Network Security
Compare 169 network security tools to find the right one for your needs
π Subcategories
π§ Tools
Compare and find the best network security for your needs
Enclave Networks
A tool that helps create private, secure, and segmented networks between systems anywhere.
Volatility Framework
An open-source framework for incident response and malware analysis that allows for the extraction of digital artifacts from volatile memory (RAM) samples.
Prophaze DDoS Protection
An AI-powered DDoS protection solution that is specifically designed for cloud-native and containerized applications.
MixMode
MixMode is a cybersecurity platform that uses self-supervised AI to detect known and unknown threats in real time.
Zero Networks
An automated microsegmentation platform that stops attacks by restricting network access.
Versa Networks SASE
A unified platform that integrates networking and security functionalities like SD-WAN and NGFW.
pfSense
A free and open source firewall and router that also features unified threat management, load balancing, multi-WAN, and more.
Macmon NAC
A fast and easy-to-implement NAC solution that provides network transparency and security for heterogeneous networks.
Tailscale
A zero-config mesh VPN built on WireGuard that creates a secure, private network between your devices, wherever they are.
GoodAccess
A cloud-based SASE platform providing ZTNA, secure remote access, and threat protection for small and medium-sized businesses.
Genians GeniNAC
A comprehensive NAC solution that provides device visibility, policy enforcement, and threat detection.
Corelight
Corelight provides a network detection and response (NDR) platform based on Zeek, the open-source standard for network traffic analysis.
Sangfor NGAF
An NGFW that integrates AI, cloud threat intelligence, and a Web Application Firewall (WAF).
Twingate
A Zero Trust Network Access (ZTNA) solution that replaces traditional VPNs with a more secure, usable, and modern alternative.
Lumu
Lumu is a cybersecurity company that helps organizations measure compromise and isolate confirmed threats.
TrueFort Fortress
A platform that combines workload protection and microsegmentation based on application intelligence.
Security Onion
A Linux distribution for intrusion detection, network security monitoring, and log management.
GoodAccess
A cloud VPN and ZTNA platform designed for small and medium businesses.
Nmap
A free and open-source utility for network discovery and security auditing.
Link11 DDoS Protection
A cloud-native, AI-powered DDoS protection platform that provides automated, real-time mitigation with a zero-time-to-mitigate SLA for known vectors.
DataDome DDoS Protection
A cloud-based DDoS protection service that specializes in protecting websites, mobile apps, and APIs from application-layer attacks.
NetworkMiner
An open-source tool for network forensics and traffic analysis that can extract files, emails, and other artifacts from PCAP files or live traffic.
Cloudflare DDoS Protection
A cloud-based DDoS protection service that provides unmetered and always-on mitigation against all types of DDoS attacks.
AWS Shield
A managed DDoS protection service that safeguards applications running on Amazon Web Services (AWS).
Ekahau
Professional tools for designing, analyzing, optimizing, and troubleshooting Wi-Fi networks.
Gcore DDoS Protection
A cloud-based DDoS protection service with a large global network and real-time mitigation capabilities.
Juniper Mist Wi-Fi Assurance
A cloud-managed, AI-driven wireless solution focused on user experience and proactive troubleshooting.
Wireshark
A free and open-source packet analyzer used for network troubleshooting, analysis, and software and communications protocol development.
tcpdump
A free and open-source command-line utility for capturing and analyzing network traffic.
Fortinet FortiGate
A series of high-performance NGFWs that provide broad, integrated, and automated security.
Appgate SDP
A ZTNA solution that creates secure, one-to-one connections between users and the resources they need.
Open Systems SASE Experience
A fully managed, native SASE offering that combines SD-WAN, Firewall, SWG, CASB, and ZTNA.
Arista NDR
Arista NDR (formerly Awake Security) is an AI-driven network detection and response platform that provides complete visibility and autonomous threat hunting.
Aruba ClearPass Policy Manager
A policy management platform that provides role- and device-based secure network access control for any user or device.
Palo Alto Networks Cortex XDR
Cortex XDR is an extended detection and response (XDR) platform that integrates network, endpoint, and cloud data to stop sophisticated attacks.
CrowdStrike Falcon
The CrowdStrike Falcon platform is a cloud-native solution that provides endpoint security, threat intelligence, and cyberattack response services.
AppGate SDP
A ZTNA solution that creates a secure, one-to-one connection between users and resources.
Perimeter 81
A cloud-native, Zero Trust Network Access and SASE platform that secures network, cloud, and application access.
ExtraHop Reveal(x)
ExtraHop Reveal(x) is a cloud-native network detection and response (NDR) solution that provides complete visibility, real-time detection, and intelligent response.
Twingate
A modern ZTNA solution that makes implementing Zero Trust simple, secure, and performant.
Perimeter 81
A SASE platform that includes ZTNA capabilities to simplify secure network access for the modern workforce.
Check Point Quantum Security Gateways
A comprehensive line of NGFWs designed for enterprises, data centers, and small businesses.
Sophos Firewall
An NGFW with the Xstream Architecture, providing visibility, protection, and performance.
Check Point Harmony SASE (formerly Perimeter 81)
A unified SASE platform combining ZTNA, SWG, and FWaaS to connect and secure users, sites, and resources.
Zscaler Private Access (ZPA)
A cloud-native service that provides Zero Trust access to private applications, replacing legacy VPNs.
Sophos NDR
Sophos NDR is a network detection and response solution that provides deep visibility into network traffic to detect suspicious and malicious activity.
Check Point Harmony Connect
A SASE solution that includes ZTNA to provide secure access to corporate applications, SaaS, and the internet.
Vectra AI
Vectra AI is the leader in hybrid attack detection, investigation and response.
Gigamon ThreatINSIGHT
Gigamon ThreatINSIGHT is a cloud-native, high-velocity network detection and response (NDR) solution that provides security teams with the visibility and context they need to hunt, detect, and investigate threats.
Palo Alto Networks NGFW
Provides comprehensive network security through machine learning-based threat prevention.
Portnox CORE
An on-premise, software-based NAC solution providing real-time visibility and control over all connected devices.
Palo Alto Networks GlobalProtect
A VPN client that extends the protection of the Palo Alto Networks security platform to remote and mobile users.
Trend Micro Vision One
Trend Micro Vision One is a cybersecurity platform that provides attack surface risk management, and extended detection and response (XDR) across email, endpoints, servers, cloud workloads, and networks.
ExpressVPN for Business
A business-focused version of the popular consumer VPN, offering privacy, security, and ease of use for teams.
Fortinet FortiSASE
A single-vendor SASE solution that combines cloud-delivered security (SSE) with Secure SD-WAN.
Sophos ZTNA
A Zero Trust Network Access solution that is tightly integrated with Sophos Intercept X endpoint security.
InfoBlox DDI
While primarily a DDI platform, it offers NAC capabilities through ecosystem integrations and device discovery.
Fortinet FortiGate
A next-generation firewall (NGFW) that provides high-performance threat protection and network segmentation.
Suricata
An open-source network intrusion detection system (IDS), intrusion prevention system (IPS), and network security monitoring (NSM) engine.
Imperva DDoS Protection
A cloud-based DDoS protection service that offers a 3-second mitigation SLA for all types of DDoS attacks.
Akamai Prolexic
A cloud-based DDoS scrubbing service that provides comprehensive protection against all types of DDoS attacks.
Azure DDoS Protection
A cloud-based DDoS protection service that defends your Azure applications and resources from denial-of-service attacks.
Mandiant Security Validation
A security validation platform that allows you to continuously measure, manage, and improve your cyber security effectiveness.
Zscaler Private Access
A Zero Trust Network Access (ZTNA) solution that secures access to private applications.
Check Point Quantum Spark
All-in-one security gateways with integrated Wi-Fi for small and medium businesses.
Ubiquiti UniFi
A comprehensive networking platform with Wi-Fi, switching, security gateways, and more.
Sucuri DDoS Protection
A cloud-based DDoS protection service that is part of Sucuri's broader website security platform.
Vercara UltraDDoS Protect
A cloud-based, on-demand DDoS mitigation service with a high-capacity network and a variety of activation methods.
Fortinet FortiAP
Secure wireless access points that are managed and secured by a FortiGate firewall.
Fastly DDoS Mitigation
A cloud-based DDoS mitigation service that is integrated with Fastly's edge cloud platform.
Paessler PRTG Network Monitor
A comprehensive network monitoring tool that monitors all the systems, devices, traffic, and applications in your IT infrastructure.
Aruba Wireless Security (HPE)
Policy-based access control and wireless intrusion prevention from Aruba, an HPE company.
Palo Alto Networks Prisma Access
A SASE solution that secures all traffic, including from wireless users and devices.
Arista Networks CloudVision for Wi-Fi
AI-driven, cloud-managed Wi-Fi focused on proactive optimization and root cause analysis.
Radware DDoS Protection
A hybrid DDoS mitigation solution combining on-premises appliances and cloud-based scrubbing for comprehensive protection.
Google Cloud Armor
A cloud-native security service that provides DDoS protection and a Web Application Firewall (WAF) for applications and services hosted on Google Cloud.
F5 Silverline DDoS Protection
A managed DDoS protection service that provides 24/7 monitoring and mitigation by F5's security experts.
Autopsy
A free and open-source digital forensics platform that provides a graphical interface to The Sleuth Kit and other forensic tools.
Zeek
A powerful and flexible open-source network analysis framework that provides detailed logs of network activity.
WatchGuard Wi-Fi Cloud
Cloud-managed Wi-Fi with a strong focus on wireless intrusion prevention (WIPS).
Extreme Networks ExtremeWireless
Cloud-managed Wi-Fi with advanced security, analytics, and high-density performance.
Cisco Meraki Wireless
Cloud-managed Wi-Fi access points that are easy to deploy and manage from a single dashboard.
IronNet IronDefense
IronDefense is an advanced network detection and response (NDR) solution that provides enterprise-wide visibility and threat detection.
Fidelis Elevate
Fidelis Elevate is an active XDR platform that provides threat detection, hunting, and response across network, endpoints, and cloud.
VyprVPN for Business
A business VPN service that provides online security, privacy, and freedom for companies.
OpenVPN Access Server
A self-hosted VPN solution that provides secure remote access, site-to-site networking, and granular access control.
Cisco Secure Client (formerly AnyConnect)
A unified agent providing a range of security services, including remote access VPN, ZTNA, endpoint security, and more.
Barracuda CloudGen Firewall
A family of firewalls designed for the cloud era, protecting hybrid and multi-cloud environments.
SonicWall NSa Series
A series of mid-range firewalls that deliver high-performance security and threat prevention.
Cloudflare Access
A ZTNA solution that secures access to applications by verifying user identity and device health for every request.
Cloudflare One
A unified SASE platform that connects and secures users, devices, and applications on Cloudflare's global network.
Zscaler Internet Access
A cloud-native security service edge (SSE) platform that provides a secure onramp to the internet.
Palo Alto Networks Prisma SASE
Combines Prisma Access (SSE) and Prisma SD-WAN to provide a unified, cloud-delivered SASE solution.
Fortinet FortiNAC
A NAC solution that provides visibility, control, and automated response for everything that connects to the network.
Zscaler Zero Trust Exchange
A cloud-native platform that securely connects users, devices, and applications using zero trust principles.
Check Point Harmony Connect
A cloud security platform that unifies 11 SASE services to connect users and branches to resources securely.
Fortinet FortiNDR
FortiNDR is an AI-powered network detection and response solution that uses machine learning and analytics to identify and investigate cyber threats.
LogRhythm NDR
LogRhythm NDR provides 360-degree visibility across the network to surface threats, accelerate response, and reduce risk.
WatchGuard Unified Security Platform
A platform that unifies network security, endpoint security, secure Wi-Fi, and multi-factor authentication.
Illumio Core
Stops breaches from spreading across hybrid IT with Zero Trust Segmentation.
AlgoSec
Provides network security policy management for cloud, SDN, and on-premises networks.
OPSWAT MetaAccess
A NAC solution that ensures every device is compliant with security policies before it is allowed to access network resources.
Check Point Quantum
A range of network security gateways that provide threat prevention and support network segmentation.
VMware NSX Network Detection and Response
VMware NSX Network Detection and Response is a distributed NDR solution that is built into the VMware NSX platform.
Nutanix Flow Network Security
A software-defined networking solution with native microsegmentation for the Nutanix platform.
Netskope SASE
A cloud-native SASE platform that provides data-centric Zero Trust security to protect people and data anywhere.
Zscaler Private Access (ZPA)
A cloud-native service that provides Zero Trust access to private applications, replacing legacy VPNs and firewalls.
Trellix Network Detection and Response
Trellix Network Detection and Response (formerly FireEye Network Security) provides advanced threat detection and response to protect against sophisticated attacks.
Forescout Platform
A comprehensive NAC platform providing deep device visibility and automated security policy enforcement.
Barracuda SecureEdge
A cloud-first SASE platform that connects any device, application, or cloud/hybrid environment securely.
Ivanti Policy Secure (formerly Pulse Policy Secure)
A NAC solution that provides visibility, access control, and threat response for all network-connected devices.
ExtremeControl
A NAC solution providing centralized visibility and granular control over all endpoints on the network.
Fortinet FortiClient
A unified endpoint agent that provides VPN, ZTNA, endpoint protection (EPP/EDR), and integration into the Fortinet Security Fabric.
Darktrace
A global leader in cyber security AI, delivering complete AI-powered solutions in its mission to free the world of cyber disruption.
Zscaler Private Access (ZPA)
A cloud service that provides zero trust, secure access to internal applications without placing users on the network.
Palo Alto Networks Prisma Cloud
A comprehensive CNAPP that provides security from code to cloud, including microsegmentation.
Cato SASE Cloud
A global converged cloud-native service that securely and optimally connects all branches, clouds, users, and data.
VMware NSX
A network virtualization platform that delivers a complete L2-L7 networking and security stack in software.
NordLayer
A cloud-native SSE platform offering ZTNA, SWG, and FWaaS to secure networks for businesses of all sizes.
Cisco Secure Firewall
A family of firewalls that provide comprehensive threat defense and simplified security management.
FortiClient
A Fabric Agent that delivers protection, compliance, and secure access in a single, modular lightweight client.
Proton VPN for Business
A security-focused business VPN from the creators of Proton Mail, offering privacy, dedicated IPs, and secure access for teams.
Cisco Secure Network Analytics
Cisco Secure Network Analytics (formerly Stealthwatch) provides network visibility and security analytics to rapidly detect and respond to threats.
Cisco Secure Network Analytics (Stealthwatch)
A network detection and response (NDR) solution that uses enterprise-wide network visibility and security analytics to detect and respond to threats in real time.
SolarWinds NetFlow Traffic Analyzer
A network traffic analysis tool that provides a comprehensive view of network traffic, allowing you to identify who and what is consuming your bandwidth.
ManageEngine NetFlow Analyzer
A web-based network traffic analysis tool that collects, analyzes, and reports on what your network bandwidth is being used for and by whom.
Snort
An open-source network intrusion prevention system (NIPS) and network intrusion detection system (NIDS) capable of real-time traffic analysis and packet logging.
Cisco Secure Wireless
Integrates wireless intrusion prevention (WIPS) with Cisco's network infrastructure.
CommScope RUCKUS Cloud
Cloud-based network management for RUCKUS access points and switches.
Check Point DDoS Protector
A line of on-premises appliances that provide multi-layered protection against DDoS attacks, managed by Check Point's Emergency Response Team.
Sophos Wireless
Cloud-managed wireless that integrates with the Sophos security ecosystem.
Fortinet FortiDDoS
A line of high-performance, on-premises appliances that provide real-time protection against DDoS attacks.
Radware DefensePro
An on-premises or cloud-based DDoS protection solution that uses behavioral analysis and real-time signature creation to mitigate a wide range of attacks.
LiveAction LiveWire
A solution for capturing and analyzing network packets to troubleshoot network and application performance issues and conduct security forensics.
Barracuda CloudGen Firewall
A next-generation firewall that can also manage and secure wireless networks.
VMware Workspace ONE
A UEM platform that secures device access to networks, including Wi-Fi.
OSForensics
A digital forensics and e-discovery tool that allows you to extract and analyze digital evidence from computers, mobile devices, and other sources.
Nagios Network Analyzer
A network traffic analysis tool that provides a detailed look at your network traffic and bandwidth utilization.
Splunk
A data platform that provides security information and event management (SIEM), observability, and IT solutions.
A10 Networks Thunder TPS
A line of high-performance, on-premises appliances that provide precise and scalable DDoS protection.
NetWitness NDR
A network detection and response (NDR) solution that provides real-time visibility into network traffic to detect and respond to threats.
NETSCOUT Arbor
A comprehensive suite of DDoS protection solutions for enterprises and service providers, available as on-premises appliances or a cloud-based managed service.
RSA NetWitness Network
RSA NetWitness Network is a network detection and response (NDR) solution that provides real-time visibility and analytics to detect and investigate threats.
Cisco Identity Services Engine (ISE)
A comprehensive network access control (NAC) solution that provides visibility, control, and automated enforcement.
Cato SASE Cloud
Converges SD-WAN, a global private backbone, and a full network security stack into a single cloud service.
Tufin
A security policy automation platform that provides visibility and control over network segmentation.
Cisco Secure Workload (formerly Tetration)
Provides holistic workload protection for multi-cloud data centers by enabling microsegmentation.
OpenText EnCase Forensic
A court-proven solution for digital forensics that enables examiners to acquire data from a wide variety of devices and conduct in-depth investigations.
Nexusguard DDoS Protection
A cloud-based DDoS protection service that is specifically designed for the needs of service providers and large enterprises.
NetScout AirMagnet Enterprise
An automated system for 24x7 wireless intrusion prevention and network monitoring.
Exterro FTK
A comprehensive digital forensics platform that provides processing and indexing of data upfront, so you can start your investigation sooner.
Linksys Cloud Manager
A simple, cloud-based platform for managing Linksys business access points.
Akamai Guardicore Segmentation
A software-based microsegmentation solution that provides deep visibility and granular policy control.
Unisys Stealth
An identity-driven microsegmentation solution that cloaks endpoints and isolates threats.
D-Link Nuclias Cloud
A scalable, cloud-based management solution for D-Link access points and switches.
CAINE
A Linux live distribution created as a digital forensics project, offering a complete forensic environment.
The Sleuth Kit
A collection of command-line tools and a C library that allows you to analyze disk images and recover files from them.
Xplico
An open-source network forensic analysis tool that reconstructs the contents of acquisitions performed with a packet sniffer.
Bulk Extractor
An open-source tool that scans a disk image, a file, or a directory of files and extracts useful information without parsing the file system or file system structures.
Plaso
A command-line tool to extract timestamps from various files found on a typical computer system and aggregate them.
Elisity Cognitive Trust
An identity-based segmentation platform that provides Zero Trust access for users and devices.
vArmour
A platform for visualizing and controlling application relationships to improve security and resilience.
SANS SIFT Workstation
A collection of free and open-source incident response and forensic tools designed to perform detailed digital forensic examinations.
Microsoft Entra Private Access
A ZTNA solution integrated into the Microsoft Entra ecosystem, providing secure access to on-premise and private cloud applications.
Tofino Xenon Security Appliance
A ruggedized, industrial security appliance for protecting SCADA and Industrial Control Systems (ICS).
AT&T Managed Threat Detection and Response
AT&T Managed Threat Detection and Response is a managed security service that provides 24/7 monitoring, detection, and response to cyber threats.
Accenture NDR
Accenture's Managed Detection and Response (MDR) service includes Network Detection and Response (NDR) capabilities to provide 24/7 threat monitoring, detection, and response.
Auconet BICS
An IT Operations Management (ITOM) platform with integrated, real-time NAC capabilities.
Airgap Networks
A Zero Trust segmentation platform that stops lateral threat movement.