Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
For businesses that depend on reliable Wi-Fi for their operations, 7SIGNAL offers a cloud-based Wireless Network Monitoring (WNM) platform that persistently evaluates the wireless network for performance challenges, thereby enhancing network uptime, device connectivity, and overall network return on investment. In contrast to other service providers who inspect the network from the infrastructure viewpoint, 7SIGNAL focuses on the network's edge, assessing the "air" and recording the user experience directly from client devices.
The Sapphire Eye is an advanced Wi-Fi sensor that has been developed and patented by 7SIGNAL. These hardware sensors are installed on the premises and are specifically engineered to remotely assess the quality of wireless network services through cloud-based software.
Additionally, Mobile Eye is a Software as a Service (SaaS) solution also created and patented by 7SIGNAL. This application is deployed on the end user’s wireless device, allowing organizations to maintain continuous oversight of the wireless network right from the endpoint, ensuring a comprehensive view of network performance and user experiences. Together, these tools provide organizations with critical insights to improve their Wi-Fi services.
Description
Zeek, initially known as Bro, stands as the premier platform for monitoring network security. It is an adaptable, open-source solution driven by those dedicated to defense in the cybersecurity realm. With its origins tracing back to the 1990s, the project was initiated by Vern Paxson to gain insights into activities on university and national laboratory networks. In late 2018, to acknowledge its growth and ongoing advancements, the leadership team transitioned the name from Bro to Zeek. Unlike conventional security tools such as firewalls or intrusion prevention systems, Zeek operates passively by residing on a sensor, which can be a hardware, software, virtual, or cloud-based platform, that discreetly monitors network traffic. By analyzing the data it collects, Zeek generates concise, high-quality transaction logs, file contents, and customizable outputs that are well-suited for manual examination on storage devices or through more user-friendly applications like security information and event management (SIEM) systems. This unique approach allows for a deeper understanding of network activities without interfering with the traffic itself.
API Access
Has API
API Access
Has API
Integrations
Axonius
Cisco Meraki
Cybraics
Dropzone AI
IronNet Collective Defense Platform
LimaCharlie
Malcolm
Microsoft Power BI
Microsoft Teams
NXLog
Integrations
Axonius
Cisco Meraki
Cybraics
Dropzone AI
IronNet Collective Defense Platform
LimaCharlie
Malcolm
Microsoft Power BI
Microsoft Teams
NXLog
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
Free
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
7SIGNAL
Founded
2007
Country
Cleveland, Ohio
Website
www.7signal.com
Vendor Details
Company Name
The Zeek Project
Founded
1994
Country
United States
Website
zeek.org
Product Features
Network Monitoring
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting
Product Features
Network Monitoring
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning