Average Ratings 0 Ratings
Average Ratings 2 Ratings
Description
- Automatic topology discovery of physical networks based on SNMP
- Provide detailed, searchable topology maps of physical networks
LanTopoLog Switch Port Mapper tool maps out the physical ports connections to a switch
To the MAC and IP addresses attached devices
- Shows VLAN assignment, port status, port's current speed, LACP/LAG ports
- Detecting new devices within the network and notifying about it
- Display Spanning Tree Status and STP events
- Icon context menu to customize command
- Monitoring device's state (active/inactive) in real-time using ICMP
- Creating alarms in case of network failures
Notifications by E-mail
- Access via the web browser from any part of the network
LanTopoLog uses WMI queries for computer inventory information
- Resolve IP to Name, Export Computer List to csv File
- Monitoring dropped and invalid packets (ifInErrors, IfInDiscards).
- Notify the administrator if traffic thresholds are exceeded
- An easy-to-use interface
Description
Our offerings deliver your security systems with unparalleled, comprehensive visibility into your network infrastructure. This capability is essential for keeping up with the ever-growing speed and complexity of networks, while also equipping you with the insights necessary to effectively identify and address breaches, leading to swift recovery. By adopting Network Critical solutions, you can enhance the performance of your current security system, thereby boosting your return on investment. To begin with, SPAN ports have long been recognized as an inadequate solution for network security. Hackers can easily compromise routers, switches, and entire networks without being detected, demonstrating a significant flaw in this approach. Additionally, SPAN ports fail to provide real-time information, which further undermines your network's security. In contrast, Network TAPs serve as a transparent portal, allowing you to monitor data in real-time without any alterations. This fundamental difference is crucial for maintaining a robust security posture against evolving threats. As organizations increasingly rely on real-time analytics, the advantages of using Network TAPs over SPAN become even more pronounced.
API Access
Has API
API Access
Has API
Integrations
AuthControl Sentry
AuthPoint
Compudyne
DNSWatch
Datto RMM
Deepnet DualShield
Delinea Cloud Access Controller
Genian NAC
Liongard
LoginTC
Integrations
AuthControl Sentry
AuthPoint
Compudyne
DNSWatch
Datto RMM
Deepnet DualShield
Delinea Cloud Access Controller
Genian NAC
Liongard
LoginTC
Pricing Details
$50.00/one-time
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Yuriy Volokitin
Founded
2007
Country
Russian Federation
Website
www.lantopolog.com
Vendor Details
Company Name
WatchGuard Technologies
Founded
1996
Country
United States
Website
www.watchguard.com/wgrd-products/network-security
Product Features
Network Mapping
Color Codes / Icons
Compliance Management
Device Auto Discovery
Hierarchical Mapping
Location-Based Mapping
Map Exporting
On-Demand Mapping
Reporting/Analytics
Self-Updating Maps
Web Traffic Reporting
Network Monitoring
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting
Product Features
Firewall
Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification