2026 Best Software Awards are here!See the list

Best Network Traffic Analysis (NTA) Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Network traffic analysis (NTA) software monitors network traffic and provides expanded visibility into network activity and communications. These tools are used to document and analyze network resource utilization and performance, constantly tracking granular details related to network communications. NTA tools are typically automated and provide insights into who is using a network, how they’re accessing it, where they’re located, and what they’re doing within the network.

Businesses use NTA tools to identify suspicious traffic-related activity and pinpoint network performance issues such as slow download speeds or throughput. These tools are typically administered by a company’s IT department and used to bolster network security efforts and optimize network performance. Many NTA solutions provide real-time analysis to alert IT administrators of abnormal activity or performance, assisting them in remediating threats and reducing network failure.

There is some overlap between network traffic analysis software and network monitoring software, but the difference is their intended use. While many NTA solutions are used for performance monitoring and baselining, network monitoring tools don't offer the same level of granularity when detailing network activity and typically won’t provide features related to encrypted traffic analysis, NetFlow metrics, or behavioral analysis.

To qualify for inclusion in the Network Traffic Analysis category, a product must:

Facilitate raw packet and/or traffic flow analysis
Monitor internal and external network communications
Provide behavioral analysis or anomaly detection features
Show More
Show Less

Best Network Traffic Analysis (NTA) Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
88 Listings in Network Traffic Analysis (NTA) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kaspersky Anti Targeted Attack (KATA) is a comprehensive cybersecurity solution designed to detect, analyze, and respond to complex threats, including advanced persistent threats (APTs), zero-day atta

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 43% Small-Business
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kaspersky Anti Targeted Attack Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Reliability
    2
    Threat Detection
    2
    Analysis
    1
    Easy Implementation
    1
    Installation Ease
    1
    Cons
    Expensive
    2
    Cost
    1
    Not User-Friendly
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kaspersky Anti Targeted Attack features and usability ratings that predict user satisfaction
    7.4
    Anomaly Detection
    Average: 8.6
    7.2
    Has the product been a good partner in doing business?
    Average: 8.8
    8.2
    Network Visibility
    Average: 8.9
    7.4
    Metadata Management
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaspersky
    Year Founded
    1997
    HQ Location
    Moscow
    Twitter
    @kasperskylabind
    1,294 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,494 employees on LinkedIn®
    Phone
    1-866-328-5700
Product Description
How are these determined?Information
This description is provided by the seller.

Kaspersky Anti Targeted Attack (KATA) is a comprehensive cybersecurity solution designed to detect, analyze, and respond to complex threats, including advanced persistent threats (APTs), zero-day atta

Users
No information available
Industries
No information available
Market Segment
  • 43% Small-Business
  • 36% Mid-Market
Kaspersky Anti Targeted Attack Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Reliability
2
Threat Detection
2
Analysis
1
Easy Implementation
1
Installation Ease
1
Cons
Expensive
2
Cost
1
Not User-Friendly
1
Kaspersky Anti Targeted Attack features and usability ratings that predict user satisfaction
7.4
Anomaly Detection
Average: 8.6
7.2
Has the product been a good partner in doing business?
Average: 8.8
8.2
Network Visibility
Average: 8.9
7.4
Metadata Management
Average: 8.4
Seller Details
Seller
Kaspersky
Year Founded
1997
HQ Location
Moscow
Twitter
@kasperskylabind
1,294 Twitter followers
LinkedIn® Page
www.linkedin.com
4,494 employees on LinkedIn®
Phone
1-866-328-5700
(33)4.4 out of 5
5th Easiest To Use in Network Traffic Analysis (NTA) software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stealthwatch is the only solution that detects threats across your private network, public clouds, and even in encrypted traffic.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 52% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Secure Network Analytics features and usability ratings that predict user satisfaction
    9.3
    Anomaly Detection
    Average: 8.6
    8.8
    Has the product been a good partner in doing business?
    Average: 8.8
    9.4
    Network Visibility
    Average: 8.9
    8.8
    Metadata Management
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    721,631 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,386 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Stealthwatch is the only solution that detects threats across your private network, public clouds, and even in encrypted traffic.

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 52% Enterprise
  • 33% Small-Business
Cisco Secure Network Analytics features and usability ratings that predict user satisfaction
9.3
Anomaly Detection
Average: 8.6
8.8
Has the product been a good partner in doing business?
Average: 8.8
9.4
Network Visibility
Average: 8.9
8.8
Metadata Management
Average: 8.4
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
721,631 Twitter followers
LinkedIn® Page
www.linkedin.com
95,386 employees on LinkedIn®
Ownership
NASDAQ:CSCO
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trellix NDR delivers extended visibility, multi-layered threat detection and accelerated investigation and response into network traffic across each stage of the MITRE ATT&CK framework – spanning

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix Network Detection and Response (NDR) features and usability ratings that predict user satisfaction
    6.7
    Anomaly Detection
    Average: 8.6
    8.2
    Has the product been a good partner in doing business?
    Average: 8.8
    6.7
    Network Visibility
    Average: 8.9
    8.3
    Metadata Management
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    242,035 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    812 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trellix NDR delivers extended visibility, multi-layered threat detection and accelerated investigation and response into network traffic across each stage of the MITRE ATT&CK framework – spanning

Users
No information available
Industries
No information available
Market Segment
  • 36% Mid-Market
  • 33% Small-Business
Trellix Network Detection and Response (NDR) features and usability ratings that predict user satisfaction
6.7
Anomaly Detection
Average: 8.6
8.2
Has the product been a good partner in doing business?
Average: 8.8
6.7
Network Visibility
Average: 8.9
8.3
Metadata Management
Average: 8.4
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
242,035 Twitter followers
LinkedIn® Page
www.linkedin.com
812 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bitdefender Network Traffic Security Analytics (NTSA is an enterprise security solution designed to detect advanced threats in real-time by analyzing network traffic. Utilizing machine learning, behav

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 75% Small-Business
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bitdefender Network Traffic Security Analytics features and usability ratings that predict user satisfaction
    8.5
    Anomaly Detection
    Average: 8.6
    8.3
    Has the product been a good partner in doing business?
    Average: 8.8
    8.3
    Network Visibility
    Average: 8.9
    7.5
    Metadata Management
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2001
    HQ Location
    Bucuresti, Romania
    Twitter
    @Bitdefender
    113,611 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,317 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Bitdefender Network Traffic Security Analytics (NTSA is an enterprise security solution designed to detect advanced threats in real-time by analyzing network traffic. Utilizing machine learning, behav

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 75% Small-Business
  • 25% Enterprise
Bitdefender Network Traffic Security Analytics features and usability ratings that predict user satisfaction
8.5
Anomaly Detection
Average: 8.6
8.3
Has the product been a good partner in doing business?
Average: 8.8
8.3
Network Visibility
Average: 8.9
7.5
Metadata Management
Average: 8.4
Seller Details
Year Founded
2001
HQ Location
Bucuresti, Romania
Twitter
@Bitdefender
113,611 Twitter followers
LinkedIn® Page
www.linkedin.com
2,317 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sophisticated, targeted attacks can take weeks, months or longer to discover and resolve. Incident response teams need tools that quickly uncover the full source and scope of an attack to reduce time-

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Network Forensics: Security Analytics features and usability ratings that predict user satisfaction
    8.3
    Anomaly Detection
    Average: 8.6
    6.7
    Has the product been a good partner in doing business?
    Average: 8.8
    9.2
    Network Visibility
    Average: 8.9
    7.5
    Metadata Management
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    62,643 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    55,707 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Sophisticated, targeted attacks can take weeks, months or longer to discover and resolve. Incident response teams need tools that quickly uncover the full source and scope of an attack to reduce time-

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 25% Mid-Market
Symantec Network Forensics: Security Analytics features and usability ratings that predict user satisfaction
8.3
Anomaly Detection
Average: 8.6
6.7
Has the product been a good partner in doing business?
Average: 8.8
9.2
Network Visibility
Average: 8.9
7.5
Metadata Management
Average: 8.4
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
62,643 Twitter followers
LinkedIn® Page
www.linkedin.com
55,707 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Flowmon is a professional NPMD tool for effective network troubleshooting, performance monitoring, capacity planning, encrypted traffic analysis and cloud monitoring. Instead of just the red/green inf

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 52% Mid-Market
    • 24% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Flowmon Platform features and usability ratings that predict user satisfaction
    7.1
    Anomaly Detection
    Average: 8.6
    7.8
    Has the product been a good partner in doing business?
    Average: 8.8
    8.8
    Network Visibility
    Average: 8.9
    7.2
    Metadata Management
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1981
    HQ Location
    Burlington, MA.
    Twitter
    @ProgressSW
    48,900 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,205 employees on LinkedIn®
    Ownership
    NASDAQ:PRGS
Product Description
How are these determined?Information
This description is provided by the seller.

Flowmon is a professional NPMD tool for effective network troubleshooting, performance monitoring, capacity planning, encrypted traffic analysis and cloud monitoring. Instead of just the red/green inf

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 52% Mid-Market
  • 24% Enterprise
Flowmon Platform features and usability ratings that predict user satisfaction
7.1
Anomaly Detection
Average: 8.6
7.8
Has the product been a good partner in doing business?
Average: 8.8
8.8
Network Visibility
Average: 8.9
7.2
Metadata Management
Average: 8.4
Seller Details
Year Founded
1981
HQ Location
Burlington, MA.
Twitter
@ProgressSW
48,900 Twitter followers
LinkedIn® Page
www.linkedin.com
4,205 employees on LinkedIn®
Ownership
NASDAQ:PRGS
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A network security platform, years in the making, leveraging mathematics to continuously learn, predict, and defend against attacks.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 38% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • B1 Platform by CloudCover Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Network Security
    3
    Security
    3
    Affordable
    2
    Cost Efficiency
    2
    Ease of Use
    2
    Cons
    Lack of Mobile Support
    2
    Poor Customer Support
    2
    Not User-Friendly
    1
    Poor Usability
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • B1 Platform by CloudCover features and usability ratings that predict user satisfaction
    8.8
    Anomaly Detection
    Average: 8.6
    8.3
    Has the product been a good partner in doing business?
    Average: 8.8
    8.2
    Network Visibility
    Average: 8.9
    7.9
    Metadata Management
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2007
    HQ Location
    Minneapolis, US
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A network security platform, years in the making, leveraging mathematics to continuously learn, predict, and defend against attacks.

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 38% Mid-Market
  • 38% Small-Business
B1 Platform by CloudCover Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Network Security
3
Security
3
Affordable
2
Cost Efficiency
2
Ease of Use
2
Cons
Lack of Mobile Support
2
Poor Customer Support
2
Not User-Friendly
1
Poor Usability
1
Slow Performance
1
B1 Platform by CloudCover features and usability ratings that predict user satisfaction
8.8
Anomaly Detection
Average: 8.6
8.3
Has the product been a good partner in doing business?
Average: 8.8
8.2
Network Visibility
Average: 8.9
7.9
Metadata Management
Average: 8.4
Seller Details
Year Founded
2007
HQ Location
Minneapolis, US
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PingIntelligence for APIs is an AI-driven security solution designed to protect APIs by identifying and automatically blocking cyberattacks, exposing active APIs, and providing detailed reporting on a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PingIntelligence for APIs features and usability ratings that predict user satisfaction
    9.4
    Anomaly Detection
    Average: 8.6
    9.2
    Has the product been a good partner in doing business?
    Average: 8.8
    7.1
    Network Visibility
    Average: 8.9
    8.9
    Metadata Management
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,177 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,311 employees on LinkedIn®
    Phone
    1.303.468.2900
Product Description
How are these determined?Information
This description is provided by the seller.

PingIntelligence for APIs is an AI-driven security solution designed to protect APIs by identifying and automatically blocking cyberattacks, exposing active APIs, and providing detailed reporting on a

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 40% Small-Business
PingIntelligence for APIs features and usability ratings that predict user satisfaction
9.4
Anomaly Detection
Average: 8.6
9.2
Has the product been a good partner in doing business?
Average: 8.8
7.1
Network Visibility
Average: 8.9
8.9
Metadata Management
Average: 8.4
Seller Details
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,177 Twitter followers
LinkedIn® Page
www.linkedin.com
2,311 employees on LinkedIn®
Phone
1.303.468.2900
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Corelight's Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detecti

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 50% Mid-Market
    • 50% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Corelight Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    4
    Cybersecurity
    3
    Detection
    3
    Detection Efficiency
    3
    Network Security
    3
    Cons
    Complex Coding
    3
    Complexity
    3
    Complex Configuration
    2
    Complex Setup
    2
    Learning Curve
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Corelight features and usability ratings that predict user satisfaction
    7.9
    Anomaly Detection
    Average: 8.6
    9.4
    Has the product been a good partner in doing business?
    Average: 8.8
    9.8
    Network Visibility
    Average: 8.9
    7.1
    Metadata Management
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Corelight
    Company Website
    Year Founded
    2013
    HQ Location
    San Francisco, CA
    Twitter
    @corelight_inc
    4,224 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    464 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Corelight's Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detecti

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 50% Mid-Market
  • 50% Enterprise
Corelight Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
4
Cybersecurity
3
Detection
3
Detection Efficiency
3
Network Security
3
Cons
Complex Coding
3
Complexity
3
Complex Configuration
2
Complex Setup
2
Learning Curve
2
Corelight features and usability ratings that predict user satisfaction
7.9
Anomaly Detection
Average: 8.6
9.4
Has the product been a good partner in doing business?
Average: 8.8
9.8
Network Visibility
Average: 8.9
7.1
Metadata Management
Average: 8.4
Seller Details
Seller
Corelight
Company Website
Year Founded
2013
HQ Location
San Francisco, CA
Twitter
@corelight_inc
4,224 Twitter followers
LinkedIn® Page
www.linkedin.com
464 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetFlow Analyzer utilizes Cisco® NetFlow, IPFIX and compatible netflow-like protocols to help net admins with bandwidth monitoring, deep network traffic investigation, analyses and reporting. By visua

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NetFlow Analyzer Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Traffic Analysis
    2
    All-in-One Solution
    1
    Detailed Analysis
    1
    Monitoring
    1
    Reliability
    1
    Cons
    Complexity
    1
    Complex Setup
    1
    High Resource Usage
    1
    Installation
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetFlow Analyzer features and usability ratings that predict user satisfaction
    6.1
    Anomaly Detection
    Average: 8.6
    8.7
    Has the product been a good partner in doing business?
    Average: 8.8
    8.3
    Network Visibility
    Average: 8.9
    6.7
    Metadata Management
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NetVizura
    Year Founded
    2008
    HQ Location
    Belgrade, Serbia
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NetFlow Analyzer utilizes Cisco® NetFlow, IPFIX and compatible netflow-like protocols to help net admins with bandwidth monitoring, deep network traffic investigation, analyses and reporting. By visua

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 40% Enterprise
NetFlow Analyzer Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Traffic Analysis
2
All-in-One Solution
1
Detailed Analysis
1
Monitoring
1
Reliability
1
Cons
Complexity
1
Complex Setup
1
High Resource Usage
1
Installation
1
Learning Curve
1
NetFlow Analyzer features and usability ratings that predict user satisfaction
6.1
Anomaly Detection
Average: 8.6
8.7
Has the product been a good partner in doing business?
Average: 8.8
8.3
Network Visibility
Average: 8.9
6.7
Metadata Management
Average: 8.4
Seller Details
Seller
NetVizura
Year Founded
2008
HQ Location
Belgrade, Serbia
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point SandBlast Advanced Network Threat Prevention is a comprehensive security solution designed to protect organizations from sophisticated cyber threats, including zero-day attacks and advance

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 67% Mid-Market
    • 28% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point SandBlast Advanced Network Threat Prevention Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Easy Integrations
    3
    Threat Detection
    3
    Security Protection
    2
    Accuracy of Information
    1
    Cons
    Cost
    2
    Expensive
    2
    High Resource Usage
    1
    Incomplete Information
    1
    Limited Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point SandBlast Advanced Network Threat Prevention features and usability ratings that predict user satisfaction
    8.8
    Anomaly Detection
    Average: 8.6
    9.4
    Has the product been a good partner in doing business?
    Average: 8.8
    10.0
    Network Visibility
    Average: 8.9
    8.3
    Metadata Management
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,997 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,356 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point SandBlast Advanced Network Threat Prevention is a comprehensive security solution designed to protect organizations from sophisticated cyber threats, including zero-day attacks and advance

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 67% Mid-Market
  • 28% Enterprise
Check Point SandBlast Advanced Network Threat Prevention Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Easy Integrations
3
Threat Detection
3
Security Protection
2
Accuracy of Information
1
Cons
Cost
2
Expensive
2
High Resource Usage
1
Incomplete Information
1
Limited Customization
1
Check Point SandBlast Advanced Network Threat Prevention features and usability ratings that predict user satisfaction
8.8
Anomaly Detection
Average: 8.6
9.4
Has the product been a good partner in doing business?
Average: 8.8
10.0
Network Visibility
Average: 8.9
8.3
Metadata Management
Average: 8.4
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,997 Twitter followers
LinkedIn® Page
www.linkedin.com
8,356 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A Key Part of Fortra (the new face of HelpSystems) Halcyon is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringing

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Enterprise
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM i Server Suites features and usability ratings that predict user satisfaction
    9.2
    Anomaly Detection
    Average: 8.6
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    9.2
    Network Visibility
    Average: 8.9
    8.3
    Metadata Management
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,588 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,738 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A Key Part of Fortra (the new face of HelpSystems) Halcyon is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringing

Users
No information available
Industries
No information available
Market Segment
  • 60% Enterprise
  • 40% Mid-Market
IBM i Server Suites features and usability ratings that predict user satisfaction
9.2
Anomaly Detection
Average: 8.6
10.0
Has the product been a good partner in doing business?
Average: 8.8
9.2
Network Visibility
Average: 8.9
8.3
Metadata Management
Average: 8.4
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,588 Twitter followers
LinkedIn® Page
www.linkedin.com
1,738 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Securonix is working to radically transform all areas of data security with actionable security intelligence.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 50% Enterprise
    • 36% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Securonix Security Operations and Analytics Platform features and usability ratings that predict user satisfaction
    8.8
    Anomaly Detection
    Average: 8.6
    7.7
    Has the product been a good partner in doing business?
    Average: 8.8
    9.2
    Network Visibility
    Average: 8.9
    10.0
    Metadata Management
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Securonix
    Year Founded
    2008
    HQ Location
    Addison, US
    Twitter
    @Securonix
    4,297 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    656 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Securonix is working to radically transform all areas of data security with actionable security intelligence.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 50% Enterprise
  • 36% Small-Business
Securonix Security Operations and Analytics Platform features and usability ratings that predict user satisfaction
8.8
Anomaly Detection
Average: 8.6
7.7
Has the product been a good partner in doing business?
Average: 8.8
9.2
Network Visibility
Average: 8.9
10.0
Metadata Management
Average: 8.4
Seller Details
Seller
Securonix
Year Founded
2008
HQ Location
Addison, US
Twitter
@Securonix
4,297 Twitter followers
LinkedIn® Page
www.linkedin.com
656 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SparrowIQ is a solution that complements existing network management systems by providing total network traffic analysis and visibility.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Small-Business
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SparrowIQ Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    All-in-One Solution
    1
    Detailed Analysis
    1
    Easy Monitoring
    1
    Monitoring
    1
    Cons
    Missing Features
    2
    Integration Issues
    1
    Learning Curve
    1
    Poor Interface Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SparrowIQ features and usability ratings that predict user satisfaction
    9.2
    Anomaly Detection
    Average: 8.6
    7.5
    Has the product been a good partner in doing business?
    Average: 8.8
    9.2
    Network Visibility
    Average: 8.9
    10.0
    Metadata Management
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Ottawa, CA
    Twitter
    @solananetworks
    73 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SparrowIQ is a solution that complements existing network management systems by providing total network traffic analysis and visibility.

Users
No information available
Industries
No information available
Market Segment
  • 80% Small-Business
  • 20% Mid-Market
SparrowIQ Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
All-in-One Solution
1
Detailed Analysis
1
Easy Monitoring
1
Monitoring
1
Cons
Missing Features
2
Integration Issues
1
Learning Curve
1
Poor Interface Design
1
SparrowIQ features and usability ratings that predict user satisfaction
9.2
Anomaly Detection
Average: 8.6
7.5
Has the product been a good partner in doing business?
Average: 8.8
9.2
Network Visibility
Average: 8.9
10.0
Metadata Management
Average: 8.4
Seller Details
HQ Location
Ottawa, CA
Twitter
@solananetworks
73 Twitter followers
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BhaiFi empowers businesses to forge meaningful connections with their customers through Guest WiFi. By harnessing AI technology, we make network security and compliance effortless, democratizing cyber

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Small-Business
    • 23% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BhaiFi Networks features and usability ratings that predict user satisfaction
    9.4
    Anomaly Detection
    Average: 8.6
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    8.9
    Network Visibility
    Average: 8.9
    8.9
    Metadata Management
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BhaiFi
    Year Founded
    2017
    HQ Location
    Ankit Verma
    Twitter
    @bhaifi
    70 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
    Ownership
    Ankit Verma
Product Description
How are these determined?Information
This description is provided by the seller.

BhaiFi empowers businesses to forge meaningful connections with their customers through Guest WiFi. By harnessing AI technology, we make network security and compliance effortless, democratizing cyber

Users
No information available
Industries
No information available
Market Segment
  • 64% Small-Business
  • 23% Mid-Market
BhaiFi Networks features and usability ratings that predict user satisfaction
9.4
Anomaly Detection
Average: 8.6
10.0
Has the product been a good partner in doing business?
Average: 8.8
8.9
Network Visibility
Average: 8.9
8.9
Metadata Management
Average: 8.4
Seller Details
Seller
BhaiFi
Year Founded
2017
HQ Location
Ankit Verma
Twitter
@bhaifi
70 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
Ownership
Ankit Verma