Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Network Analyzer gives administrators an in-depth view of all network traffic sources and possible security threats. This allows system administrators to quickly gather high-level information about the health of the network and highly granular data to complete and thorough network analysis.
Network Analyzer gives you a central view of all your network traffic and bandwidth data, as well as potential network compromises. The home dashboard gives you an overview of important netflow and sflow data sources, server system metrics, abnormal network behavior, and other network issues. It is a quick way to assess the health of your network. Users can drill down to view specific information on IPs, source ports, destination ports, or any combination thereof.
Network Analyzer's advanced alerting capabilities and reporting capabilities give IT staff a better understanding of their network. For further analysis and tracking, you can access and archive highly detailed and down-to-the packet data.
Description
Qrator Labs offers a robust filtering network that safeguards both small and large enterprises from diverse DDoS attacks, irrespective of their scale or intricacy. Their service includes multiple connection methods, such as DNS and BGP, with BGP specifically designed to shield all infrastructure components from potential threats. Notably, Qrator Labs eliminates the need for ongoing expert intervention or manual setups to defend against sophisticated DDoS assaults. Clients benefit from the support of highly skilled engineers available through various communication platforms. Importantly, if the SLA standards are not fulfilled, clients are not charged for the service, ensuring accountability for quality. With a total channel capacity and node computing power capable of analyzing and processing over 3,000 Gb of traffic per second, Qrator Labs stands out as a formidable player in the cybersecurity landscape. This comprehensive approach not only enhances security but also instills confidence in businesses relying on their services.
API Access
Has API
API Access
Has API
Integrations
ALVAO Asset Management
ALVAO IT Service Management
Nagios Log Server
Slack
WebLOAD
Integrations
ALVAO Asset Management
ALVAO IT Service Management
Nagios Log Server
Slack
WebLOAD
Pricing Details
$1995.00
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Nagios Enterprises
Founded
2007
Country
United States
Website
www.nagios.com/products/nagios-network-analyzer/
Vendor Details
Company Name
Qrator Labs
Founded
2009
Country
Russian Federation
Website
qrator.net/en/
Product Features
Data Visualization
Analytics
Content Management
Dashboard Creation
Filtered Views
OLAP
Relational Display
Simulation Models
Visual Discovery
Network Monitoring
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Product Features
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning