# Best Network Traffic Analysis (NTA) Software

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Network traffic analysis (NTA) software monitors network traffic and provides expanded visibility into network activity and communications. These tools are used to document and analyze network resource utilization and performance, constantly tracking granular details related to network communications. NTA tools are typically automated and provide insights into who is using a network, how they’re accessing it, where they’re located, and what they’re doing within the network.

Businesses use NTA tools to identify suspicious traffic-related activity and pinpoint network performance issues such as slow download speeds or throughput. These tools are typically administered by a company’s IT department and used to bolster network security efforts and optimize network performance. Many NTA solutions provide real-time analysis to alert IT administrators of abnormal activity or performance, assisting them in remediating threats and reducing network failure.

There is some overlap between network traffic analysis software and [network monitoring software](https://www.g2.com/categories/network-monitoring), but the difference is their intended use. While many NTA solutions are used for performance monitoring and baselining, network monitoring tools don&#39;t offer the same level of granularity when detailing network activity and typically won’t provide features related to encrypted traffic analysis, NetFlow metrics, or behavioral analysis.

To qualify for inclusion in the Network Traffic Analysis category, a product must:

- Facilitate raw packet and/or traffic flow analysis
- Monitor internal and external network communications
- Provide behavioral analysis or anomaly detection features





## Best Network Traffic Analysis (NTA) Software At A Glance

- **Leader:** [Check Point Next Generation Firewalls (NGFWs)](https://www.g2.com/products/check-point-next-generation-firewalls-ngfws/reviews)
- **Highest Performer:** [Faddom](https://www.g2.com/products/faddom/reviews)
- **Easiest to Use:** [Check Point Next Generation Firewalls (NGFWs)](https://www.g2.com/products/check-point-next-generation-firewalls-ngfws/reviews)
- **Top Trending:** [Check Point Next Generation Firewalls (NGFWs)](https://www.g2.com/products/check-point-next-generation-firewalls-ngfws/reviews)
- **Best Free Software:** [Check Point Next Generation Firewalls (NGFWs)](https://www.g2.com/products/check-point-next-generation-firewalls-ngfws/reviews)


## Top-Rated Products (Ranked by G2 Score)
  ### 1. [Check Point Next Generation Firewalls (NGFWs)](https://www.g2.com/products/check-point-next-generation-firewalls-ngfws/reviews)
  Strengthen Your Security with Check Point Gateways and Firewalls Check Point Hybrid Mesh Network Security is a comprehensive cybersecurity solution designed to protect networks from sophisticated cyber threats while ensuring seamless management across diverse hybrid environments – on-premises, cloud, SaaS, and remote users. This product encompasses advanced threat prevention, real-time global threat intelligence, and unified policy management, making it an essential tool for organizations looking to secure their IT infrastructure, including data centers, hybrid clouds, and remote endpoints. Targeted at enterprises of all sizes, Check Point&#39;s solution caters to a wide range of industries that require robust security measures to safeguard sensitive data and maintain operational integrity. The product is particularly beneficial for organizations with complex network architectures, including those utilizing cloud services, Software as a Service (SaaS) applications, and remote workforces. By addressing the unique security challenges posed by these environments, Check Point enables businesses to maintain a secure and resilient IT ecosystem. One of the standout features of Check Point Hybrid Mesh Network Security is its AI-powered threat prevention capabilities. This technology allows for the identification and mitigation of threats in real-time, ensuring that organizations can respond swiftly to potential breaches. Additionally, the solution offers comprehensive security for various aspects of the IT landscape, including network security, cloud security, and workspace security. This multi-faceted approach ensures that users, applications, and data are protected regardless of their location, whether on-premises, in the cloud, or on employee devices. The deployment flexibility of Check Point&#39;s solution is another key advantage. Organizations can choose from on-premises, cloud-native, on-device, in-browser, or Secure Access Service Edge (SASE) models, allowing for tailored implementations that meet specific operational needs. This adaptability is complemented by unified security management, which simplifies operations through a single platform that provides visibility, policy enforcement, and posture control across the entire network. Furthermore, Check Point Hybrid Mesh Network Security is designed to optimize performance and cost. With high-speed, prevention-first security and on-device security controls, organizations can achieve effective protection without compromising on efficiency. The consistent application of zero-trust policies across the hybrid mesh network enhances security posture, ensuring that all components of the IT environment are uniformly protected against evolving cyber threats. This comprehensive solution empowers organizations to level up their protection and confidently navigate the complexities of modern cybersecurity challenges.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 500

**User Satisfaction Scores:**

- **Anomaly Detection:** 9.0/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.8/10)
- **Network Visibility:** 9.1/10 (Category avg: 8.9/10)
- **Metadata Management:** 8.8/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Company Website:** https://www.checkpoint.com/
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,927 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Network Security Engineer, Network Engineer
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 44% Mid-Market, 42% Enterprise


#### Pros & Cons

**Pros:**

- Cybersecurity (101 reviews)
- Threat Detection (86 reviews)
- Features (80 reviews)
- Network Security (76 reviews)
- Centralized Management (66 reviews)

**Cons:**

- Expensive (71 reviews)
- Complexity (56 reviews)
- Complex Setup (49 reviews)
- Slow Performance (45 reviews)
- Difficult Learning Curve (43 reviews)

  ### 2. [IBM SevOne](https://www.g2.com/products/ibm-sevone/reviews)
  IBM® SevOne® gives NetOps teams deep, real-time visibility into hybrid cloud and SD-WAN performance —&amp;nbsp;combining network-layer intelligence and app-aware insights to speed up resolution, reduce complexity, and ensure seamless digital experiences. In a world of hybrid clouds and ever-rising user expectations, downtime is not an option. IBM SevOne 8.0 equips NetOps teams with real-time, unified visibility across complex networks—from SD-WAN and multi-cloud (AWS, GCP, Azure) to Kubernetes. Built for speed and scale, it reduces time-to-value with native widget deployment, enhances diagnostics with advanced Flow Filters, and integrates seamlessly with vendors like Cisco, Aruba, and Palo Alto. The result? A cloud-smart, app-aware network that proactively detects issues before they impact users. With SevOne, you don’t just monitor. You take control of the future of network observability—today.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 70

**User Satisfaction Scores:**

- **Anomaly Detection:** 8.3/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 8.8/10)
- **Network Visibility:** 8.9/10 (Category avg: 8.9/10)
- **Metadata Management:** 8.3/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [IBM](https://www.g2.com/sellers/ibm)
- **Year Founded:** 1911
- **HQ Location:** Armonk, NY
- **Twitter:** @IBM (708,000 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1009/ (324,553 employees on LinkedIn®)
- **Ownership:** SWX:IBM

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 38% Mid-Market, 32% Enterprise


#### Pros & Cons

**Pros:**

- Monitoring (36 reviews)
- Reliability (32 reviews)
- Real-time Monitoring (26 reviews)
- Dashboard Customization (22 reviews)
- Dashboard Features (22 reviews)

**Cons:**

- Learning Curve (26 reviews)
- Difficult Learning (24 reviews)
- Complex Setup (22 reviews)
- Complexity (21 reviews)
- Complex Configuration (19 reviews)

  ### 3. [Datadog](https://www.g2.com/products/datadog/reviews)
  Datadog is the monitoring, security and analytics platform for developers, IT operations teams, security engineers and business users in the cloud age. The SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of our customers&#39; entire technology stack. Datadog is used by organizations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behavior and track key business metrics.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 688

**User Satisfaction Scores:**

- **Anomaly Detection:** 8.0/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 8.5/10 (Category avg: 8.8/10)
- **Network Visibility:** 8.0/10 (Category avg: 8.9/10)
- **Metadata Management:** 6.7/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [Datadog](https://www.g2.com/sellers/datadog)
- **Company Website:** https://www.datadoghq.com/
- **Year Founded:** 2010
- **HQ Location:** New York
- **Twitter:** @datadoghq (50,828 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1066442/ (10,625 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, DevOps Engineer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 47% Mid-Market, 33% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (145 reviews)
- Monitoring (144 reviews)
- Real-time Monitoring (122 reviews)
- Features (93 reviews)
- Analytics (88 reviews)

**Cons:**

- Expensive (92 reviews)
- Learning Curve (73 reviews)
- Pricing Issues (71 reviews)
- Cost (65 reviews)
- Learning Difficulty (56 reviews)

  ### 4. [Arista NDR](https://www.g2.com/products/arista-ndr/reviews)
  Arista NDR is the only advanced network traffic analysis company that delivers a privacy-aware solution capable of detecting and visualizing behavioral, mal-intent and compliance incidents with full forensics context. Powered by Ava, Arista&#39;s security expert system, the Arista NDR Platform combines federated machine learning, threat intelligence and human expertise. The platform analyzes billions of communications to autonomously discover, profile and classify every device, user and application on any network. Through automated hunting and investigation, Arista NDR uncovers malicious intent from insiders and external attackers alike. The company is ranked #1 for time to value because of its frictionless approach that delivers answers rather than alerts.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 21

**User Satisfaction Scores:**

- **Anomaly Detection:** 8.9/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 8.8/10)
- **Network Visibility:** 8.3/10 (Category avg: 8.9/10)
- **Metadata Management:** 8.8/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [Arista Networks](https://www.g2.com/sellers/arista-networks-39d4d864-54b5-4f9b-bebc-dc5cf72757ca)
- **Year Founded:** 2004
- **HQ Location:** Santa Clara, US
- **Twitter:** @arista_channels (2,448 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/80069/ (5,422 employees on LinkedIn®)
- **Ownership:** NYSE:ANET

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 38% Mid-Market, 38% Small-Business


  ### 5. [Palo Alto Cortex XSIAM](https://www.g2.com/products/palo-alto-cortex-xsiam/reviews)
  Product Description: Palo Alto Networks&#39; Cortex XSIAM is an AI-driven security operations platform designed to transform traditional Security Operations Centers by integrating and automating key functions such as data centralization, threat detection, and incident response. By leveraging machine learning and automation, it enables organizations to detect and respond to threats more efficiently, reducing manual workloads and improving overall security posture. Key Features and Functionality: - Data Centralization: Aggregates data from various sources into a unified platform, providing comprehensive visibility across the enterprise. - AI-Powered Threat Detection: Utilizes machine learning algorithms to identify anomalies and potential threats in real-time. - Automated Incident Response: Streamlines response processes through automation, enabling rapid mitigation of security incidents. - Integrated SOC Capabilities: Combines functions such as Extended Detection and Response , Security Orchestration, Automation, and Response , Attack Surface Management , and Security Information and Event Management into a cohesive platform, eliminating the need for multiple disparate tools. - Scalability: Designed to handle large volumes of data and adapt to the evolving needs of modern enterprises. Primary Value and Problem Solved: Cortex XSIAM addresses the challenges of disjointed data, weak threat defense, and heavy reliance on manual work in traditional SOCs. By centralizing data and automating security operations, it simplifies processes, enhances threat detection accuracy, and accelerates incident response times. This transformation enables organizations to proactively outpace threats, reduce operational costs, and achieve a more robust security posture.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 404

**User Satisfaction Scores:**

- **Anomaly Detection:** 8.7/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 8.6/10 (Category avg: 8.8/10)
- **Network Visibility:** 8.9/10 (Category avg: 8.9/10)
- **Metadata Management:** 8.6/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [Palo Alto Networks](https://www.g2.com/sellers/palo-alto-networks)
- **Year Founded:** 2005
- **HQ Location:** Santa Clara, CA
- **Twitter:** @PaloAltoNtwks (128,510 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/30086/ (21,355 employees on LinkedIn®)
- **Ownership:** NYSE: PANW

**Reviewer Demographics:**
  - **Who Uses This:** Cyber Security Analyst, SOC Analyst
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 52% Enterprise, 29% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (50 reviews)
- Threat Detection (37 reviews)
- Integrations (28 reviews)
- Cybersecurity (27 reviews)
- Features (27 reviews)

**Cons:**

- Expensive (28 reviews)
- Difficult Learning (17 reviews)
- Complexity (14 reviews)
- Integration Issues (14 reviews)
- UX Improvement (12 reviews)

  ### 6. [InsightIDR](https://www.g2.com/products/insightidr/reviews)
  Rapid7 InsightIDR is a SaaS SIEM for modern threat detection and response. InsightIDR enables security analysts to work more efficiently and effectively, by unifying diverse data sources, providing early and reliable out of the box detections, and delivering rich visual investigations and automation to expedite response. With a lightweight cloud deployment and intuitive UI and onboarding experience, InsightIDR customers recognize an accelerated return on their investment and start seeing valuable insights from Day 1. With InsightIDR, teams can advance their threat detection and response program without adding headcount.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 66

**User Satisfaction Scores:**

- **Anomaly Detection:** 8.0/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 8.8/10)
- **Network Visibility:** 9.0/10 (Category avg: 8.9/10)
- **Metadata Management:** 8.3/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [Rapid7](https://www.g2.com/sellers/rapid7)
- **Year Founded:** 2000
- **HQ Location:** Boston, MA
- **Twitter:** @rapid7 (123,965 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/39624/ (3,249 employees on LinkedIn®)
- **Ownership:** NASDAQ:RPD

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 66% Mid-Market, 32% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (2 reviews)
- Easy Integrations (2 reviews)
- Integrations (2 reviews)
- Threat Detection (2 reviews)
- Visibility (2 reviews)

**Cons:**

- Limited Features (2 reviews)
- Alerting Issues (1 reviews)
- Alert Management (1 reviews)
- Difficult Customization (1 reviews)
- Difficult Setup (1 reviews)

  ### 7. [FortiAnalyzer](https://www.g2.com/products/fortianalyzer/reviews)
  FortiAnalyzer is a comprehensive security operations platform designed to streamline and enhance the efficiency of security teams. By integrating Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) capabilities, it provides centralized logging, reporting, and real-time threat intelligence. This unified approach enables organizations to proactively identify and remediate risks, ensuring complete visibility across the entire attack surface. Key Features and Functionality: - Centralized Logging and Reporting: Aggregates logs from multiple Fortinet devices, offering a consolidated view of network activity. - Advanced Threat Detection: Utilizes AI-driven automation to detect and respond to threats swiftly, reducing the need for extensive personnel or multiple security tools. - Scalable Data Lake: Supports large-scale data ingestion and storage, accommodating the needs of growing organizations. - Real-Time Threat Intelligence: Integrates with global Indicators of Compromise (IOC) feeds to provide actionable analytics and insights into emerging threats. - Automated Incident Response: Employs SOAR capabilities to automate response workflows, minimizing manual intervention and accelerating remediation processes. Primary Value and User Solutions: FortiAnalyzer empowers resource-constrained security teams to operate at the level of large, well-resourced operations without the associated complexity. By consolidating multiple security functions into a single platform, it reduces operational overhead, enhances threat detection and response times, and provides comprehensive visibility into network security. This holistic approach enables organizations to effectively manage hybrid environments, mitigate risks, and maintain compliance with industry standards.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 28

**User Satisfaction Scores:**

- **Anomaly Detection:** 8.4/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 8.5/10 (Category avg: 8.8/10)
- **Network Visibility:** 9.2/10 (Category avg: 8.9/10)
- **Metadata Management:** 8.3/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [Fortinet](https://www.g2.com/sellers/fortinet)
- **Year Founded:** 2000
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @Fortinet (151,247 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6460/ (16,112 employees on LinkedIn®)
- **Ownership:** NASDAQ: FTNT

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 47% Enterprise, 37% Mid-Market


#### Pros & Cons

**Pros:**

- Log Management (2 reviews)
- Analysis (1 reviews)
- Data Visualization (1 reviews)
- Easy Integrations (1 reviews)
- Network Security (1 reviews)

**Cons:**

- Complex Interface (1 reviews)
- Complexity (1 reviews)
- Difficult Learning (1 reviews)
- Integration Issues (1 reviews)
- UI Design (1 reviews)

  ### 8. [Progress WhatsUp Gold](https://www.g2.com/products/progress-whatsup-gold/reviews)
  WhatsUp Gold is an IT infrastructure monitoring software designed to help users identify and resolve network issues swiftly, often before they impact end users. This solution provides comprehensive visibility into network performance and availability, enabling IT professionals to maintain optimal operations across their infrastructure. With its interactive mapping interface, WhatsUp Gold allows users to visualize the status of all devices connected to their network, making it easier to monitor both on-premise and cloud-based resources. Targeted primarily at IT administrators and network engineers, WhatsUp Gold is particularly beneficial for organizations that rely heavily on network performance for their daily operations. Its user-friendly design caters to both seasoned professionals and those new to network management, offering a range of features that streamline the monitoring process. The software is designed to support various use cases, from small businesses needing basic monitoring capabilities to large enterprises requiring advanced network management solutions. One of the standout features of WhatsUp Gold is its customizable drag-and-drop dashboards, which provide users with the flexibility to tailor their monitoring experience according to specific needs. These dashboards present real-time data on device status and performance, allowing users to quickly assess the health of their network. Additionally, the software’s automatic discovery and mapping capabilities enable users to visualize their entire network topology, ensuring that no device goes unnoticed during monitoring. WhatsUp Gold also emphasizes optimization, helping users manage network traffic and bandwidth utilization effectively. By providing actionable insights and unified views of network performance, the software empowers IT teams to troubleshoot issues efficiently. The ability to identify and resolve network and server problems proactively not only enhances operational efficiency but also improves overall user satisfaction by minimizing downtime. In summary, WhatsUp Gold offers a robust and interactive solution for IT infrastructure monitoring, combining ease of use with powerful features. Its focus on real-time visibility, customization, and proactive troubleshooting makes it a valuable tool for organizations looking to enhance their network management capabilities.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 381

**User Satisfaction Scores:**

- **Anomaly Detection:** 8.2/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 8.8/10)
- **Network Visibility:** 8.7/10 (Category avg: 8.9/10)
- **Metadata Management:** 8.2/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [Progress Software](https://www.g2.com/sellers/progress-software)
- **Company Website:** https://www.progress.com/
- **Year Founded:** 1981
- **HQ Location:** Burlington, MA.
- **Twitter:** @ProgressSW (48,823 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/progress-software/ (4,205 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Network Engineer, Network Administrator
  - **Top Industries:** Information Technology and Services, Education Management
  - **Company Size:** 57% Mid-Market, 26% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (47 reviews)
- Monitoring (44 reviews)
- Monitoring Performance (35 reviews)
- Alert Notifications (31 reviews)
- User Interface (30 reviews)

**Cons:**

- Expensive (16 reviews)
- Poor Interface Design (15 reviews)
- Complex Setup (14 reviews)
- Learning Curve (14 reviews)
- Outdated Interface (14 reviews)

  ### 9. [Darktrace / NETWORK](https://www.g2.com/products/darktrace-network/reviews)
  Darktrace / NETWORK™ is the industry’s most advanced Network Detection and Response (NDR) solution. It learns what normal behavior is for your entire modern network, using Self-Learning AI to detect and autonomously contain any activity that could cause business disruption including known, novel and insider threats. - Sophisticated agentic AI to automate triage and investigation at speed and scale - Recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for NDR - Over 10,000 customers globally


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 42

**User Satisfaction Scores:**

- **Anomaly Detection:** 9.2/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 8.8/10)
- **Network Visibility:** 9.6/10 (Category avg: 8.9/10)
- **Metadata Management:** 9.2/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [Darktrace](https://www.g2.com/sellers/darktrace)
- **Company Website:** https://www.darktrace.com
- **Year Founded:** 2013
- **HQ Location:** Cambridgeshire, England
- **Twitter:** @Darktrace (18,176 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/5013440/ (2,548 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 60% Mid-Market, 31% Enterprise


#### Pros & Cons

**Pros:**

- Monitoring (5 reviews)
- Artificial Intelligence (4 reviews)
- Threat Detection (4 reviews)
- Customer Support (3 reviews)
- Cybersecurity (3 reviews)

**Cons:**

- Learning Curve (6 reviews)
- Expensive (4 reviews)
- Alert Issues (2 reviews)
- Complex Setup (2 reviews)
- False Positives (2 reviews)

  ### 10. [Faddom](https://www.g2.com/products/faddom/reviews)
  Faddom provides IT and cyber teams with complete, real-time visibility into their hybrid infrastructure through agentless Application Dependency Mapping (ADM). With automated discovery and continuous mapping, organizations get precise, actionable insights into servers, applications, and interdependencies in under 60 minutes. Accurate, live documentation enables efficient change management, migration planning, stronger cybersecurity, compliance, and cost optimization. Built for speed, accuracy, and security, Faddom reduces complexity and risks while giving IT teams full command of their infrastructure. Deploy fast. Scale effortlessly. Own your topology.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 103

**User Satisfaction Scores:**

- **Anomaly Detection:** 7.7/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 8.8/10)
- **Network Visibility:** 9.3/10 (Category avg: 8.9/10)
- **Metadata Management:** 7.2/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [Faddom](https://www.g2.com/sellers/faddom)
- **Company Website:** https://faddom.com/
- **Year Founded:** 2022
- **HQ Location:** Tel Aviv
- **Twitter:** @faddommapping (55 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/getfaddom/ (65 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Hospital &amp; Health Care
  - **Company Size:** 45% Enterprise, 41% Mid-Market


#### Pros & Cons

**Pros:**

- Features (15 reviews)
- Tracking (14 reviews)
- Customer Support (13 reviews)
- Ease of Use (13 reviews)
- Integrations (10 reviews)

**Cons:**

- Learning Difficulty (4 reviews)
- Limited Features (4 reviews)
- Cost (3 reviews)
- Integration Issues (3 reviews)
- Learning Curve (3 reviews)

  ### 11. [Coralogix](https://www.g2.com/products/coralogix/reviews)
  Coralogix is a modern, full-stack observability platform transforming how businesses process and understand their data. Our unique architecture powers in-stream analytics without reliance on indexing or hot storage. We specialize in comprehensive monitoring of logs, metrics, trace and security events, enhancing operational efficiency and reducing total cost of ownership by up to 70%. Coralogix stands out for its simple pricing model, based solely on data volume ingested and retained, and offers free, fast customer support with less than 30 second response time and 1 hour resolution time. Our platform covers the entire range of observability with features such as APM, RUM, SIEM, Kubernetes monitoring and more, all streamlined for quick integration and immediate value. Components within the stream store the system state to provide stateful insights and real-time alerting without ever needing to index the data — so there are never any trade-offs to achieve observability. Once ingested, parsed, and enriched, data is written remotely to an archive bucket controlled by the client. The archive can be queried directly at any time, from the platform UI or via CLI, giving users infinite retention with full control over, and access to, their data. View and query your data from any dashboard using any syntax. Coralogix has successfully completed relevant security and privacy compliances by BDO including GDPR, SOC 2, PCI, HIPAA, and ISO 27001/27701.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 342

**User Satisfaction Scores:**

- **Anomaly Detection:** 8.7/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 8.8/10)
- **Network Visibility:** 8.5/10 (Category avg: 8.9/10)
- **Metadata Management:** 8.0/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [Coralogix](https://www.g2.com/sellers/coralogix)
- **Company Website:** https://www.coralogix.com
- **Year Founded:** 2014
- **HQ Location:** San Francisco, CA
- **Twitter:** @Coralogix (4,074 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3763125/ (583 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, DevOps Engineer
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 53% Mid-Market, 34% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (82 reviews)
- Log Management (70 reviews)
- Customer Support (65 reviews)
- Real-time Monitoring (57 reviews)
- User Interface (57 reviews)

**Cons:**

- Learning Curve (25 reviews)
- Missing Features (25 reviews)
- Difficult Learning (24 reviews)
- Slow Performance (24 reviews)
- Learning Difficulty (22 reviews)

  ### 12. [ExtraHop](https://www.g2.com/products/extrahop/reviews)
  ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance management uniquely delivers the instant visibility and unparalleled decryption capabilities organizations need to expose the cyber risks and performance issues that other tools can’t see. When organizations have full network transparency with ExtraHop, they can investigate smarter, stop threats faster, and keep operations running. RevealX deploys on premises or in the cloud. It addresses the following use cases: - Ransomware - Zero trust - Software supply chain attacks - Lateral movement and C2 communication - Security hygiene - Network and Application Performance Management - IDS - Forensics and more A few of our differentiators: Continuous and on-demand PCAP: Full packet processing is superior to NetFlow and yields higher quality detections. Strategic decryption across a variety of protocols, including SSL/TLS, MS-RPC, WinRM, and SMBv3, gives you better visibility into early-stage threats hiding in encrypted traffic as they attempt to move laterally across your network. Protocol coverage: RevealX decodes more than 70 network protocols. Cloud-scale machine learning: Rather than relying on limited &quot;on-box&quot; compute power for analysis and detections, RevealX uses sophisticated cloud-hosted and cloud-scale machine learning workloads to identify suspicious behavior in real time and create high-fidelity alerts. ExtraHop was named a Leader in The Forrester Wave™: Network Analysis and Visibility, Q2 2023. Key Technology Integration and Go-to-Market Partners: CrowdStrike: RevealX integrates with CrowdStrike Falcon® LogScale, Falcon Insight XDR, Falcon Threat Graph, and Falcon Intelligence. Splunk SOAR AWS Google Cloud Security Founded in 2007, ExtraHop is privately held and headquartered in Seattle, Wash. To learn more, visit www.extrahop.com.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 68

**User Satisfaction Scores:**

- **Anomaly Detection:** 9.0/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 8.8/10)
- **Network Visibility:** 9.3/10 (Category avg: 8.9/10)
- **Metadata Management:** 8.0/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [ExtraHop Networks](https://www.g2.com/sellers/extrahop-networks)
- **Year Founded:** 2007
- **HQ Location:** Seattle, Washington
- **Twitter:** @ExtraHop (10,733 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/extrahop-networks/ (800 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Hospital &amp; Health Care, Transportation/Trucking/Railroad
  - **Company Size:** 69% Enterprise, 26% Mid-Market


#### Pros & Cons

**Pros:**

- All-in-One Solution (1 reviews)
- Comprehensive Monitoring (1 reviews)
- Easy Deployment (1 reviews)
- Responsive Support (1 reviews)


  ### 13. [SolarWinds Observability](https://www.g2.com/products/solarwinds-worldwide-llc-solarwinds-observability/reviews)
  SolarWinds® Observability is a comprehensive full-stack observability solution designed to meet the diverse needs of modern organizations, regardless of their size. This solution provides deep visibility into hybrid ecosystems, enabling users to monitor and manage both on-premises and cloud environments effectively. By optimizing performance and ensuring availability across distributed hybrid IT infrastructures, SolarWinds Observability supports organizations in navigating the complexities of their IT environments. Targeted at IT professionals and organizations that require robust monitoring capabilities, SolarWinds Observability caters to a wide range of use cases. It is particularly beneficial for businesses operating in hybrid environments, where the integration of on-premises and cloud resources is essential. The solution allows users to gain a holistic view of their networks, applications, databases, and user experiences, thereby facilitating better decision-making and operational efficiency. This is especially crucial in today’s fast-paced digital landscape, where downtime can significantly impact service reliability and customer satisfaction. One of the standout features of SolarWinds Observability is its built-in intelligence powered by AIOps capabilities. This functionality accelerates issue remediation by enabling users to detect, troubleshoot, and resolve problems more efficiently. The advanced predictive analysis and anomaly-based alerts help organizations proactively address potential issues before they escalate, ultimately reducing downtime and enhancing service reliability. Additionally, the solution&#39;s log pattern analysis further streamlines the troubleshooting process, allowing IT teams to focus on strategic initiatives rather than being bogged down by operational challenges. SolarWinds Observability offers flexibility in deployment, providing users with the option to choose between self-hosted and SaaS models. The self-hosted option integrates seamlessly with other SolarWinds services, such as security and storage monitoring, while the SaaS option is tailored for deeper monitoring of custom and cloud-based applications. This adaptability ensures that organizations can select the deployment method that best aligns with their operational needs and infrastructure. Moreover, SolarWinds Observability stands out by consolidating multiple monitoring tools into a single, integrated solution. This not only simplifies the monitoring process but also helps organizations reduce costs associated with managing disparate systems. By offering comprehensive visibility across hybrid IT environments, SolarWinds Observability empowers organizations to optimize their operations and enhance overall performance.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 779

**User Satisfaction Scores:**

- **Anomaly Detection:** 7.6/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 8.8/10)
- **Network Visibility:** 9.1/10 (Category avg: 8.9/10)
- **Metadata Management:** 7.4/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [SolarWinds Worldwide LLC](https://www.g2.com/sellers/solarwinds-worldwide-llc)
- **Company Website:** https://www.solarwinds.com
- **Year Founded:** 1999
- **HQ Location:** Austin, TX
- **Twitter:** @solarwinds (19,608 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/166039/ (2,818 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Network Engineer, Network Administrator
  - **Top Industries:** Information Technology and Services, Hospital &amp; Health Care
  - **Company Size:** 45% Enterprise, 37% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (64 reviews)
- Monitoring (63 reviews)
- Monitoring Performance (55 reviews)
- Monitoring Capabilities (51 reviews)
- User Interface (41 reviews)

**Cons:**

- Expensive (35 reviews)
- Learning Curve (21 reviews)
- Integration Issues (20 reviews)
- Complex Setup (19 reviews)
- Configuration Difficulty (18 reviews)

  ### 14. [Kentik](https://www.g2.com/products/kentik/reviews)
  Kentik is the network observability company. Our platform is a must-have for the network front line for companies that depend on a highly performant network. Network and cloud professionals turn to Kentik to plan, run, and fix any network, relying on our granularity, AI-driven insights, and insanely fast search. Kentik makes sense of network, cloud, host, and container flow, internet routing, DDoS defense, performance tests, and network metrics.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 23

**User Satisfaction Scores:**

- **Anomaly Detection:** 9.1/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 8.8/10)
- **Network Visibility:** 9.6/10 (Category avg: 8.9/10)
- **Metadata Management:** 8.5/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [Kentik](https://www.g2.com/sellers/kentik)
- **Year Founded:** 2014
- **HQ Location:** San Francisco, CA
- **Twitter:** @kentikinc (9,454 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/kentik (251 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Telecommunications, Internet
  - **Company Size:** 39% Enterprise, 35% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (2 reviews)
- Insightful Analysis (2 reviews)
- Dashboard Features (1 reviews)
- Easy Implementation (1 reviews)
- Management Ease (1 reviews)

**Cons:**

- Data Limitations (1 reviews)
- Difficult Learning (1 reviews)
- Learning Curve (1 reviews)

  ### 15. [Wireshark](https://www.g2.com/products/wireshark/reviews)
  Wireshark is a open-source network protocol analyzer that enables users to capture and interactively examine the traffic traversing a computer network. It provides deep insights into network communications, making it an essential tool for network troubleshooting, analysis, software and protocol development, and educational purposes. Wireshark is cross-platform, running on Windows, macOS, Linux, and various UNIX systems. Key Features and Functionality: - Comprehensive Protocol Support: Wireshark offers deep inspection of hundreds of protocols, with new ones continually being added. - Live Capture and Offline Analysis: Users can capture live network data or analyze previously saved capture files. - Multi-Platform Compatibility: The software operates on multiple platforms, including Windows, Linux, macOS, FreeBSD, and NetBSD. - Advanced Display Filters: Wireshark provides powerful display filters, allowing users to focus on specific traffic patterns. - Rich VoIP Analysis: It includes tools for analyzing Voice over IP (VoIP) communications. - Support for Various Capture File Formats: Wireshark can read and write numerous capture file formats, such as tcpdump (libpcap), Pcap NG, and others. - Decryption Capabilities: The tool supports decryption for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2. - Customizable Coloring Rules: Users can apply coloring rules to the packet list for quick, intuitive analysis. Primary Value and Problem Solving: Wireshark addresses the critical need for in-depth network analysis by providing a detailed view of network traffic at a microscopic level. This capability is invaluable for network professionals, security experts, developers, and educators who require precise insights into network behavior. By facilitating the identification and resolution of network issues, Wireshark enhances network performance, security, and reliability. Its open-source nature ensures continuous improvement and adaptability to emerging networking technologies and protocols.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 142

**User Satisfaction Scores:**

- **Anomaly Detection:** 6.1/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 8.2/10 (Category avg: 8.8/10)
- **Network Visibility:** 9.2/10 (Category avg: 8.9/10)
- **Metadata Management:** 7.2/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [Wireshark](https://www.g2.com/sellers/wireshark)
- **HQ Location:** San Francisco, CA
- **Twitter:** @WiresharkNews (16,172 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/wireshark-foundation/about (15 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Network Engineer, Senior Software Engineer
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 40% Enterprise, 32% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (7 reviews)
- Insightful Analysis (5 reviews)
- Easy Monitoring (3 reviews)
- Monitoring (3 reviews)
- Reliability (3 reviews)

**Cons:**

- Display Issues (3 reviews)
- Difficult Learning (2 reviews)
- Learning Curve (2 reviews)
- Missing Features (2 reviews)
- Slow Performance (2 reviews)

  ### 16. [Cisco Secure Network Analytics](https://www.g2.com/products/cisco-secure-network-analytics/reviews)
  Stealthwatch is the only solution that detects threats across your private network, public clouds, and even in encrypted traffic.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 31

**User Satisfaction Scores:**

- **Anomaly Detection:** 9.3/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 8.8/10)
- **Network Visibility:** 9.4/10 (Category avg: 8.9/10)
- **Metadata Management:** 8.8/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [Cisco](https://www.g2.com/sellers/cisco)
- **Year Founded:** 1984
- **HQ Location:** San Jose, CA
- **Twitter:** @Cisco (720,884 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cisco/ (95,742 employees on LinkedIn®)
- **Ownership:** NASDAQ:CSCO

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 52% Enterprise, 33% Small-Business


  ### 17. [Kaspersky Anti Targeted Attack](https://www.g2.com/products/kaspersky-anti-targeted-attack/reviews)
  A comprehensive anti-APT solution that protects against sophisticated cyberthreats, offering network sandbox, advanced NDR and EDR capabilities. By covering the main attack entry points at both network and endpoint levels, Kaspersky Anti Targeted Attack ensures fully-fledged visibility across your entire IT infrastructure and total defense against complex threats. • Comprehensive security platform that secures multiple potential threat entry points at network and endpoint levels providing complete visibility over your corporate IT infrastructure. • Advanced integrated sandbox that safely analyzes suspicious objects from web traffic, emails, network and endpoints in an isolated environment, without risking the network. • Rich integration capabilities with Kaspersky and third party solutions, such as email security, XDR, SIEM, MDR, EPP and other security tools. • Real-time access to Threat Intelligence based on Kaspersky&#39;s high level of expertise of nearly 30 years of experience, deep knowledge of malicious attacks, APT campaigns, regular research, publications and collaboration with international organizations.


  **Average Rating:** 3.6/5.0
  **Total Reviews:** 14

**User Satisfaction Scores:**

- **Anomaly Detection:** 7.4/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 7.2/10 (Category avg: 8.8/10)
- **Network Visibility:** 8.2/10 (Category avg: 8.9/10)
- **Metadata Management:** 7.4/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [Kaspersky](https://www.g2.com/sellers/kaspersky-bce2dc7f-2586-4e87-96da-114de2c40584)
- **Year Founded:** 1997
- **HQ Location:** Moscow
- **Twitter:** @kasperskylabind (1,293 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/kaspersky/ (4,494 employees on LinkedIn®)
- **Phone:** 1-866-328-5700

**Reviewer Demographics:**
  - **Company Size:** 43% Small-Business, 36% Mid-Market


#### Pros & Cons

**Pros:**

- Analysis (1 reviews)
- Integrations (1 reviews)
- Reliability (1 reviews)
- Scalability (1 reviews)
- Threat Detection (1 reviews)

**Cons:**

- Expensive (1 reviews)
- Not User-Friendly (1 reviews)

  ### 18. [Trellix Network Detection and Response (NDR)](https://www.g2.com/products/trellix-network-detection-and-response-ndr/reviews)
  Trellix NDR delivers extended visibility, multi-layered threat detection and accelerated investigation and response into network traffic across each stage of the MITRE ATT&amp;CK framework – spanning data centers, hybrid cloud environments, branch offices, and corporate campuses.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 64

**User Satisfaction Scores:**

- **Anomaly Detection:** 6.7/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 8.2/10 (Category avg: 8.8/10)
- **Network Visibility:** 6.7/10 (Category avg: 8.9/10)
- **Metadata Management:** 8.3/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [Trellix](https://www.g2.com/sellers/trellix)
- **Year Founded:** 2004
- **HQ Location:** Milpitas, CA
- **Twitter:** @Trellix (241,624 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/44195/ (811 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 36% Mid-Market, 33% Small-Business


  ### 19. [Bitdefender Network Traffic Security Analytics](https://www.g2.com/products/bitdefender-network-traffic-security-analytics/reviews)
  Bitdefender Network Traffic Security Analytics (NTSA is an enterprise security solution designed to detect advanced threats in real-time by analyzing network traffic. Utilizing machine learning, behavior analytics, and insights from Bitdefender&#39;s global threat intelligence, NTSA identifies malicious activities across all network-connected devices, including those unmanaged or lacking endpoint protection. By focusing on network metadata, NTSA provides comprehensive visibility into threat-related activities, enabling organizations to swiftly detect and respond to sophisticated cyber threats. Key Features and Functionality: - Advanced Threat Detection: Employs machine learning and behavior analytics to identify both known and unknown threats in real-time. - Comprehensive Visibility: Monitors all network-connected devices, including IoT and BYOD, regardless of existing security measures. - Automated Incident Triage: Utilizes IntelliTriage to correlate and prioritize security alerts, reducing noise and enhancing incident response efficiency. - Detailed Forensics: Provides in-depth explanations and recommended remediation actions for each security incident to facilitate thorough investigations. - Flexible Deployment: Offers plug-and-play, out-of-band deployment options that focus on traffic metadata for accurate detection of sophisticated malware and Advanced Persistent Threats (APTs. Primary Value and Problem Solved: NTSA addresses the challenge of detecting and responding to advanced cyber threats that often evade traditional security measures. By analyzing network traffic in real-time and applying advanced analytics, NTSA provides organizations with early detection capabilities, comprehensive visibility into network activities, and automated incident triage. This reduces the time to detect breaches, enhances incident response efficiency, and mitigates the risk of data breaches and operational disruptions.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 24

**User Satisfaction Scores:**

- **Anomaly Detection:** 8.5/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 8.8/10)
- **Network Visibility:** 8.3/10 (Category avg: 8.9/10)
- **Metadata Management:** 7.5/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [Bitdefender](https://www.g2.com/sellers/bitdefender)
- **Year Founded:** 2001
- **HQ Location:** Bucuresti, Romania
- **Twitter:** @Bitdefender (113,610 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6825/ (2,317 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 75% Small-Business, 25% Enterprise


  ### 20. [Symantec Network Forensics: Security Analytics](https://www.g2.com/products/symantec-network-forensics-security-analytics/reviews)
  Sophisticated, targeted attacks can take weeks, months or longer to discover and resolve. Incident response teams need tools that quickly uncover the full source and scope of an attack to reduce time-to-resolution, mitigate ongoing risk and further fortify the network. Like a security camera for the network, Blue Coat Security Analytics delivers full network security visibility, advanced network forensics, anomaly detection and real-time content inspection for all network activity. This effectively arms security and incident response teams to identify and detect advanced malware crossing the network and contain zero-day and advanced targeted attacks. A comprehensive record of all network activity lets you conduct swift forensic investigations, perform proactive incident response and resolve breaches in a fraction of the time.


  **Average Rating:** 3.5/5.0
  **Total Reviews:** 11

**User Satisfaction Scores:**

- **Anomaly Detection:** 8.3/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 6.7/10 (Category avg: 8.8/10)
- **Network Visibility:** 9.2/10 (Category avg: 8.9/10)
- **Metadata Management:** 7.5/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (62,960 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Company Size:** 50% Enterprise, 25% Mid-Market


  ### 21. [Flowmon Platform](https://www.g2.com/products/flowmon-platform/reviews)
  Flowmon is a professional NPMD tool for effective network troubleshooting, performance monitoring, capacity planning, encrypted traffic analysis and cloud monitoring. Instead of just the red/green infrastructure status, it helps NetOps teams to understand user experience (UX) while keeping the amount of data noise and analytical work to a minimum. The Flowmon solution is a part of the Progress product portfolio.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 24

**User Satisfaction Scores:**

- **Anomaly Detection:** 7.1/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 7.8/10 (Category avg: 8.8/10)
- **Network Visibility:** 8.8/10 (Category avg: 8.9/10)
- **Metadata Management:** 7.2/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [Progress Software](https://www.g2.com/sellers/progress-software)
- **Year Founded:** 1981
- **HQ Location:** Burlington, MA.
- **Twitter:** @ProgressSW (48,823 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/progress-software/ (4,205 employees on LinkedIn®)
- **Ownership:** NASDAQ:PRGS

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 52% Mid-Market, 24% Small-Business


  ### 22. [B1 Platform by CloudCover](https://www.g2.com/products/b1-platform-by-cloudcover/reviews)
  A network security platform, years in the making, leveraging mathematics to continuously learn, predict, and defend against attacks.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 41

**User Satisfaction Scores:**

- **Anomaly Detection:** 8.8/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 8.8/10)
- **Network Visibility:** 8.2/10 (Category avg: 8.9/10)
- **Metadata Management:** 7.9/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [CloudCover, Inc.](https://www.g2.com/sellers/cloudcover-inc)
- **Year Founded:** 2007
- **HQ Location:** Minneapolis, US
- **LinkedIn® Page:** https://www.linkedin.com/company/1642753 (14 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 40% Mid-Market, 37% Small-Business


  ### 23. [PingIntelligence for APIs](https://www.g2.com/products/pingintelligence-for-apis/reviews)
  PingIntelligence for APIs is an AI-driven security solution designed to protect APIs by identifying and automatically blocking cyberattacks, exposing active APIs, and providing detailed reporting on all API activity. Key Features and Functionality: - Automated Threat Detection and Blocking: Utilizes artificial intelligence to detect and automatically block cyberattacks targeting APIs, ensuring robust protection against unauthorized access and data breaches. - Comprehensive API Discovery: Continuously discovers and monitors all active APIs within the environment, ensuring no API is overlooked and all are secured. - Detailed Analytics and Reporting: Provides in-depth insights into API traffic patterns, user behavior, and potential vulnerabilities, aiding in compliance, audit, and forensic investigations. - Seamless Integration: Designed to integrate with existing API gateways and application server-based API environments, enhancing security without disrupting current operations. Primary Value and Problem Solved: PingIntelligence for APIs addresses the critical need for advanced API security in an era where APIs are increasingly targeted by cyberattacks. By leveraging AI to detect and block threats in real-time, it ensures the integrity and confidentiality of data transmitted through APIs. Additionally, its comprehensive discovery and reporting capabilities provide organizations with the visibility needed to manage and secure their API ecosystems effectively.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 9

**User Satisfaction Scores:**

- **Anomaly Detection:** 9.4/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 8.8/10)
- **Network Visibility:** 7.1/10 (Category avg: 8.9/10)
- **Metadata Management:** 8.9/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [Ping Identity](https://www.g2.com/sellers/ping-identity)
- **Year Founded:** 2002
- **HQ Location:** Denver, CO
- **Twitter:** @pingidentity (42,063 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/21870/ (2,319 employees on LinkedIn®)
- **Phone:** 1.303.468.2900

**Reviewer Demographics:**
  - **Company Size:** 50% Enterprise, 40% Small-Business


  ### 24. [Corelight](https://www.g2.com/products/corelight/reviews)
  Corelight&#39;s Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detection (IDS), and PCAP functionality in a single solution and by providing security analysts with machine learning-assisted investigations and one-click-pivots from prioritized alerts to the evidence needed to investigate and remediate them. Network Detection and Response platforms monitor and analyze network traffic, delivering telemetry into existing SIEM, XDR, or SaaS-based solutions. Corelight’s platform is unique because our detections and visibility engineering are community driven—with continuous content creation from Zeek®, Suricata IDS, and other Intel communities. And our integration with CrowdStrike XDR enables cross platform (EDR+NDR) analytics. This provides you with the most complete network visibility, powerful analytics, and threat hunting capabilities, and accelerates investigation across your entire kill chain. Corelight also delivers a comprehensive suite of network security analytics that help organizations identify more than 75 adversarial TTPs across the MITRE ATT&amp;CK® spectrum including Exfiltration, Command and Control (C2), and Lateral Movement. These detections reveal known and unknown threats via hundreds of unique insights and alerts across machine learning, behavioral analysis, and signature-based approaches. CORELIGHT PRODUCTS + SERVICES Open NDR Platform Appliance, Cloud, Software, Virtual and SaaS Sensors IDS Fleet Manager Investigator Threat Hunting Platform Smart PCAP Corelight Training CERTIFICATIONS FIPS 140-2


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 20

**User Satisfaction Scores:**

- **Anomaly Detection:** 7.9/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 8.8/10)
- **Network Visibility:** 9.8/10 (Category avg: 8.9/10)
- **Metadata Management:** 7.1/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [Corelight](https://www.g2.com/sellers/corelight)
- **Company Website:** https://www.corelight.com/
- **Year Founded:** 2013
- **HQ Location:** San Francisco, CA
- **Twitter:** @corelight_inc (4,214 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/corelight (464 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 50% Enterprise, 50% Mid-Market


#### Pros & Cons

**Pros:**

- Comprehensive Security (2 reviews)
- Cybersecurity (2 reviews)
- Network Security (2 reviews)
- Security (2 reviews)
- Security Features (2 reviews)

**Cons:**

- Complex Coding (2 reviews)
- Complex Configuration (2 reviews)
- Complexity (2 reviews)
- Complex Setup (2 reviews)
- Learning Curve (2 reviews)

  ### 25. [NetFlow Analyzer](https://www.g2.com/products/netflow-analyzer/reviews)
  NetFlow Analyzer utilizes Cisco® NetFlow, IPFIX and compatible netflow-like protocols to help net admins with bandwidth monitoring, deep network traffic investigation, analyses and reporting. By visualizing the traffic by network devices, interfaces, subnets and end users, net admins can better understand bandwidth consumption, traffic trends, applications, host traffic and traffic anomalies. • Monitoring network bandwidth on routers and interfaces; • Monitoring custom traffic on IP subnets and IP subnets groups; • Monitoring end user traffic; • Highlighting traffic structure with top talkers: hosts, services, protocols, conversations, QoS, AS; • Exploring historical data: charts and flow records; • Collecting and analysing Cisco® NetFlow v5 and v9 and standardised IPFIX (exported by devices from Cisco, Juniper, HP and other vendors). This enables companies to optimize their networks and applications, plan network expansion, save time needed for troubleshooting and diagnostics and improve security – in turn considerably lowering company operational costs and increasing network team productivity.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 10

**User Satisfaction Scores:**

- **Anomaly Detection:** 6.1/10 (Category avg: 8.6/10)
- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 8.8/10)
- **Network Visibility:** 8.3/10 (Category avg: 8.9/10)
- **Metadata Management:** 6.7/10 (Category avg: 8.4/10)


**Seller Details:**

- **Seller:** [NetVizura](https://www.g2.com/sellers/netvizura)
- **Year Founded:** 2008
- **HQ Location:** Belgrade, Serbia
- **LinkedIn® Page:** https://www.linkedin.com/company/netvizura---network-monitoring-solutions/ (2 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 50% Mid-Market, 40% Enterprise


#### Pros & Cons

**Pros:**

- All-in-One Solution (1 reviews)
- Reliability (1 reviews)
- Traffic Analysis (1 reviews)
- Visibility (1 reviews)

**Cons:**

- Complex Setup (1 reviews)
- Installation (1 reviews)



## Parent Category

[Network Security Software](https://www.g2.com/categories/network-security)



## Related Categories

- [Network Monitoring Software](https://www.g2.com/categories/network-monitoring)
- [Intrusion Detection and Prevention Systems (IDPS)](https://www.g2.com/categories/intrusion-detection-and-prevention-systems-idps)
- [Network Detection and Response (NDR) Software](https://www.g2.com/categories/network-detection-and-response-ndr)




