Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

blësk stands out as the sole all-in-one solution on the market capable of handling every facet of network monitoring from a single device. This platform boasts rapid, adaptable deployments while delivering impressive returns on investment. Notably, it is the first application in the industry to seamlessly integrate prominent Open Source monitoring technologies widely utilized globally into a single, user-friendly interface. The additional layers of blësk enhance its functionality and provide a cohesive graphical layout. Users can efficiently pinpoint and rectify the issues leading to application downtime, with rapid identification of network, protocol, and service failures, as well as alerts triggered by SNMP traps. It allows tracing of serial data, including CPU load and bandwidth usage, while gathering, analyzing, and assessing performance metrics for SNMP-compliant devices in near real-time. Additionally, it offers predictive capabilities for saturation, classifies interface ports based on usage, and computes the losses and latencies associated with various equipment, contributing to a more reliable network environment. Ultimately, blësk’s comprehensive features empower organizations to maintain optimal performance and minimize disruptions effectively.

Description

Zeek, initially known as Bro, stands as the premier platform for monitoring network security. It is an adaptable, open-source solution driven by those dedicated to defense in the cybersecurity realm. With its origins tracing back to the 1990s, the project was initiated by Vern Paxson to gain insights into activities on university and national laboratory networks. In late 2018, to acknowledge its growth and ongoing advancements, the leadership team transitioned the name from Bro to Zeek. Unlike conventional security tools such as firewalls or intrusion prevention systems, Zeek operates passively by residing on a sensor, which can be a hardware, software, virtual, or cloud-based platform, that discreetly monitors network traffic. By analyzing the data it collects, Zeek generates concise, high-quality transaction logs, file contents, and customizable outputs that are well-suited for manual examination on storage devices or through more user-friendly applications like security information and event management (SIEM) systems. This unique approach allows for a deeper understanding of network activities without interfering with the traffic itself.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Cybraics
Dropzone AI
Elastic Observability
IronNet Collective Defense Platform
LimaCharlie
Malcolm
NXLog
Observe
Onum
Security Onion
Tenzir
Wraith
cPacket

Integrations

Cybraics
Dropzone AI
Elastic Observability
IronNet Collective Defense Platform
LimaCharlie
Malcolm
NXLog
Observe
Onum
Security Onion
Tenzir
Wraith
cPacket

Pricing Details

$1300.00/year
Free Trial
Free Version

Pricing Details

Free
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Prival

Founded

2003

Country

Canada

Website

www.blesk.ca

Vendor Details

Company Name

The Zeek Project

Founded

1994

Country

United States

Website

zeek.org

Product Features

Application Performance Monitoring (APM)

Baseline Manager
Diagnostic Tools
Full Transaction Diagnostics
Performance Control
Resource Management
Root-Cause Diagnosis
Server Performance
Trace Individual Transactions

IT Asset Management

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Log Management

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Network Monitoring

Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Product Features

Network Monitoring

Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Alternatives

Alternatives

Sematext Cloud Reviews

Sematext Cloud

Sematext Group
CloudShark Reviews

CloudShark

QA Cafe
Site24x7 Reviews

Site24x7

ManageEngine
Blesk Reviews

Blesk

Prival