Suggested Categories:

Network Monitoring Software
Network monitoring software is software that tracks and manages the performance, availability, and health of an organization's network infrastructure. These platforms provide real-time monitoring of network devices such as routers, switches, servers, and firewalls to ensure optimal performance and identify potential issues before they impact operations. Network monitoring software typically includes features like alerting, traffic analysis, bandwidth monitoring, and uptime reporting. It helps IT teams detect bottlenecks, security breaches, or failures, allowing them to take corrective action quickly. By providing detailed insights into network traffic and performance, network monitoring software helps ensure smooth network operations, improve efficiency, and minimize downtime.
Network Mapping Software
Network mapping software is a tool used to visualize, analyze, and document the structure and components of a network. It automatically discovers network devices such as routers, switches, firewalls, and servers, mapping their connections and creating a visual representation of the network topology. These platforms often provide real-time network monitoring, traffic analysis, and troubleshooting features, helping IT teams identify issues, optimize performance, and plan for network expansions or upgrades. By creating clear, detailed maps of network architecture, network mapping software improves network management, enhances security, and ensures better resource allocation and fault detection.
Ad Networks
Ad networks are platforms that connect advertisers with publishers to facilitate the buying and selling of ad inventory. They aggregate ad space from various publishers and offer it to advertisers who want to reach targeted audiences. Ad networks use algorithms to match advertisers’ campaigns with available ad space based on factors like audience demographics, interests, and browsing behavior. They help streamline the ad-buying process by managing inventory, optimizing bids, and ensuring ads are delivered efficiently. Popular ad networks include Google AdSense, Media.net, and Amazon's advertising platform, among others.
Network Automation Software
Network automation software helps streamline and manage the configuration, operation, and monitoring of computer networks without requiring manual intervention. By automating routine tasks such as device configuration, network monitoring, traffic management, and fault detection, this software reduces human error, increases efficiency, and ensures network reliability. It enables administrators to define policies and protocols that are automatically applied across the network, making it easier to scale and manage complex infrastructure. Many network automation solutions also offer real-time monitoring and troubleshooting tools, helping to optimize network performance and ensure compliance with security standards. This software is commonly used in large enterprises, data centers, and service providers to enhance the scalability and agility of network operations.
Social Networking Software
Social networking software enables individuals and organizations to create, manage, and engage in online communities, allowing users to share content, communicate, and collaborate. These platforms typically include features like user profiles, messaging, status updates, content sharing, and group discussions, facilitating both personal and professional connections. Social networking software is used for a wide range of purposes, from personal socialization to business networking and marketing. These tools enable users to build networks, interact with others, and discover relevant content through their connections and interests.
Network Troubleshooting Software
Network troubleshooting software enables the optimization of network issue identification through analysis, testing and functional solution implementation.
Network Configuration Software
Network configuration software is designed to automate, manage, and monitor the setup and maintenance of network devices such as routers, switches, firewalls, and access points. It enables IT teams to define configuration policies, apply them consistently, and track changes across complex network infrastructures. These tools help prevent configuration errors, enforce compliance, and reduce downtime by providing centralized visibility and version control. Many platforms integrate with network monitoring and security systems to ensure optimal performance and alignment with corporate policies. By automating routine network management tasks, network configuration software improves efficiency, reliability, and security across enterprise environments.
Network Security Software
Network security software is a type of software that helps protect computers, networks, and data from malicious attacks and unauthorized access. It is typically used by businesses to protect their confidential information and keep systems safe. It can also be used by individuals to protect their personal information and devices from potential threats.
Neural Network Software
Neural network software uses algorithms to simulate the human brain's ability to recognize patterns. It can be used for a variety of purposes, such as image and voice recognition, natural language processing, and decision making. The software is typically composed of a number of layers that contain parameters which are adjusted through training. Finally, it can be applied in various areas such as healthcare, finance, engineering and more.
Software-Defined Networking Solutions
Software-defined networking solutions provide centralized software control of network operations by decoupling the control plane from the data-forwarding plane. These systems allow IT teams to program, automate, and optimize network behavior—such as routing, load balancing, segmentation and security—via APIs rather than manually configuring individual routers and switches. They improve visibility, flexibility and scalability and facilitate hybrid cloud, multi-cloud and dynamic application traffic demands. Many solutions support network services virtualization, policy-based provisioning and real-time analytics to respond faster to business changes. Ultimately, software-defined networking solutions empower organizations to run agile, software-driven networks that can adapt and evolve along with modern applications.
Network Traffic Analysis (NTA) Software
Network traffic analysis (NTA) software tools allow IT security professionals to monitor and analyze network activity in real time. These tools provide visibility into how the network is being used, helping to identify performance issues, bottlenecks, and inefficiencies. The software captures and inspects network traffic, offering insights into bandwidth usage, application performance, and potential security threats. By detecting anomalies and unusual traffic patterns, these tools help prevent data breaches and optimize network performance. Ultimately, the software enhances network visibility, security, and troubleshooting capabilities for IT teams.
Event Networking Software
Event networking software, also known as event matchmaking software, are software applications that event attendees can utilize in order to be connected to other event attendees. Event networking apps and platforms make it easy for people who are attending events to connect with the right attendees, clients, sponsors, and organizations at an event based on shared interests.
Network Management Software
Network management software is software used by organizations to monitor and control their computer networks. It collects data on network performance, identifies potential issues, and allows for remote management of devices. This software often includes features such as network mapping, traffic analysis, and security monitoring. It can be used to optimize network performance, troubleshoot problems, and reduce downtime. Many options are available on the market today from various vendors with varying levels of complexity and functionality.
Network Assessment Tools
Network assessment tools help IT professionals and organizations evaluate the performance, security, and overall health of their IT networks. These tools analyze network traffic, configurations, and hardware to identify vulnerabilities, bottlenecks, or inefficiencies that may impact performance or security. With features like real-time monitoring, automated diagnostics, and reporting, they provide detailed insights into potential risks and areas for optimization. By using these tools, businesses can proactively address issues, ensure compliance with industry standards, and improve the reliability of their network infrastructure. Ultimately, network assessment tools support better network management, enhancing both security and operational efficiency.
Network Discovery Tools
Network discovery tools, also known as network scanners, are software applications that allow users to identify online devices, services and networks on a particular network. They typically do this by using protocols such as ICMP, TCP or UDP to discover the IP addresses associated with those devices. In some cases, they also provide additional information about the discovered devices, such as their operating system and hardware specifications.
Container Networking Software
Container networking software is used to enable communication between containers, clusters, and the outside world. It provides an easy way for developers to create and deploy applications in a secure environment. Common features of container networking software include network isolation, traffic routing, and service discovery.
Network Virtualization Software
Network visualization software is a tool that provides graphical representations of network infrastructures, helping businesses and IT professionals visualize, monitor, and manage their networks. These platforms offer interactive maps and diagrams to illustrate the components of a network, including routers, switches, servers, and devices, as well as how they are interconnected. Network visualization software typically includes features for real-time monitoring, troubleshooting, network traffic analysis, and identifying potential bottlenecks or security vulnerabilities. By providing an intuitive, visual representation of a network's structure and performance, these tools help administrators optimize performance, plan for future capacity, and ensure efficient network management.
Network Visibility Software
Network visibility tools are software tools for monitoring, analyzing, and optimizing network performance by providing comprehensive insights into data traffic, devices, and applications across the network. They enable IT administrators to identify bottlenecks, detect anomalies, and ensure security by capturing and analyzing real-time and historical data.
Retail Media Networks
A retail media network is a platform that connects brands and retailers to consumers through in-store advertising and promotions. These networks utilize digital screens, product displays, and other visual elements to showcase products and special offers to shoppers. Through data analysis and targeted marketing strategies, these networks aim to increase brand awareness and drive sales for both the retailer and the participating brands. Retail media networks can be found in various types of stores, including grocery stores, department stores, and pharmacies. They provide a seamless integration of advertising into the shopping experience for the consumer.
Network Traffic Generators
Network traffic generators, also known as traffic generators or website traffic generators, are tools used to simulate the behavior of network traffic. They are used by network administrators to test the performance, features, and scalability of their networks. Network traffic generators can generate a variety of types of network data including ICMP, UDP, TCP and application layer protocols such as HTTP and FTP. This helps ensure that the network is able to handle normal levels of traffic as well as peak loads. Additionally, they can be used for security testing purposes along with identifying weaknesses or misconfigured elements in a communication system.
View more categories (20) for "networking"
  • 1
    ManageEngine Network Configuration Manager
    Network Configuration Manager is a multi-vendor network change, configuration and compliance management (NCCM) solution for switches, routers, firewalls and other network devices. NCM helps automate and take total control of the entire life cycle of device configuration management. Schedule device configuration backups, track user activity and spot changes by comparing configuration versions all from a centralized web GUI.
    Leader badge
    Starting Price: $238
  • 2
    Portnox Security

    Portnox Security

    Portnox Security

    Portnox CLEAR is the only cloud-native network access control (NAC) solution that unifies essential network and endpoint security capabilities: device discovery, network authentication, access control, network hardware administration, risk mitigation and compliance enforcement. As a cloud service, Portnox CLEAR eliminates the need for on-going maintenance such as upgrades and patches and requires no on-site appliances.
  • 3
    BACKUP EAGLE

    BACKUP EAGLE

    Schmitz RZ Consult GmbH

    BACKUP EAGLE Backup Monitoring, Reporting, Audit & Compliance for IBM Spectrum Protect, IBM Spectrum Protect Plus, DellEMC NetWorker, Veeam, Rubrik, SEP sesam, IBM BRMS, RMAN, CommVault and more. Everything that can be automatically created for your backup environment is provided directly by BACKUP EAGLE®. Reliable detection of missing backups and application servers without any backup. Various analyses about backups and restores, backup clients, backup servers and backup devices. ...
  • 4
    Calico Cloud
    ...It enables organizations of all sizes to protect their cloud workloads and containers, detect threats, achieve continuous compliance, and troubleshoot service issues in real-time across multi-cluster, multi-cloud, and hybrid deployments. Calico Cloud is built on Calico Open Source, the most widely adopted container networking and security solution. Instead of managing a platform for container and Kubernetes security and observability, teams consume it as a managed service for faster analysis, relevant actions, etc.
    Starting Price: $0.05 per node hour
  • 5
    Virima

    Virima

    Virima Inc.

    VIRIMA is a SaaS platform delivering highly automated IT Asset Management (ITAM), IT Service Management (ITSM) and IT Operations Management (ITOM) solutions that are easy and inexpensive to deploy. Through advanced infrastructure discovery and visualization capabilities, VIRIMA links the business processes to the technology and services business rely upon. The innovative automation capabilities of the VIRIMA CMDB deliver insight, control and value to IT organizations large and small,...
    Starting Price: $15,000.00/year
  • 6
    SaltStack

    SaltStack

    SaltStack

    SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure—on-prem, in the cloud, or at the edge. It’s built on a unique and powerful event-driven automation engine that detects events in any system and reacts intelligently to them, making it an extremely effective solution for managing large, complex environments. With the newly launched SecOps offering, SaltStack can detect security vulnerabilities and non-compliant, mis-configured...
  • 7
    Runecast

    Runecast

    Runecast Solutions

    Runecast is an enterprise CNAPP platform that saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It automates vulnerability assessment, configuration drift management and continuous compliance – for VMware, Cloud and Containers. By proactively using our agentless scanning in real-time admins discover potential risks and remediation solutions before any issues can develop into a major outage. It provides...
  • 8
    MedRight

    MedRight

    CareRight Technologies, LLC

    ...Years of product enhancements and new features based on actual community use have resulted in a powerful, fully integrated software suite that users love. MedRight has it all to manage any senior living community, including the ability to work without a network connection in case the internet is down. Modules include marketing (CRM), e-prescribing, inventory, pharmacy integration, care plans, assessments, e-Narcotic logs, ADLs, billing, and resident and staff management. Let MedRight reduce your risk, improve your bottom line, and streamline your operations, while you spend more time with your residents!
    Leader badge
    Starting Price: $5.50/month/resident
    Partner badge
  • 9
    Armis Centrix
    Armis Centrix™ is a comprehensive cyber exposure management platform that provides continuous, real-time visibility and protection across IT, OT, IoT, and IoMT environments. Powered by the Armis AI-driven Asset Intelligence Engine, it identifies every connected device, assesses cyber risk, and monitors vulnerabilities across an organization’s entire digital attack surface. The platform automates risk scoring, streamlines compliance reporting, and supports rapid incident response through deep...
  • 10
    ManageEngine ADAudit Plus
    ADAudit Plus helps keep your Windows Server ecosystem secure and compliant by providing full visibility into all activities. ADAudit Plus provides a clear picture of all changes made to your AD resources including AD objects and their attributes, group policy, and more. AD auditing helps detect and respond to insider threat, privilege misuse, and other indicators of compromise, and in short, strengthens your organization's security posture. Gain granular visibility into everything that...
    Starting Price: $595.00/year
    View Software
    Visit Website
  • 11
    Safefood 360°

    Safefood 360°

    Safefood 360°

    ...New legislation, such as FSMA and continual revisions to GFSI standards, now require food businesses to have near instant identification of all their supply channels and detailed intelligence about its status, – traditional spreadsheets and paper documentation are fading, prohibiting your company from quick and efficient growth. Recently acquired by LGC Group, Safefood 360° is now part of a larger network of brands, including BRCGS, LGC AXIO Proficiency Testing and Informed, all dedicated to providing science for a safer world.
    Leader badge
    Starting Price: $5000
  • 12
    IBM PowerSC
    ...Key features include real-time compliance monitoring, which provides immediate visibility to administrators when system changes violate configuration policy rules; trusted boot, which measures and attests the integrity of the boot image, operating system, and applications using virtual trusted platform module technology; trusted firewall, which ensures appropriate network isolation for virtual machines; trusted logging, which provides tamper-proof logging and convenient log backup and management; and multifactor authentication.
  • 13
    Jocata GRID

    Jocata GRID

    Jocata Financial Advisory & Technology

    ...Our configurable workflow engine brings all key operational stakeholders onto one unique virtual platform for efficient management and monitoring of business processes. From pulling in customer-related information from multiple sources like financial institutions, watchlists, statutory authorities, credit bureaus and social networks, to processing and analyzing it using the latest technologies, and finally, presenting it in the most convenient manner.
    Starting Price: $100,000 per feature per year
  • 14
    ConnectSecure

    ConnectSecure

    ConnectSecure

    ConnectSecure is an all-in-one SaaS vulnerability and compliance management platform built for managed-service providers to secure client environments, manage risk, and scale security services profitably. It performs continuous vulnerability assessments and asset discovery across networks, servers, endpoints, cloud services, web apps, and external infrastructure; it includes both agent-based or “probe/lightweight” scanning and external attack-surface scanning. It identifies open ports, misconfigurations, out-of-date software, exposed systems, cloud-environment risks, and web-application vulnerabilities, surfacing over 230,000 known CVEs, daily updated from public vulnerability databases. ...
  • 15
    Teleport

    Teleport

    Teleport

    ...Teleport is purpose-built for infrastructure use cases and implements trusted computing at scale, with unified cryptographic identities for humans, machines and workloads, endpoints, infrastructure assets, and AI agents. Our identity-everywhere approach vertically integrates access management, zero trust networking, identity governance, and identity security into a single platform, eliminating overhead and operational silos.
  • 16
    Axonius

    Axonius

    Axonius

    Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks....
  • 17
    Silverfort

    Silverfort

    Silverfort

    Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative agentless and proxyless technology, Silverfort seamlessly integrates with all existing IAM solutions (e.g., AD, RADIUS, Azure AD, Okta, Ping, AWS IAM), extending coverage to assets that could not previously have been protected, such as legacy applications, IT infrastructure, file systems, command-line tools, and machine-to-machine access. ...
  • 18
    Paradiso LMS

    Paradiso LMS

    Paradiso Solutions Corporation

    Paradiso LMS is a top-rated eLearning software trusted by corporations, training companies, and educational institutions worldwide. An end-to-end learning management solution. Paradiso LMS lets organizations manage their eLearning effectively through mobile, social, and video technologies. Our LMS offers many features such as gamification for motivating and engaging learners, social learning for collaboration, blended learning, e-commerce, advanced reporting, and more. The platform also...
    Starting Price: $6 per user per month
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB