Suggested Categories:

Network Monitoring Software
Network monitoring software is software that tracks and manages the performance, availability, and health of an organization's network infrastructure. These platforms provide real-time monitoring of network devices such as routers, switches, servers, and firewalls to ensure optimal performance and identify potential issues before they impact operations. Network monitoring software typically includes features like alerting, traffic analysis, bandwidth monitoring, and uptime reporting. It helps IT teams detect bottlenecks, security breaches, or failures, allowing them to take corrective action quickly. By providing detailed insights into network traffic and performance, network monitoring software helps ensure smooth network operations, improve efficiency, and minimize downtime.
Network Mapping Software
Network mapping software is a tool used to visualize, analyze, and document the structure and components of a network. It automatically discovers network devices such as routers, switches, firewalls, and servers, mapping their connections and creating a visual representation of the network topology. These platforms often provide real-time network monitoring, traffic analysis, and troubleshooting features, helping IT teams identify issues, optimize performance, and plan for network expansions or upgrades. By creating clear, detailed maps of network architecture, network mapping software improves network management, enhances security, and ensures better resource allocation and fault detection.
Ad Networks
Ad networks are platforms that connect advertisers with publishers to facilitate the buying and selling of ad inventory. They aggregate ad space from various publishers and offer it to advertisers who want to reach targeted audiences. Ad networks use algorithms to match advertisers’ campaigns with available ad space based on factors like audience demographics, interests, and browsing behavior. They help streamline the ad-buying process by managing inventory, optimizing bids, and ensuring ads are delivered efficiently. Popular ad networks include Google AdSense, Media.net, and Amazon's advertising platform, among others.
Network Automation Software
Network automation software helps streamline and manage the configuration, operation, and monitoring of computer networks without requiring manual intervention. By automating routine tasks such as device configuration, network monitoring, traffic management, and fault detection, this software reduces human error, increases efficiency, and ensures network reliability. It enables administrators to define policies and protocols that are automatically applied across the network, making it easier to scale and manage complex infrastructure. Many network automation solutions also offer real-time monitoring and troubleshooting tools, helping to optimize network performance and ensure compliance with security standards. This software is commonly used in large enterprises, data centers, and service providers to enhance the scalability and agility of network operations.
Social Networking Software
Social networking software enables individuals and organizations to create, manage, and engage in online communities, allowing users to share content, communicate, and collaborate. These platforms typically include features like user profiles, messaging, status updates, content sharing, and group discussions, facilitating both personal and professional connections. Social networking software is used for a wide range of purposes, from personal socialization to business networking and marketing. These tools enable users to build networks, interact with others, and discover relevant content through their connections and interests.
Network Troubleshooting Software
Network troubleshooting software enables the optimization of network issue identification through analysis, testing and functional solution implementation.
Network Configuration Software
Network configuration software is designed to automate, manage, and monitor the setup and maintenance of network devices such as routers, switches, firewalls, and access points. It enables IT teams to define configuration policies, apply them consistently, and track changes across complex network infrastructures. These tools help prevent configuration errors, enforce compliance, and reduce downtime by providing centralized visibility and version control. Many platforms integrate with network monitoring and security systems to ensure optimal performance and alignment with corporate policies. By automating routine network management tasks, network configuration software improves efficiency, reliability, and security across enterprise environments.
Network Security Software
Network security software is a type of software that helps protect computers, networks, and data from malicious attacks and unauthorized access. It is typically used by businesses to protect their confidential information and keep systems safe. It can also be used by individuals to protect their personal information and devices from potential threats.
Neural Network Software
Neural network software uses algorithms to simulate the human brain's ability to recognize patterns. It can be used for a variety of purposes, such as image and voice recognition, natural language processing, and decision making. The software is typically composed of a number of layers that contain parameters which are adjusted through training. Finally, it can be applied in various areas such as healthcare, finance, engineering and more.
Software-Defined Networking Solutions
Software-defined networking solutions provide centralized software control of network operations by decoupling the control plane from the data-forwarding plane. These systems allow IT teams to program, automate, and optimize network behavior—such as routing, load balancing, segmentation and security—via APIs rather than manually configuring individual routers and switches. They improve visibility, flexibility and scalability and facilitate hybrid cloud, multi-cloud and dynamic application traffic demands. Many solutions support network services virtualization, policy-based provisioning and real-time analytics to respond faster to business changes. Ultimately, software-defined networking solutions empower organizations to run agile, software-driven networks that can adapt and evolve along with modern applications.
Network Traffic Analysis (NTA) Software
Network traffic analysis (NTA) software tools allow IT security professionals to monitor and analyze network activity in real time. These tools provide visibility into how the network is being used, helping to identify performance issues, bottlenecks, and inefficiencies. The software captures and inspects network traffic, offering insights into bandwidth usage, application performance, and potential security threats. By detecting anomalies and unusual traffic patterns, these tools help prevent data breaches and optimize network performance. Ultimately, the software enhances network visibility, security, and troubleshooting capabilities for IT teams.
Event Networking Software
Event networking software, also known as event matchmaking software, are software applications that event attendees can utilize in order to be connected to other event attendees. Event networking apps and platforms make it easy for people who are attending events to connect with the right attendees, clients, sponsors, and organizations at an event based on shared interests.
Network Management Software
Network management software is software used by organizations to monitor and control their computer networks. It collects data on network performance, identifies potential issues, and allows for remote management of devices. This software often includes features such as network mapping, traffic analysis, and security monitoring. It can be used to optimize network performance, troubleshoot problems, and reduce downtime. Many options are available on the market today from various vendors with varying levels of complexity and functionality.
Network Assessment Tools
Network assessment tools help IT professionals and organizations evaluate the performance, security, and overall health of their IT networks. These tools analyze network traffic, configurations, and hardware to identify vulnerabilities, bottlenecks, or inefficiencies that may impact performance or security. With features like real-time monitoring, automated diagnostics, and reporting, they provide detailed insights into potential risks and areas for optimization. By using these tools, businesses can proactively address issues, ensure compliance with industry standards, and improve the reliability of their network infrastructure. Ultimately, network assessment tools support better network management, enhancing both security and operational efficiency.
Network Discovery Tools
Network discovery tools, also known as network scanners, are software applications that allow users to identify online devices, services and networks on a particular network. They typically do this by using protocols such as ICMP, TCP or UDP to discover the IP addresses associated with those devices. In some cases, they also provide additional information about the discovered devices, such as their operating system and hardware specifications.
Container Networking Software
Container networking software is used to enable communication between containers, clusters, and the outside world. It provides an easy way for developers to create and deploy applications in a secure environment. Common features of container networking software include network isolation, traffic routing, and service discovery.
Network Virtualization Software
Network visualization software is a tool that provides graphical representations of network infrastructures, helping businesses and IT professionals visualize, monitor, and manage their networks. These platforms offer interactive maps and diagrams to illustrate the components of a network, including routers, switches, servers, and devices, as well as how they are interconnected. Network visualization software typically includes features for real-time monitoring, troubleshooting, network traffic analysis, and identifying potential bottlenecks or security vulnerabilities. By providing an intuitive, visual representation of a network's structure and performance, these tools help administrators optimize performance, plan for future capacity, and ensure efficient network management.
Network Visibility Software
Network visibility tools are software tools for monitoring, analyzing, and optimizing network performance by providing comprehensive insights into data traffic, devices, and applications across the network. They enable IT administrators to identify bottlenecks, detect anomalies, and ensure security by capturing and analyzing real-time and historical data.
Retail Media Networks
A retail media network is a platform that connects brands and retailers to consumers through in-store advertising and promotions. These networks utilize digital screens, product displays, and other visual elements to showcase products and special offers to shoppers. Through data analysis and targeted marketing strategies, these networks aim to increase brand awareness and drive sales for both the retailer and the participating brands. Retail media networks can be found in various types of stores, including grocery stores, department stores, and pharmacies. They provide a seamless integration of advertising into the shopping experience for the consumer.
Network Traffic Generators
Network traffic generators, also known as traffic generators or website traffic generators, are tools used to simulate the behavior of network traffic. They are used by network administrators to test the performance, features, and scalability of their networks. Network traffic generators can generate a variety of types of network data including ICMP, UDP, TCP and application layer protocols such as HTTP and FTP. This helps ensure that the network is able to handle normal levels of traffic as well as peak loads. Additionally, they can be used for security testing purposes along with identifying weaknesses or misconfigured elements in a communication system.
View more categories (20) for "networking"
  • 1
    Atera

    Atera

    Atera

    Atera, the first and only Agentic AI platform for IT management, offers IT teams and MSPs a digital workforce of AI agents to preemptively and autonomously manage their entire IT operations. Its all-in-one platform combines RMM, helpdesk, ticketing, and automation to reduce downtime, improve SLAs, and free IT teams to focus on strategic work over mundane tasks. At the core of Atera’s platform are two powerful AI agents built to enhance every layer of IT operations. AI Copilot helps...
    Leader badge
    Starting Price: 30-DAY FREE TRIAL
    View Software
    Visit Website
  • 2
    NinjaOne

    NinjaOne

    NinjaOne

    NinjaOne unifies IT to simplify work for 35,000+ customers in 140+ countries. The NinjaOne Unified IT Operations Platform delivers endpoint management, autonomous patching, backup, and remote access in a single console to improve efficiency, increase resilience, and reduce spend. By automating IT and managing all endpoints, organizations give employees a great technology experience to work faster, smarter, and easier while IT teams modernize and improve efficiency. NinjaOne is a Leader...
    Leader badge
    View Software
    Visit Website
  • 3
    SuperOps

    SuperOps

    SuperOps

    SuperOps is a future-ready, unified PSA-RMM platform for fast-growing MSPs. Powered with the goodness of AI and intelligent automation, SuperOps is packed with all the features and tools that a modern MSP needs, including project management and IT documentation. MSPs no longer need to toggle between tools to manage different pieces of their work. With SuperOps, MSPs can break free from disjointed, legacy tools and experience a platform that’s built for the cloud and designed to make MSPs’...
    Starting Price: $79/tech/month
  • 4
    Cruz Wireless Controller
    ...--Trigger network health alerts, automate repetitive tasks, simplify live/remote troubleshooting, ensure service availability, and multi-vendor features. --IT departments can simplify deployment and management with a single tool to manage their operations
    Starting Price: $1350
  • 5
    7SIGNAL

    7SIGNAL

    7SIGNAL

    For organizations that rely on mission critical Wi-Fi to conduct business, 7SIGNAL is a cloud-based Wireless Network Monitoring (WNM) platform that continuously tests the wireless network for performance issues – maximizing network uptime, device connectivity and network ROI. Unlike other providers, who monitor the network from the inside-out at the infrastructure level, 7SIGNAL operates on the networks edge, monitoring the “air” and capturing the user experience on the client device. ...
  • 6
    Lightspeed Mobile Device Management
    Lightspeed Mobile Device Management™ equips district IT leaders with a centralized, cloud-based solution for infinitely scalable device, application, and policy controls. Ensure safe and secure management of student learning resources with real-time visibility and reporting essential for effective distance learning. Lightspeed MDM™ makes app management intuitive and flexible with remote configuration and deployment by school, grade, classroom, and student without handling devices. Lessen...
  • 7
    Cruz RMM

    Cruz RMM

    Dorado Software

    ...Dorado Software is a leading provider of resource management, performance monitoring, and service orchestration software to automate cloud operations across converged infrastructure fabrics. Dorado helps operators and IT professionals monitor, configure, and manage converged infrastructures (physical and virtual storage, servers, networking devices), virtualized network functions, and cloud services.
    Starting Price: $1350
  • 8
    N-able N‑central
    Join the thousands of MSPs and IT professionals who use N-able™ N-central® to remotely monitor and manage devices and complex networks. Key features include: • Monitor almost any device, including support for Windows, Linux, and macOS • Gain complete insight across your network and cloud services without the need for extra network monitoring software • Create automated patch management policies to ensure devices are up to date • Streamline your workflow with drag-and-drop scripting in automation manager—no need to write a line of code • Provide remote support across devices and platforms with the integrated Take Control feature • Integrate your existing PSA software or use N-able MSP Manager to manage tickets and billing • Manage security with integrated backup, EDR, AV, and disk encryption • Available as an on-premises or hosted cloud solution to fit your business
  • 9
    Senturo

    Senturo

    Senturo

    ...Monitoring and incident detection Ensure your devices stay where they belong. With geofencing and IP whitelisting, you’ll receive instant email alerts if a device leaves your approved area or connects to an unauthorized network, keeping your assets secure. Multi-OS messaging Send critical updates or alerts to your entire fleet in seconds.
    Starting Price: $25 per month
  • 10
    Falcon Discover

    Falcon Discover

    CrowdStrike

    Falcon Discover allows you to quickly identify and eliminate malicious or noncompliant activity by providing unmatched real-time visibility into the devices, users and applications in your network. Monitor everything from one convenient, powerful dashboard, and quickly dive in to explore applications, accounts and assets using real-time and historical data. Get contextual information for all of your systems instantly, utilizing dashboards, graphs, charts and search functionality to drill down into supporting data. Leverage the single lightweight CrowdStrike Falcon® agent to keep your systems and users free to do their jobs. ...
  • 11
    ConnectWise Automate
    Solve IT problems at the speed of business with ConnectWise Automate. A robust remote monitoring and management (RMM) platform, ConnectWise Automate helps boost the effectiveness of IT teams. It offers teams the ability to discover all devices and users that need to be proactively monitored, remove delivery roadblocks, and support more endpoints without adding headaches or head count.
  • 12
    Goliath Performance Monitor

    Goliath Performance Monitor

    Goliath Technologies

    Goliath Performance Monitor with embedded intelligence and automation enables IT professionals to anticipate, troubleshoot, and document end-user experience issues regardless of where IT workloads or users are located. It focuses on the 3 main areas most likely to cause support tickets to be opened, initiating a logon, the logon process, and in-session performance. Our technology is designed to proactively alert you to end-user experience issues before they happen and if they do give you...
  • 13
    Kaseya 365
    ...These solutions are joined under one subscription, effortlessly integrated, and live within the unified interface experience of IT Complete. Gain access and control over devices and the network. Ensure devices and data are protected from intrusion or corruption. Preserve critical data from loss, theft, or exploitation. Do it all consistently, accurately, and within the constraints of small teams. Reduce vendor fatigue by putting all critical components in one easy-to-understand, acquire, and manage subscription. Experience massive improvements in technician efficiency by leveraging the power of workflow integrations and automation. ...
  • 14
    Ivanti

    Ivanti

    Ivanti

    ...Ivanti’s Enterprise Service Management delivers actionable insights to streamline IT operations and improve employee experiences. The company also provides comprehensive network security and exposure management tools to protect assets and prioritize risks effectively. Trusted by over 34,000 customers worldwide, including Conair and City of Seattle, Ivanti supports secure, flexible work environments. Their solutions enable businesses to boost productivity while maintaining strong security and operational visibility.
  • 15
    Kaseya VSA
    Kaseya VSA is a next-generation remote monitoring and management (RMM) software for Managed Service Providers (MSP) and IT enterprises. With VSA, users get access to the fastest remote control powerful discovery, reliable patch management, and monitoring and security tools in a single solution. Thus, helping to increase IT staff productivity, service reliability, and systems security. A Unified IT Management solution to not only deliver better service but to transform the business. Kaseya’s...
  • 16
    Promisec Endpoint Manager
    ...PEM provides unified visibility and control over what’s running on your endpoints and servers, ensuring that you can respond in near real time to any potential flagged threat. With PEM you get full visibility of every file, registry, process, network connection, third-party product and OS version across the organization. PEM leverages proprietary agentless technology to quickly inspect your entire enterprise, identifying, analyzing, and remediating security gaps. The solution is engineered to run at scale on any network, serving diverse use cases from compliance through cyber.
  • 17
    Meraki Systems Manager
    Cisco Meraki Systems Manager is a cloud-based mobile device management (MDM) solution that enables organizations to remotely secure devices with agility and ease. It integrates endpoint, network, and application security into a single platform, laying the foundation for a zero-trust security model through Meraki and Cisco security integrations. This allows for dynamic access adjustments and enforcement of network security policies based on device compliance. Systems Manager offers intelligent automation, automatically importing configurations from security applications and deploying changes to thousands of devices with minimal effort. ...
  • 18
    Absolute Secure Endpoint

    Absolute Secure Endpoint

    Absolute Software

    Manage and secure your data, devices, and applications with an unbreakable connection to every endpoint — on or off your network. Absolute gives you unparalleled line-of-sight to your devices and data. The self-healing connection keeps critical applications such as SCCM, VPN, antivirus, and encryption present, healthy, and up-to-date. And sensitive data remains protected, even when accessed from outside your network. Maintain complete control of every endpoint, with a comprehensive library of automated, custom workflows — no scripting required. ...
  • 19
    MobileWare

    MobileWare

    MobileWare

    ...Our unique MobileWare Single SIM™ simply and securely connects all endpoints between your customers around the world. When it comes to global IoT connectivity, you need a network that keeps your business connected in the wildest of weather or the most remote locations. And this is why MobileWare exists—to give your business a truly global IoT network connectivity that covers different parts of the earth. Bring your products and services to the market faster, using our secure, scalable mobile IoT connectivity.
  • 20
    VISO MDM/EMM

    VISO MDM/EMM

    Radix Technologies Ltd.

    VISO MDM/EMM enables help desks, IT administrators and project leaders to centrally monitor, manage and support devices wherever they are. Reaching well beyond the local network boundaries, the cloud-based platform delivers a bird’s-eye view of an entire device fleet, enabling administrators to give the best support possible, optimize device performance and make informed decisions. Extend your support umbrella, control capabilities and manage nomadic users’ mobile devices from wherever they are located and operating, both inside and beyond the organization’s network. ...
    Starting Price: $22 per device/year
  • 21
    Hexnode UEM

    Hexnode UEM

    Mitsogo Inc

    Hexnode, the enterprise software division of Mitsogo Inc., is a Unified Endpoint Management solution with cross-platform functionalities. Hexnode supports all major operating systems, including iOS, iPadOS, Android, Windows, macOS, tvOS, Linux, ChromeOS, visionOS, Apple TV, Android TV, and fireOS, and offers out-of-the-box enrollment methods. The entire device lifecycle, starting from enrollment to device retirement, can be monitored and managed from a unified console. Features...
  • 22
    KACE by Quest

    KACE by Quest

    Quest Software

    KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. Discover, manage and secure all your endpoints from one console as you co-manage your traditional and modern endpoints, including Windows, Mac, Linux, ChromeOS, and iOS and Android devices. KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. ...
    Starting Price: As low as $3/mo/device
  • 23
    Adaptiva OneSite Anywhere
    ...OneSite Anywhere combines the world’s most advanced software distribution engine with a new, revolutionary cloud architecture to seamlessly extend the boundaries of the enterprise network to cover the entire internet.
  • 24
    Patchifi

    Patchifi

    Patchifi

    ...Patchifi supports automated software deployment and configuration enforcement across hybrid workforces, enabling silent application installs, targeted rollouts, and consistent policy application regardless of network location.
  • 25
    WinMagic MagicEndpoint
    ...MagicEndpoint ensures that CISOs and cyber security professionals can easily implement passwordless authentication, addressing their cyber security needs, while eliminating password friction and reducing password management costs. MagicEndpoint addresses a growing industry need for precise, strong user authentication while still protecting the data security within devices, servers, and networks.
  • 26
    Automox

    Automox

    Automox

    Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure.
    Starting Price: $3.00
  • 27
    Famoco

    Famoco

    Famoco

    ...Famoco supports diverse industries with tailored tools for biometric identification, contactless payments, logistics tracking, and data management. Their integrated business environment combines software, development tools, and a trusted partner network to help companies streamline operations and deliver services efficiently. With over 750,000 active devices deployed in 160 countries, Famoco brings 15 years of expertise in mobile solution deployments globally.
    Starting Price: $1 per month/device
  • 28
    Chimpa

    Chimpa

    Chimpa

    ...The general role of MDM is to increase the user-friendliness, security and functionality, while maintaining a certain flexibility for the user. Kiosk mode, security functions, blocking, remote initialization. Collection of analytical data on the use of the App and the network.
  • 29
    Heimdal Endpoint Detection and Response (EDR)
    Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines some of the most advanced threat-hunting technologies: - Next-Gen Antivirus - Privileged Access Management - Application Control - Ransomware Encryption Protection - Patch & Asset Management - Email Security - Remote Desktop - Threat Prevention ( DNS based ) - Threat Hunting & Action Center With 9 modules ...
    Leader badge
    Starting Price: $0/month
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB