Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
                    EndaceProbes deliver a flawless record of Network History, enabling the resolution of Cybersecurity, Network, and Application challenges. They provide transparency for every incident, alert, or issue through a packet capture platform that seamlessly integrates with various commercial, open-source, or custom tools. Gain a clear view of network activities, allowing for thorough investigations and defenses against even the most formidable Security Threats. Capture essential network evidence effectively to expedite the resolution of Network and Application Performance problems or outages. The open EndaceProbe Platform unifies tools, teams, and workflows into a cohesive Ecosystem, making Network History readily accessible from all your resources. This functionality is embedded within existing workflows, eliminating the need for teams to familiarize themselves with new tools. Additionally, it serves as a robust open platform that allows the deployment of preferred security or monitoring solutions. With the capability to record extensive periods of searchable, precise network history across your entire infrastructure, users can efficiently manage and respond to various network challenges as they arise. This comprehensive approach not only enhances overall security but also streamlines operational efficiency.
                
            
        
            Description
                    Kentik provides the network analytics and insight you need to manage all your networks. Both old and new. Both the ones you have and those you don't. All your traffic from your network to your cloud to the internet can be viewed on one screen.
We offer:
- Network Performance Analytics
- Hybrid Analytics and Multi-Cloud Analytics (GCP. AWS. Azure)
Internet and Edge Performance Monitoring
- Infrastructure Visibility
DNS Security and DDoS Attack Defense
- Data Center Analytics
- Application Performance Monitoring
Capacity Planning
Container Networking
- Service Provider Intelligence
- Real Time Network Forensics
- Network Costs Analytics
All on One Platform for Security, Performance, Visibility
Trusted by Pandora and Box, Tata, Yelp. University of Washington, GTT, and many other! Try it free!
                
            
        
            API Access
            
                Has API
            
            
        
        
    
                API Access
            
                Has API
            
            
        
        
    
                Integrations
            
                
    GigaSECURE
            
            
        
        
    
        
        
            
                
    A10 Defend DDoS Mitigator
            
            
        
        
    
        
        
            
                
    ARGUS
            
            
        
        
    
        
        
            
                
    Cisco AnyConnect
            
            
        
        
    
        
        
            
                
    Darktrace
            
            
        
        
    
        
        
            
                
    Flow
            
            
        
        
    
        
        
            
                
    Gigamon
            
            
        
        
    
        
        
            
                
    IBM Guardium Vulnerability Assessment
            
            
        
        
    
        
        
            
                
    Kamsa
            
            
        
        
    
        
        
            
                
    NetWatch.ai
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
            Integrations
            
                
    GigaSECURE
            
            
        
        
    
        
        
            
                
    A10 Defend DDoS Mitigator
            
            
        
        
    
        
        
            
                
    ARGUS
            
            
        
        
    
        
        
            
                
    Cisco AnyConnect
            
            
        
        
    
        
        
            
                
    Darktrace
            
            
        
        
    
        
        
            
                
    Flow
            
            
        
        
    
        
        
            
                
    Gigamon
            
            
        
        
    
        
        
            
                
    IBM Guardium Vulnerability Assessment
            
            
        
        
    
        
        
            
                
    Kamsa
            
            
        
        
    
        
        
            
                
    NetWatch.ai
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
            Pricing Details
        No price information available.
        
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Pricing Details
        No price information available.
        
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Vendor Details
Company Name
Endace
Founded
2001
Country
New Zealand
Website
www.endace.com
Vendor Details
Company Name
Kentik
Founded
2014
Country
United States
Website
kentik.com
Product Features
Network Traffic Analysis (NTA)
                                        Anomalous Behavior Detection
                                        
                                    
                                    
                                    
                                        High Bandwidth Usage Monitoring
                                        
                                    
                                    
                                    
                                        Historical Behavior Data
                                        
                                    
                                    
                                    
                                        Identify High Network Traffic Sources
                                        
                                    
                                    
                                    
                                        Network Transaction Visibility
                                        
                                    
                                    
                                    
                                        Stream Data to IDR or Data Lake
                                        
                                    
                                    
                                    
                                        Traffic Decryption
                                        
                                    
                            
                        Product Features
CDN
                                        Content Acceleration
                                        
                                    
                                    
                                    
                                        DDoS Protection
                                        
                                    
                                    
                                    
                                        Load Balancing
                                        
                                    
                                    
                                    
                                        Managed CDN
                                        
                                    
                                    
                                    
                                        Multi-CDN Switching
                                        
                                    
                                    
                                    
                                        Reporting/Analytics
                                        
                                    
                                    
                                    
                                        Software Downloads
                                        
                                    
                                    
                                    
                                        Transparent Caching
                                        
                                    
                                    
                                    
                                        Video Streaming
                                        
                                    
                                    
                                    
                                        Web Application Firewalls (WAF)
                                        
                                    
                            
                        DDoS Protection
                                        DNS Amplification Protection
                                        
                                    
                                    
                                    
                                        DNS Reflection Protection
                                        
                                    
                                    
                                    
                                        High Network Capacity
                                        
                                    
                                    
                                    
                                        Illegitimate Traffic Recognition
                                        
                                    
                                    
                                    
                                        Infrastructure Protection (Layer 3/Layer 4)
                                        
                                    
                                    
                                    
                                        Post Attack Analysis
                                        
                                    
                                    
                                    
                                        Traffic Monitoring
                                        
                                    
                                    
                                    
                                        Website Protection (Layer 7)
                                        
                                    
                            
                        IT Security
                                        Anti Spam
                                        
                                    
                                    
                                    
                                        Anti Virus
                                        
                                    
                                    
                                    
                                        Email Attachment Protection
                                        
                                    
                                    
                                    
                                        Event Tracking
                                        
                                    
                                    
                                    
                                        IP Protection
                                        
                                    
                                    
                                    
                                        Internet Usage Monitoring
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Spyware Removal
                                        
                                    
                                    
                                    
                                        Two-Factor Authentication
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                                    
                                    
                                        Web Threat Management
                                        
                                    
                                    
                                    
                                        Web Traffic Reporting
                                        
                                    
                            
                        Network Monitoring
                                        Bandwidth Monitoring
                                        
                                    
                                    
                                    
                                        Baseline Manager
                                        
                                    
                                    
                                    
                                        Diagnostic Tools
                                        
                                    
                                    
                                    
                                        IP Address Monitoring
                                        
                                    
                                    
                                    
                                        Internet Usage Monitoring
                                        
                                    
                                    
                                    
                                        Real Time Analytics
                                        
                                    
                                    
                                    
                                        Resource Management
                                        
                                    
                                    
                                    
                                        SLA Monitoring
                                        
                                    
                                    
                                    
                                        Server Monitoring
                                        
                                    
                                    
                                    
                                        Uptime Monitoring
                                        
                                    
                                    
                                    
                                        Web Traffic Reporting
                                        
                                    
                            
                        Network Traffic Analysis (NTA)
                                        Anomalous Behavior Detection
                                        
                                    
                                    
                                    
                                        High Bandwidth Usage Monitoring
                                        
                                    
                                    
                                    
                                        Historical Behavior Data
                                        
                                    
                                    
                                    
                                        Identify High Network Traffic Sources
                                        
                                    
                                    
                                    
                                        Network Transaction Visibility
                                        
                                    
                                    
                                    
                                        Stream Data to IDR or Data Lake
                                        
                                    
                                    
                                    
                                        Traffic Decryption
                                        
                                    
                            
                         
         
         
         
         
        