Scrutinizer

By Plixer

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at Scrutinizer, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
3.5 out of 5 stars
4 star
0%
3 star
0%
1 star
0%

How would you rate your experience with Scrutinizer?

It's been two months since this profile received a new review
Leave a Review

Scrutinizer Reviews & Product Details

Product Avatar Image

Have you used Scrutinizer before?

Answer a few questions to help the Scrutinizer community

Scrutinizer Reviews (3)

Reviews

Scrutinizer Reviews (3)

3.5
3 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Sean M.
SM
Senior Network Admin
Enterprise (> 1000 emp.)
"Scurtinizer is a top notch Netflow analyzer"
What do you like best about Scrutinizer?

Custom dashboards and reports make a single pane of glass type view for troubleshooting network congestion using netflow. The ability to click on most anything to drill down into details and add filters makes this product a joy to work with. Review collected by and hosted on G2.com.

What do you dislike about Scrutinizer?

There is a bit of a learning curve. It isn't straight forward out of the box and the linux platform does take some cli know how to manage the system. Review collected by and hosted on G2.com.

Verified User in Financial Services
AF
Mid-Market (51-1000 emp.)
"Scrutinizer one of the best flow analyzer tools out there !"
What do you like best about Scrutinizer?

Scrutinizer is able to collect flows from multitude of network devices, we use it for netflow from our RIverbed, Gigamon and Cisco Devices. Its able to provide detailed reports and amazing data, based on the information that it receives Review collected by and hosted on G2.com.

What do you dislike about Scrutinizer?

If you are getting an appliance, you wont have full access to it. Over all great product, but reporting could use some polishing and advance features. Review collected by and hosted on G2.com.

Verified User in Printing
AP
Mid-Market (51-1000 emp.)
"Fails to deliver on big promises"
What do you like best about Scrutinizer?

Once configured, gives a good overview of network activity. Review collected by and hosted on G2.com.

What do you dislike about Scrutinizer?

Confusing interface

Difficult to customize

Virtual Appliance is handicapped compared to physical hardware. Review collected by and hosted on G2.com.

There are not enough reviews of Scrutinizer for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Progress WhatsUp Gold Logo
Progress WhatsUp Gold
4.4
(390)
WhatsUp Gold is unified infrastructure and application monitoring software that gives modern IT teams the ability to monitor their increasingly complex IT environment with a single product.
2
Datadog Logo
Datadog
4.4
(694)
Datadog is a monitoring service for IT, Dev and Ops teams who write and run applications at scale, and want to turn the massive amounts of data produced by their apps, tools and services into actionable insight.
3
SolarWinds Observability Logo
SolarWinds Observability
4.3
(804)
SolarWinds® Hybrid Cloud Observability is a full-stack observability solution designed to integrate data from across IT on-premise and multi-cloud environments. The solution includes built-in intelligence designed to help customers optimize performance, ensure availability, and reduce remediation time across IT infrastructures. It is intended for all organizations and industries. Hybrid Cloud Observability is designed to: - Help users resolve issues quicker with better visibility of the environment - Deliver value across the organization with increased efficiency accruing from proactive responsiveness
4
Check Point Next Generation Firewalls (NGFWs) Logo
Check Point Next Generation Firewalls (NGFWs)
4.5
(578)
Check Point Firewall. The Check Point Firewall Software Blade incorporates all of the power and capability of the revolutionary FireWall-1 solution while adding user identity awareness to provide granular event awareness and policy enforcement.
5
Palo Alto Cortex XSIAM Logo
Palo Alto Cortex XSIAM
4.3
(475)
Product Description: Palo Alto Networks' Cortex XSIAM is an AI-driven security operations platform designed to transform traditional Security Operations Centers by integrating and automating key functions such as data centralization, threat detection, and incident response. By leveraging machine learning and automation, it enables organizations to detect and respond to threats more efficiently, reducing manual workloads and improving overall security posture. Key Features and Functionality: - Data Centralization: Aggregates data from various sources into a unified platform, providing comprehensive visibility across the enterprise. - AI-Powered Threat Detection: Utilizes machine learning algorithms to identify anomalies and potential threats in real-time. - Automated Incident Response: Streamlines response processes through automation, enabling rapid mitigation of security incidents. - Integrated SOC Capabilities: Combines functions such as Extended Detection and Response , Security Orchestration, Automation, and Response , Attack Surface Management , and Security Information and Event Management into a cohesive platform, eliminating the need for multiple disparate tools. - Scalability: Designed to handle large volumes of data and adapt to the evolving needs of modern enterprises. Primary Value and Problem Solved: Cortex XSIAM addresses the challenges of disjointed data, weak threat defense, and heavy reliance on manual work in traditional SOCs. By centralizing data and automating security operations, it simplifies processes, enhances threat detection accuracy, and accelerates incident response times. This transformation enables organizations to proactively outpace threats, reduce operational costs, and achieve a more robust security posture.
6
Coralogix Logo
Coralogix
4.6
(345)
Coralogix is a stateful streaming data platform that provides real-time insights and long-term trend analysis with no reliance on storage or indexing, solving the monitoring challenges of data growth in large scale systems.
7
Wireshark Logo
Wireshark
4.7
(148)
Wireshark is a open-source network protocol analyzer that enables users to capture and interactively examine the traffic traversing a computer network. It provides deep insights into network communications, making it an essential tool for network troubleshooting, analysis, software and protocol development, and educational purposes. Wireshark is cross-platform, running on Windows, macOS, Linux, and various UNIX systems. Key Features and Functionality: - Comprehensive Protocol Support: Wireshark offers deep inspection of hundreds of protocols, with new ones continually being added. - Live Capture and Offline Analysis: Users can capture live network data or analyze previously saved capture files. - Multi-Platform Compatibility: The software operates on multiple platforms, including Windows, Linux, macOS, FreeBSD, and NetBSD. - Advanced Display Filters: Wireshark provides powerful display filters, allowing users to focus on specific traffic patterns. - Rich VoIP Analysis: It includes tools for analyzing Voice over IP (VoIP) communications. - Support for Various Capture File Formats: Wireshark can read and write numerous capture file formats, such as tcpdump (libpcap), Pcap NG, and others. - Decryption Capabilities: The tool supports decryption for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2. - Customizable Coloring Rules: Users can apply coloring rules to the packet list for quick, intuitive analysis. Primary Value and Problem Solving: Wireshark addresses the critical need for in-depth network analysis by providing a detailed view of network traffic at a microscopic level. This capability is invaluable for network professionals, security experts, developers, and educators who require precise insights into network behavior. By facilitating the identification and resolution of network issues, Wireshark enhances network performance, security, and reliability. Its open-source nature ensures continuous improvement and adaptability to emerging networking technologies and protocols.
8
Faddom Logo
Faddom
4.5
(106)
With Faddom, you gain granular visibility of your entire IT environment, mapping your applications, networks and dependencies in real-time. Uniquely, Faddom works without credentials, firewalls or agents. Faddom is completely platform-agnostic and has limitless use-cases from cloud migration to cost optimization.
9
InsightIDR Logo
InsightIDR
4.4
(73)
InsightIDR is designed to reduce risk of breach, detect and respond to attacks, and build effective cybersecurity programs.
10
IBM SevOne Logo
IBM SevOne
4.3
(72)
Unified app-centric visibility across hybrid networks—so you can detect, diagnose, and resolve issues faster across clouds, containers and SD-WAN.
Show More

No Discussions for This Product Yet

Be the first to ask a question and get answers from real users and experts.

Start a discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Scrutinizer