Average Ratings 147 Ratings
Average Ratings 0 Ratings
Description
NetCrunch is a next-gen, agentless infrastructure and traffic network monitoring system designed for hybrid, multi-site, and fast changing infrastructures. It combines real-time observability with alert automation and intelligent escalation to eliminate the overhead and limitations of legacy tools like PRTG or SolarWinds. NetCrunch supports agentless monitoring of thousands of nodes from a single server-covering physical devices, virtual machines, servers, traffic flows, cloud services (AWS, Azure, GCP), SNMP, syslogs, Windows Events, IoT, telemetry, and more.
Unlike sensor-based tools, NetCrunch uses node-based licensing and policy-driven configuration to streamline monitoring, reduce costs, and eliminate sensor micromanagement. 670+ built-in monitoring packs apply instantly based on device type, ensuring consistency across the network.
NetCrunch delivers real-time, dynamic maps and dashboards that update without manual refreshes, giving users immediate visibility into issues and performance. Its smart alerting engine features root cause correlation, suppression, predictive triggers, and over 40 response actions including scripts, API calls, notifications, and integrations with Jira, Teams, Slack, Amazon SNS, MQTT, PagerDuty, and more.
Its powerful REST API makes NetCrunch perfect for flow automation, including integration with asset management, production/IoT/operations monitoring and other IT systems with ease.
Whether replacing an aging platform or modernizing enterprise observability, NetCrunch offers full-stack coverage with unmatched flexibility. Fast to deploy, simple to manage, and built to scale-NetCrunch is the smarter, faster, and future-ready monitoring system. Designed for on-prem (including air-gapped), cloud self-hosted or hybrid networks.
Description
Intruder, an international cyber security company, helps organisations reduce cyber exposure by providing an easy vulnerability scanning solution. The cloud-based vulnerability scanner from Intruder finds security holes in your digital estate. Intruder protects businesses of all sizes with industry-leading security checks and continuous monitoring.
API Access
Has API
API Access
Has API
Integrations
Jira
Slack
6clicks
Amazon Simple Notification Service (SNS)
Amazon Web Services (AWS)
Asana
Clickatell
ConnectWise PSA
Jira Work Management
Jitbit Help Desk
Integrations
Jira
Slack
6clicks
Amazon Simple Notification Service (SNS)
Amazon Web Services (AWS)
Asana
Clickatell
ConnectWise PSA
Jira Work Management
Jitbit Help Desk
Pricing Details
$1600 for NetCrunch 50 nodes
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
AdRem Software
Founded
1998
Country
United States
Website
www.adremsoft.com
Vendor Details
Company Name
Intruder
Founded
2015
Country
United Kingdom
Website
intruder.io
Product Features
Application Performance Monitoring (APM)
Baseline Manager
Diagnostic Tools
Full Transaction Diagnostics
Performance Control
Resource Management
Root-Cause Diagnosis
Server Performance
Trace Individual Transactions
Configuration Management
Access Control / Permissions
Application Deployment
Automated Provisioning
Infrastructure Automation
Node Management
Orchestration
Reporting Analytics / Visualization
Task Management
Data Center Management
Audit Trail
Behavior-Based Acceleration
Cross Reference System
Device Auto Discovery
Diagnostic Testing
Import / Export Data
JCL Management
Multi-Platform
Multi-User
Power Management
Sarbanes-Oxley Compliance
Database Monitoring
Anomaly Detection
Autodiscovery
Capacity Planning
Dashboard
Dependency Tracking
Historical Trend Analysis
Multitenancy
Notifications / Alerts
Performance Monitoring
Permissions / Access Controls
Predictive Analytics
Prioritization
Query Analysis
Resource Optimization
Troubleshooting
IT Alerting
Alert Noise Reduction
Alert Routing
Dynamic Notifications
Enriched Incident Context
Escalation Policies
Incident History Audit
Multi-User Alerting
Multiple Alert Types
On-Call Management
Rich HTML Email Notifications
IT Infrastructure Monitoring
Alerts / Notifications
Application Monitoring
Bandwidth Monitoring
Capacity Planning
Configuration Change Management
Data Movement Monitoring
Health Monitoring
Multi-Platform Support
Performance Monitoring
Point-in-Time Visibility
Reporting / Analytics
Virtual Machine Monitoring
Network Mapping
Color Codes / Icons
Compliance Management
Device Auto Discovery
Hierarchical Mapping
Location-Based Mapping
Map Exporting
On-Demand Mapping
Reporting/Analytics
Self-Updating Maps
Web Traffic Reporting
Network Monitoring
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting
Network Troubleshooting
Alerts / Escalation
Bandwidth Troubleshooting
Change Management
Configuration Management
Connectivity Management
Data Visualization
Historical Audit
Mobile Network Troubleshooting
Network Analysis
Network Monitoring
System Monitoring
Alerts / Notifications
Antivirus Management
Data Backup / Recovery
Device Monitoring
Inventory Management
Patch Management
Policy-based Automation
Remote Monitoring
Reporting / Analytics
Risk Analysis
Server Monitoring
Service Configuration Management
VoIP Monitoring
Alerts / Notifications
Call Detail Record (CDR) Analysis
Call Quality Monitoring
IP SLA Monitoring
Jitter Testing
Latency Monitoring
MOS Monitoring
Packet Loss Monitoring
QoS Monitoring
Reporting / Analytics
Troubleshooting
Website Monitoring
Availability Testing
Event Logs
Event-Based Notifications
FTP Monitoring
Mail Server Monitoring
Maintenance Scheduling
Performance Metrics
Real Time Monitoring
Transaction Monitoring
Uptime Reporting
Product Features
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Computer Security
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Vulnerability Management
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection