Network Behavior Analysis Software

Best Network Behavior Analysis Software include:

Cisco StealthWatch.

Network Behavior Analysis Software Overview

What is Network Behavior Analysis Software?

Network behavior analysis software tools are designed to add an additional level of security to other security software like intrusion prevention systems (IPS), firewalls or security information and event management (SIEM) systems.

While other network security software is designed to detect specific endpoint intrusion, NBA tools listen to IP traffic flow systems or network packets to establish a baseline of normal activity, and then look for network flow anomalies. This enables security and network managers to be alerted of any suspicious activity which is outside of normal traffic flow so that remedial action can be taken before any significant damage is done.

Network Behavior Analysis Products

(1-13 of 13) Sorted by Most Reviews

AlienVault OSSIM
18 ratings
7 reviews
OSSIM leverages the power of the AlienVault Open Threat Exchange by allowing users to both contribute and receive real-time information about malicious hosts. AlienVault OSSIM is an open source Security Information and Event Management (SIEM) product. It is a unified platform providing: Asset discov…
Varonis Data Security Platform
13 ratings
7 reviews
Varonis offers their Data Security Platform, a modular suite of data acess and data security products providing sensitive data discovery, data access governance, unusual behavior detection, GDPR compliance support, as well as incident playbooks and cybersecurity forensic reporting.
Cisco StealthWatch
5 ratings
2 reviews
Cisco Stealthwatch is a network behavior analysis product based on technology acquired by Cisco with its Lancope acquisition in 2015.
ManageEngine NetFlow Analyzer
1 ratings
1 reviews
NetFlow Analyzer is a complete bandwidth monitoring tool that utilizes flow technology to monitor and analyze network bandwidth usage. It helps users identify and avoid bandwidth delays and bottlenecks with customized reports, and set threshold-based email and SMS alerts to help understand the sever…
Arbor Sightline (formerly Arbor SP)
1 ratings
1 reviews
Arbor Sightline (formerly Arbor SP) is a network behavior analytics platform developed by Arbor Networks, now owned and supported by NETSCOUT.
Imperva Data Risk Analytics (formerly CounterBreach)
Imperva Data Risk Analytics (formerly CounterBreach) is a behavior risk analytics tool that is used to determine the security of enterprise data from data access behavior across the enterprise network.
Flowmon Anomaly Detection System
Whenever new security or operational issues arise, Flowmon ADS (Anomaly Detection System) gives back control to IT professionals. Leveraging its powerful network behavior analytics, the vendor says, IT professionals can take decisive actions, deal with cyber threats and manage networks with confiden…
Riverbed SteelCentral NetProfiler
SteelCentral NetProfiler from Riverbed is a network behavior analysis application.
Awake Security Platform
Awake Security Platform is a network security product designed for use in security operations centers. It parses network traffic and builds behavioral models of the activity within organizations to help security teams identify, investigate, and hunt for threats.
CenturyLink SD-WAN Solutions
CenturyLink® SD-WAN with hybrid connectivity is a complete WAN solution supporting scalable networks across a range of connectivity types. They integrate disparate connectivity types into seamless hybrid software-defined WAN.Gain complete visibility through a centralized customer portal. Branches c…
CenturyLink Ethernet Services
CenturyLink® Ethernet services power secure, high-availability network solutions that enable high-performance voice, video and data applications. CenturyLink Ethernet’s private connectivity, scalable bandwidth and configuration options make it ideal for high-speed connections among corporate headqua…
F5 SSL Orchestrator
F5 Networks provides the SSL Orchestrator, a high-performance decryption, analysis, and re-encryption tool for SSL/TLS traffic across the network to locate threats or data exfiltration efforts concealed in encrypted traffic.