Ratings and Reviews 42 Ratings
Ratings and Reviews 0 Ratings
What is PathSolutions TotalView?
TotalView provides comprehensive network monitoring and straightforward root-cause analysis of issues, using clear, accessible language. This solution tracks every device and all interfaces associated with those devices, ensuring nothing is overlooked. Furthermore, TotalView delves deep by gathering 19 different error counters, along with performance metrics, configuration details, and connectivity data, allowing for a holistic view of the network. An integrated heuristics engine processes this wealth of information to deliver clear, easily understandable insights into problems. With this system, even junior engineers can tackle complex issues, freeing up senior engineers to concentrate on higher-level strategic initiatives. The main product encompasses all essential tools required for maintaining an optimally functioning network, including configuration management, server and cloud service monitoring, IP address management (IPAM), NetFlow analysis, path mapping, and diagramming capabilities. By utilizing TotalView, you can achieve complete visibility of your network, enabling you to resolve issues more swiftly and efficiently, ultimately enhancing overall network performance.
What is EndaceProbe?
EndaceProbes provide an impeccable record of Network History, facilitating the resolution of Cybersecurity, Network, and Application issues. They ensure complete transparency for every event, alert, or problem through a packet capture system that integrates effortlessly with a variety of commercial, open-source, or bespoke tools. By offering a comprehensive view of network activities, these probes empower users to conduct in-depth investigations and defend against even the most challenging Security Threats. They effectively capture crucial network evidence, speeding up the resolution of Network and Application Performance issues or outages. The open EndaceProbe Platform merges tools, teams, and workflows into a unified Ecosystem, ensuring that Network History is easily accessible from all your resources. This integration is seamlessly embedded within existing workflows, so teams are not burdened with learning new tools. Furthermore, it acts as a versatile open platform that supports the implementation of preferred security or monitoring solutions. With the ability to record extensive, searchable, and precise network history across your entire infrastructure, users can adeptly manage and respond to various network challenges as they emerge. This holistic strategy not only boosts overall security but also improves operational efficiency, making it an indispensable asset for modern network management. Additionally, the platform’s design fosters collaboration among different teams, enhancing communication and ensuring a swift response to incidents.
Integrations Supported
ARGUS
Cisco AnyConnect
Cisco FlexConnect
Cisco Meraki
Corelight
Darktrace
GigaSECURE
Gigamon
IBM Guardium Vulnerability Assessment
Keysight Application Threat Intelligence
Integrations Supported
ARGUS
Cisco AnyConnect
Cisco FlexConnect
Cisco Meraki
Corelight
Darktrace
GigaSECURE
Gigamon
IBM Guardium Vulnerability Assessment
Keysight Application Threat Intelligence
API Availability
Has API
API Availability
Has API
Pricing Information
$5,747 perpetual
Free Trial Offered?
Free Version
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
PathSolutions
Date Founded
2007
Company Location
United States
Company Website
www.pathsolutions.com
Company Facts
Organization Name
Endace
Date Founded
2001
Company Location
New Zealand
Company Website
www.endace.com
Categories and Features
Network Automation
Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments
Network Mapping
Color Codes / Icons
Compliance Management
Device Auto Discovery
Hierarchical Mapping
Location-Based Mapping
Map Exporting
On-Demand Mapping
Reporting/Analytics
Self-Updating Maps
Web Traffic Reporting
Network Monitoring
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Network Traffic Analysis (NTA)
Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption
Network Troubleshooting
Alerts / Escalation
Bandwidth Troubleshooting
Change Management
Configuration Management
Connectivity Management
Data Visualization
Historical Audit
Mobile Network Troubleshooting
Network Analysis
Network Monitoring
Server Management
CPU Monitoring
Credential Management
Database Servers
Email Monitoring
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring
VoIP Monitoring
Alerts / Notifications
Call Detail Record (CDR) Analysis
Call Quality Monitoring
IP SLA Monitoring
Jitter Testing
Latency Monitoring
MOS Monitoring
Packet Loss Monitoring
QoS Monitoring
Reporting / Analytics
Troubleshooting
Categories and Features
Network Traffic Analysis (NTA)
Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption