Suggested Categories:

Network Monitoring Software
Network monitoring software is software that tracks and manages the performance, availability, and health of an organization's network infrastructure. These platforms provide real-time monitoring of network devices such as routers, switches, servers, and firewalls to ensure optimal performance and identify potential issues before they impact operations. Network monitoring software typically includes features like alerting, traffic analysis, bandwidth monitoring, and uptime reporting. It helps IT teams detect bottlenecks, security breaches, or failures, allowing them to take corrective action quickly. By providing detailed insights into network traffic and performance, network monitoring software helps ensure smooth network operations, improve efficiency, and minimize downtime.
Network Mapping Software
Network mapping software is a tool used to visualize, analyze, and document the structure and components of a network. It automatically discovers network devices such as routers, switches, firewalls, and servers, mapping their connections and creating a visual representation of the network topology. These platforms often provide real-time network monitoring, traffic analysis, and troubleshooting features, helping IT teams identify issues, optimize performance, and plan for network expansions or upgrades. By creating clear, detailed maps of network architecture, network mapping software improves network management, enhances security, and ensures better resource allocation and fault detection.
Ad Networks
Ad networks are platforms that connect advertisers with publishers to facilitate the buying and selling of ad inventory. They aggregate ad space from various publishers and offer it to advertisers who want to reach targeted audiences. Ad networks use algorithms to match advertisers’ campaigns with available ad space based on factors like audience demographics, interests, and browsing behavior. They help streamline the ad-buying process by managing inventory, optimizing bids, and ensuring ads are delivered efficiently. Popular ad networks include Google AdSense, Media.net, and Amazon's advertising platform, among others.
Network Automation Software
Network automation software helps streamline and manage the configuration, operation, and monitoring of computer networks without requiring manual intervention. By automating routine tasks such as device configuration, network monitoring, traffic management, and fault detection, this software reduces human error, increases efficiency, and ensures network reliability. It enables administrators to define policies and protocols that are automatically applied across the network, making it easier to scale and manage complex infrastructure. Many network automation solutions also offer real-time monitoring and troubleshooting tools, helping to optimize network performance and ensure compliance with security standards. This software is commonly used in large enterprises, data centers, and service providers to enhance the scalability and agility of network operations.
Social Networking Software
Social networking software enables individuals and organizations to create, manage, and engage in online communities, allowing users to share content, communicate, and collaborate. These platforms typically include features like user profiles, messaging, status updates, content sharing, and group discussions, facilitating both personal and professional connections. Social networking software is used for a wide range of purposes, from personal socialization to business networking and marketing. These tools enable users to build networks, interact with others, and discover relevant content through their connections and interests.
Network Troubleshooting Software
Network troubleshooting software enables the optimization of network issue identification through analysis, testing and functional solution implementation.
Network Configuration Software
Network configuration software is designed to automate, manage, and monitor the setup and maintenance of network devices such as routers, switches, firewalls, and access points. It enables IT teams to define configuration policies, apply them consistently, and track changes across complex network infrastructures. These tools help prevent configuration errors, enforce compliance, and reduce downtime by providing centralized visibility and version control. Many platforms integrate with network monitoring and security systems to ensure optimal performance and alignment with corporate policies. By automating routine network management tasks, network configuration software improves efficiency, reliability, and security across enterprise environments.
Network Security Software
Network security software is a type of software that helps protect computers, networks, and data from malicious attacks and unauthorized access. It is typically used by businesses to protect their confidential information and keep systems safe. It can also be used by individuals to protect their personal information and devices from potential threats.
Neural Network Software
Neural network software uses algorithms to simulate the human brain's ability to recognize patterns. It can be used for a variety of purposes, such as image and voice recognition, natural language processing, and decision making. The software is typically composed of a number of layers that contain parameters which are adjusted through training. Finally, it can be applied in various areas such as healthcare, finance, engineering and more.
Software-Defined Networking Solutions
Software-defined networking solutions provide centralized software control of network operations by decoupling the control plane from the data-forwarding plane. These systems allow IT teams to program, automate, and optimize network behavior—such as routing, load balancing, segmentation and security—via APIs rather than manually configuring individual routers and switches. They improve visibility, flexibility and scalability and facilitate hybrid cloud, multi-cloud and dynamic application traffic demands. Many solutions support network services virtualization, policy-based provisioning and real-time analytics to respond faster to business changes. Ultimately, software-defined networking solutions empower organizations to run agile, software-driven networks that can adapt and evolve along with modern applications.
Network Management Software
Network management software is software used by organizations to monitor and control their computer networks. It collects data on network performance, identifies potential issues, and allows for remote management of devices. This software often includes features such as network mapping, traffic analysis, and security monitoring. It can be used to optimize network performance, troubleshoot problems, and reduce downtime. Many options are available on the market today from various vendors with varying levels of complexity and functionality.
Network Traffic Analysis (NTA) Software
Network traffic analysis (NTA) software tools allow IT security professionals to monitor and analyze network activity in real time. These tools provide visibility into how the network is being used, helping to identify performance issues, bottlenecks, and inefficiencies. The software captures and inspects network traffic, offering insights into bandwidth usage, application performance, and potential security threats. By detecting anomalies and unusual traffic patterns, these tools help prevent data breaches and optimize network performance. Ultimately, the software enhances network visibility, security, and troubleshooting capabilities for IT teams.
Event Networking Software
Event networking software, also known as event matchmaking software, are software applications that event attendees can utilize in order to be connected to other event attendees. Event networking apps and platforms make it easy for people who are attending events to connect with the right attendees, clients, sponsors, and organizations at an event based on shared interests.
Network Assessment Tools
Network assessment tools help IT professionals and organizations evaluate the performance, security, and overall health of their IT networks. These tools analyze network traffic, configurations, and hardware to identify vulnerabilities, bottlenecks, or inefficiencies that may impact performance or security. With features like real-time monitoring, automated diagnostics, and reporting, they provide detailed insights into potential risks and areas for optimization. By using these tools, businesses can proactively address issues, ensure compliance with industry standards, and improve the reliability of their network infrastructure. Ultimately, network assessment tools support better network management, enhancing both security and operational efficiency.
Network Discovery Tools
Network discovery tools, also known as network scanners, are software applications that allow users to identify online devices, services and networks on a particular network. They typically do this by using protocols such as ICMP, TCP or UDP to discover the IP addresses associated with those devices. In some cases, they also provide additional information about the discovered devices, such as their operating system and hardware specifications.
Container Networking Software
Container networking software is used to enable communication between containers, clusters, and the outside world. It provides an easy way for developers to create and deploy applications in a secure environment. Common features of container networking software include network isolation, traffic routing, and service discovery.
Network Virtualization Software
Network visualization software is a tool that provides graphical representations of network infrastructures, helping businesses and IT professionals visualize, monitor, and manage their networks. These platforms offer interactive maps and diagrams to illustrate the components of a network, including routers, switches, servers, and devices, as well as how they are interconnected. Network visualization software typically includes features for real-time monitoring, troubleshooting, network traffic analysis, and identifying potential bottlenecks or security vulnerabilities. By providing an intuitive, visual representation of a network's structure and performance, these tools help administrators optimize performance, plan for future capacity, and ensure efficient network management.
Network Visibility Software
Network visibility tools are software tools for monitoring, analyzing, and optimizing network performance by providing comprehensive insights into data traffic, devices, and applications across the network. They enable IT administrators to identify bottlenecks, detect anomalies, and ensure security by capturing and analyzing real-time and historical data.
Retail Media Networks
A retail media network is a platform that connects brands and retailers to consumers through in-store advertising and promotions. These networks utilize digital screens, product displays, and other visual elements to showcase products and special offers to shoppers. Through data analysis and targeted marketing strategies, these networks aim to increase brand awareness and drive sales for both the retailer and the participating brands. Retail media networks can be found in various types of stores, including grocery stores, department stores, and pharmacies. They provide a seamless integration of advertising into the shopping experience for the consumer.
Network Traffic Generators
Network traffic generators, also known as traffic generators or website traffic generators, are tools used to simulate the behavior of network traffic. They are used by network administrators to test the performance, features, and scalability of their networks. Network traffic generators can generate a variety of types of network data including ICMP, UDP, TCP and application layer protocols such as HTTP and FTP. This helps ensure that the network is able to handle normal levels of traffic as well as peak loads. Additionally, they can be used for security testing purposes along with identifying weaknesses or misconfigured elements in a communication system.
View more categories (20) for "networking"
  • 1
    Atera

    Atera

    Atera

    Atera, the first and only Agentic AI platform for IT management, offers IT teams and MSPs a digital workforce of AI agents to preemptively and autonomously manage their entire IT operations. Its all-in-one platform combines RMM, helpdesk, ticketing, and automation to reduce downtime, improve SLAs, and free IT teams to focus on strategic work over mundane tasks. At the core of Atera’s platform are two powerful AI agents built to enhance every layer of IT operations. AI Copilot helps...
    Leader badge
    Starting Price: 30-DAY FREE TRIAL
    View Tool
    Visit Website
  • 2
    JDisc Discovery
    JDisc Discovery is a comprehensive network inventory and IT asset management solution designed to help organizations gain clear, up-to-date visibility into their IT environment. It automatically scans and maps devices across the network, including servers, workstations, virtual machines, and network hardware, to create a detailed inventory of all connected assets. This includes critical information such as hardware configurations, software installations, patch levels, and relationshipots between devices. ...
    Starting Price: $100.00/one-time
    View Tool
    Visit Website
  • 3
    NinjaOne

    NinjaOne

    NinjaOne

    NinjaOne unifies IT to simplify work for 35,000+ customers in 140+ countries. The NinjaOne Unified IT Operations Platform delivers endpoint management, autonomous patching, backup, and remote access in a single console to improve efficiency, increase resilience, and reduce spend. By automating IT and managing all endpoints, organizations give employees a great technology experience to work faster, smarter, and easier while IT teams modernize and improve efficiency. NinjaOne is a Leader...
    Leader badge
    View Tool
    Visit Website
  • 4
    Auvik

    Auvik

    Auvik Networks

    Auvik's cloud-based network monitroing and management software gives you instant insight into the networks you manage, and automates complex and time-consuming network tasks. You get complete network visibility and control. Real-time network mapping & inventory means you'll always know exactly whats where, even as your users move. Automated config backup & restore on network devices means you'll mitigate network risk with no manual effort. ...
  • 5
    SuperOps

    SuperOps

    SuperOps

    SuperOps is a future-ready, unified PSA-RMM platform for fast-growing MSPs. Powered with the goodness of AI and intelligent automation, SuperOps is packed with all the features and tools that a modern MSP needs, including project management and IT documentation. MSPs no longer need to toggle between tools to manage different pieces of their work. With SuperOps, MSPs can break free from disjointed, legacy tools and experience a platform that’s built for the cloud and designed to make MSPs’...
    Starting Price: $79/tech/month
  • 6
    MetaDefender OT Security
    Designed for enterprise-level deployments, MetaDefender OT Security provides full visibility into your OT assets and networks, continuously discovering assets, and monitoring for threats, vulnerabilities, supply chain violations, and non-compliance issues. Critical networks are home to devices of varying ages, makes, models, operating systems, and countries of origin, and without a clear understanding of where they are and how they’re communicating, protecting them and your distributed networks from potential cyberattacks further complicates an already complex problem. ...
  • 7
    Lansweeper

    Lansweeper

    Lansweeper

    ...Discover all assets in your IT environment that you didn’t even knew about & take full control of your network. Download your free trial and start your IT asset management.
    Starting Price: $495.00/year
  • 8
    Device42

    Device42

    Device42, A Freshworks Company

    With customers across 70+ countries, organizations of all sizes rely on Device42 as the most trusted, advanced, and complete full-stack agentless discovery and dependency mapping platform for Hybrid IT. With access to information that perfectly mirrors the reality of what is on the network, IT teams are able to run their operations more efficiently, solve problems faster, migrate and modernize with ease, and achieve compliance with flying colors. Device42 continuously discovers, maps, and optimizes infrastructure and applications across data centers and cloud, while intelligently grouping workloads by application affinities and other resource formats that provide a clear view of what is connected to the environment at any given time. ...
    Leader badge
    Starting Price: $1499.00/year
  • 9
    Ivanti Neurons for Discovery
    Detect new or unknown devices joining your network instantly. Ivanti Neurons for Discovery delivers accurate and actionable asset information in minutes. Determine what users and endpoints connect to the network, when they connect, and what software is installed on them. Now enjoy visibility in real-time using active and passive scanning and third-party connectors. Take advantage of actionable insight with normalized hardware and software inventory data, software usage information automatically feeding configuration management and asset management databases, along comprehensive service maps. ...
  • 10
    Netskope

    Netskope

    Netskope

    ...Security has traditionally managed risk by applying heavy-handed controls, but today’s business wants to move fast without having velocity throttled. Netskope is redefining cloud, network, and data security.
  • 11
    Zscaler

    Zscaler

    Zscaler

    Zscaler, creator of the Zero Trust Exchange platform, uses the largest security cloud on the planet to make doing business and navigating change a simpler, faster, and more productive experience. The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement. The Zero Trust Exchange operates across 150 data centers worldwide, ensuring that the service is close to your users, co-located with the cloud providers and applications they are accessing, such as Microsoft 365 and AWS. ...
  • 12
    Cloudflare Zero Trust
    ...The corporate perimeter has become more difficult to control with complex, conflicting configurations across your VPNs, firewalls, proxies, and identity providers. It’s never been harder to parse out logs, and make sense of how users access sensitive data. Your employees, partners, and customers need a network that is secure, fast and reliable to get work done. Cloudflare Zero Trust replaces legacy security perimeters with our global edge, making the Internet faster and safer for teams around the world. Enforce consistent access controls across cloud, on-premise and SaaS applications.
    Starting Price: $7 per user per month
  • 13
    Ivanti

    Ivanti

    Ivanti

    ...Ivanti’s Enterprise Service Management delivers actionable insights to streamline IT operations and improve employee experiences. The company also provides comprehensive network security and exposure management tools to protect assets and prioritize risks effectively. Trusted by over 34,000 customers worldwide, including Conair and City of Seattle, Ivanti supports secure, flexible work environments. Their solutions enable businesses to boost productivity while maintaining strong security and operational visibility.
  • 14
    Kaseya VSA
    Kaseya VSA is a next-generation remote monitoring and management (RMM) software for Managed Service Providers (MSP) and IT enterprises. With VSA, users get access to the fastest remote control powerful discovery, reliable patch management, and monitoring and security tools in a single solution. Thus, helping to increase IT staff productivity, service reliability, and systems security. A Unified IT Management solution to not only deliver better service but to transform the business. Kaseya’s...
  • 15
    Ampliphae

    Ampliphae

    Ampliphae

    ...With easy-to-deploy technology, you can quickly discover which SaaS services — such as cloud-CRMs, marketing automation services or file-sharing apps — are in use on your network, and who is using them. Monitor usage to see instantly if more users are signing up. And with Ampliphae's continuously updated cloud database, you can check at a glance the risks and benefits associated with each service discovered.
  • 16
    Tenable OT Security
    ...Leverage an advanced multi-detection engine to identify network anomalies, enforce security policies, and track local changes on devices with high-risk events.
  • 17
    Armis Centrix
    Armis Centrix™ is a comprehensive cyber exposure management platform that provides continuous, real-time visibility and protection across IT, OT, IoT, and IoMT environments. Powered by the Armis AI-driven Asset Intelligence Engine, it identifies every connected device, assesses cyber risk, and monitors vulnerabilities across an organization’s entire digital attack surface. The platform automates risk scoring, streamlines compliance reporting, and supports rapid incident response through deep...
  • 18
    Prisma SaaS

    Prisma SaaS

    Palo Alto Networks

    Tomorrow's enterprise runs on data and applications. Unsanctioned SaaS apps can expose sensitive data and propagate malware, and even sanctioned SaaS adoption can increase the risk of data exposure, breaches and noncompliance. By offering advanced data protection and consistency across applications, Prisma SaaS reins in the risks. It addresses your cloud access security broker needs and provides advanced capabilities in risk discovery, data loss prevention, compliance assurance, data...
  • 19
    FireCompass

    FireCompass

    FireCompass

    ...FireCompass provides the ability to launch safe-attacks on your most critical applications and assets. Once you approve the scope on which the attacks need to be launched, FireCompass engine launches the multi-stage attacks, which includes network attacks, application attacks, and social engineering attacks to identify breach and attack paths. FireCompass helps to prioritize digital risks to focus efforts on the vulnerabilities that are most likely to be exploited. The dashboard summarizes the high, medium, and low priority risks and the recommended mitigation steps.
  • 20
    JumpCloud

    JumpCloud

    JumpCloud

    JumpCloud® delivers a unified open directory platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform. Everything in One Platform Grant users Secure, Frictionless Access™ to everything they need to do their work however they choose. Manage it all in one unified view. Cross-OS...
    Starting Price: $9/user
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB