limit the number of packets processed, enhancing usability on networks with high traffic volumes. The tool is distributed under the BSD license, making it free software. In many operating systems tcpdump is available as a native package or port, which simplifies installation of updates and long-term maintenance.
    Starting Price: Free
  • 40
    NetVizura NetFlow Analyzer
    NetFlow Analyzer is an easy solution for net admins to better understand bandwidth consumption, traffic trends, applications, hosts and traffic anomalies, by visualising the traffic by network devices, interfaces and subnets, traffic segments and end users. NetFlow Analyzer utilizes Cisco® NetFlow, IPFIX, NSEL, sFlow and compatible netflow-like protocols to help net admins with bandwidth monitoring, network traffic investigation, analyses and reporting. This way, companies can optimise networks and applications, plan network expansion, minimize time spent on troubleshooting and diagnostics, and improve security. NetVizura allows you to define custom traffic to be monitored based on IP subnets and traffic characteristics like protocol and service used. Monitor specific traffic for each organisational unit in your network such as departments, remote sites and collections of regional offices by identifying them with IP subnets.
  • 41
    Omnis Cyber Intelligence
    Omnis CyberStream and Omnis Cyber Intelligence form NETSCOUT’s advanced Network Detection and Response (NDR) platform built on deep packet inspection. The platform delivers pervasive, packet-level visibility to eliminate blind spots across data centers, cloud environments, remote users, and network edges. By combining real-time adaptive threat detection with continuous packet capture, it enables faster and more accurate incident response. Omnis Cyber Intelligence identifies and prioritizes threats at the source using layered machine learning, threat intelligence, and deterministic analysis. Always-on packet and metadata collection ensures security teams have full context before, during, and after an incident. Integrated investigation workflows reduce alert noise and shorten the gap between detection and response. The platform empowers SOC teams to investigate, respond, and prevent threats with confidence and precision.
  • 42
    CloudShark

    CloudShark

    QA Cafe

    CloudShark is a secure solution that enables network and security teams to organize, analyze, and collaborate on packet captures. Designed for network operators, security specialists, and IT departments. CloudShark makes it possible to share more easily, communicate better, and solve network problems faster. CloudShark is deployed on-premise or in the cloud. CloudShark combines all of the analysis capabilities of Wireshark, Zeek, Suricata IDS, and more into a single solution that enables your team to solve problems faster by eliminating duplicate work and streamlining investigations and reporting. CloudShark is brought to you by QA Cafe, a dynamic software company composed of experts in networking, consumer electronics, and security. We develop industry-leading network device test solutions and network analysis tools for business use while providing our customers with world-class support.
    Starting Price: $4,500 per year
  • 43
    FlowProbe

    FlowProbe

    Telesoft

    Network traffic monitoring is essential for ensuring your organization has all the information required to make evidence-based decisions to prevent and respond to cyber-attacks on your digital estate. Our FlowProbe security solution is a network monitoring tool capable of providing vital intrusion detection information for high-rate and high-volume network traffic without impacting network performance. Coupled with a security solution such as the Telesoft Data Analytics Capability (TDAC), the Flowprobe provides your NetSecOps teams with sophisticated intrusion detection and threat behavioural analysis capabilities. The FlowProbe provides detailed un-sampled traffic statistics in the form of flow records from large-scale networks up to 4 x 100GbE per high-performance 1U appliance. The flow records created from the raw data can be passed in real-time to the Telesoft TDAC or any other compatible customer data platform.
  • 44
    CySight

    CySight

    IdeaData

    CySight's Dropless Collection method provides absolute data retention, enabling the most data orientated decision making and cost-effective workflow for any organization, significantly enhancing network performance, network security and cyber intelligence to the highest level. With a Unique approach, CySight delivers comparative baselining, superior granularity, scalable collection, root cause analysis and QoS Analysis. All Designed to run independently or work together as a powerful single unit. CySight empowers communication and application visibility for networking, security, billing and compliance with high-end integrated network traffic analytics, granular forensics, cybersecurity intelligence, cloud usage, internet-of-things analytics, peering and billing to medium and large enterprise customers and service providers. Our objective at CySight is to reveal your data’s potential and eliminate all blind spots.
    Starting Price: $299/month
  • 45
    Fingerbank

    Fingerbank

    Fingerbank

    Fingerbank is a set of tools to identify networking devices based on their network fingerprints. A device fingerprint is very useful for numerous kinds of applications. For example, it can be used by Network Access Control solutions such as PacketFence to grant different network access based on the device type (gaming console vs. laptop). Fingerbank knows how a device should present itself on the network its communications patterns and when a device deviates from those. Our technology is performing continuous data mining to extract common patterns from networking devices and can therefore raise an alert when a device acts abnormally. When a device connects to a network, it exposes various precious information on different layers of the networking stack. The Fingerbank collector can build a precise fingerprint of the device and use the knowledge and algorithms of the Fingerbank cloud API to accurately identify the device.
    Starting Price: $250 per month
  • 46
    Wyebot

    Wyebot

    Wyebot

    Wyebot provides client-side visibility and testing for your business-critical WiFi networks through intelligent sensors and agents that simulate an expert WiFi engineer on-site—delivering insights that traditional infrastructure monitoring can't deliver. Our cloud-based platform provides 360-degree visibility across your entire network, from wireless to wired connections, client devices to access points. This comprehensive visibility captures both intermittent and critical issues, and identifies whether issues stem from the back-end network infrastructure itself or other sources, eliminating cross-team finger-pointing and accelerating resolution. Our AI-powered engine automatically detects issues and recommends specific solutions, while detailed historical data, including full packet captures, enables rapid problem resolution without costly site visits.
    Starting Price: Varies by quantity and term
  • 47
    Netmon

    Netmon

    Netmon

    When detecting problems in your environment, visibility is the key to quickly and accurately identifying the root cause. Netmon gives you that visibility in an affordable, appliance-based networking monitoring software solution that is trusted globally by large and small organizations from an array of industries including military, financial, insurance and information technology firms. Bundled into a single appliance, the Netmon network monitor offers an inclusive and full-featured network monitoring software system. Monitor your network infrastructure, server performance and network traffic with a SINGLE and POWERFUL SOLUTION. Our network monitoring software will continuously scan, monitor, and report any activity throughout your network. This real-time data will provide you with complete insight on anything happening within your network. Our network monitoring software tracks bandwidth consumption, network latency, disk usage, event logs, device status and battery backup states.
  • 48
    VPN Beholder
    ITSEC's VPN Beholder is a proprietary VPN monitoring solution that provides comprehensive visibility into VPN traffic, enabling real-time anomaly detection and alerting for cybersecurity teams. It performs capture analysis on VPN logs and can query Security Information and Event Management (SIEM) systems to detect Active Directory account access compromises, shared VPN account misuse, unauthorized device connections, and atypical activities. The tool offers real-time live chat and email notifications, allowing cybersecurity teams to be promptly alerted to potentially suspicious behavior. By automating the analysis of VPN log behavior, VPN Beholder reduces the workload of cybersecurity teams, enabling them to focus on other priorities. Developed in-house by ITSEC engineers in collaboration with their security teams, VPN Beholder is designed to enhance the security posture of organizations by providing 360° visibility over VPN traffic.
  • 49
    Enigma NMS
    ENIGMA NMS a.k.a “NOC in a BOX” Enigma NMS is a market disruptor in the Enterprise Network Management, Monitoring and Managed Services Tools sectors. It has comprehensive unique features, industry best practices, enterprise design, extensive scalability, automation and stability. The low cost, flexible pricing model allows our customers to manage, monitor, report and alert on everything across their entire enterprise, OT and IoT infrastructures, regardless of their size or complexity. Enigma provides substantial visibility and full environmental awareness, enabling network professionals to be more proactive in fault prediction, detection, analysis, reporting and efficient decision making. Enigma features include: All Performance Metrics (60 seconds polling, for up to 5 years with no averaging), Traffic Analyzer, Configuration Management, QoS, Syslog, SNMP Traps, Environmental Monitoring – ANY OID, Applications, VMs, IPSLA, MPLS, Routers, Switches, Servers, Firewalls, WAN. etc.
  • 50
    Cryptomage

    Cryptomage

    Cryptomage

    Threat detection provides deep inspection of every single network packet including transported data with: Network protocol discovery and validation – easily check unknown and hidden protocols. Machine Learning algorithms – proactive traffic risk-scoring. Network steganography detection of hidden network traffic, including data leaks, espionage channels, and botnets. Proprietary steganography detection algorithms – effective way of uncovering methods of hiding information. Proprietary steganography signature database – comprehensive collection of known network steganography methods. Forensics to better measure the ratio of security events against source of traffic. Extraction of high-risk network traffic – easy to analyze and focus on specific threat levels. Storage of processed traffic metadata in extended format – faster trend analysis.