Network Security24Network Security Software is dedicated to prevention / pre-empting and locating / containing an Advanced Persistent Threat (APT) through the study of recent behaviors and behavioral change of malicious entities and locating or anticipating, and reacting to, a similar pattern in an enterprise's own networks. The goal is to minimize exposure to APTs while also minimizing, to the extent desired, false positives (i.e. erroneously flagging benign behaviors as malicious).SecPod Saner1https://media.trustradius.com/product-logos/LU/8z/FC6R823LNFLB-180x180.PNGEventLog Analyzer2https://media.trustradius.com/product-logos/WE/Lw/6G3TURN53SM5-180x180.JPEGvArmour3https://media.trustradius.com/vendor-logos/DJ/54/CT687H1U23ML-180x180.JPEGIxia BreakingPoint Virtual Edition (VE)4https://media.trustradius.com/product-logos/4M/1L/PI9ID0UJGXUT-180x180.JPEGNetWatcher5https://media.trustradius.com/vendor-logos/kD/Mz/WHH9CJOVGWFB-180x180.PNGSpeedify VPN6https://media.trustradius.com/product-logos/K1/96/FP1RBXMQOB99-180x180.JPEGThinAir Observe7https://media.trustradius.com/vendor-logos/uV/SW/NPV3KFAGTM0M-180x180.JPEGAwake Security Platform8https://media.trustradius.com/product-logos/yJ/cz/78BHUHZW3PF3-180x180.PNGPwn Pulse9https://media.trustradius.com/vendor-logos/cd/du/LU3BNOW08R8W-180x180.JPEGFrontline Reconnaissance Network Appliance10https://media.trustradius.com/vendor-logos/iA/8s/1JVKUC8W30UK-180x180.JPEGGigaSECURE11https://media.trustradius.com/vendor-logos/rx/IV/086MK8UNCKS7-180x180.JPEGInfocyte HUNT12https://media.trustradius.com/product-logos/hX/1O/IX2QT1G8G8BK-180x180.JPEGHornetsecurity Advanced Threat Protection13https://media.trustradius.com/product-logos/3q/ot/D7WSNM81SHUT-180x180.JPEGExtraHop Reveal(x)14https://media.trustradius.com/vendor-logos/g9/fs/FCO2DFO5BRRT-180x180.JPEGCenturyLink Adaptive Network Security Services15https://media.trustradius.com/vendor-logos/OK/UO/KTW2ZSTJRMM2-180x180.JPEGCenturyLink DDoS Mitigation Service16https://media.trustradius.com/vendor-logos/OK/UO/KTW2ZSTJRMM2-180x180.JPEGCenturyLink Security Log Monitoring (SLM)17https://media.trustradius.com/vendor-logos/OK/UO/KTW2ZSTJRMM2-180x180.JPEGCenturyLink Adaptive Threat Intelligence18https://media.trustradius.com/vendor-logos/OK/UO/KTW2ZSTJRMM2-180x180.JPEGSentinel IPS19https://media.trustradius.com/product-logos/tX/2M/HV9TADX1G4S2-180x180.JPEGMavenir Security and Fraud Management Suite20https://media.trustradius.com/vendor-logos/al/HA/VPO3T7A1HPA1-180x180.JPEGDxOdyssey21https://media.trustradius.com/product-logos/GV/Kc/PDUHWTRXOWIV-180x180.PNGFireEye Network Security22https://media.trustradius.com/vendor-logos/NG/Ce/Z0M72RNSMBG5-180x180.JPEGLogRhythm NetMon Freemium23https://media.trustradius.com/vendor-logos/YF/X9/J40ME3894TL8-180x180.JPEGAporeto Security Platform24https://media.trustradius.com/vendor-logos/KK/6x/1OI0GCU5OGVE-180x180.PNGEset GREYCORTEX MENDEL25https://media.trustradius.com/vendor-logos/db/iK/TTC8O3TI5SN9-180x180.JPEG

Network Security Software

Network Security Software Overview

What is Network Security Software?

It is imperative for enterprises to protect themselves from potentially harmful traffic. Network security software helps network administrators keep track and neutralize unauthorized access or denial of network resources through phishing, Trojan horses, spyware, worms and other vendor-specific vulnerabilities.

Evolution of Network Security Software

Network security software suites usually contain a number of different technologies. Traditionally, the two major components were firewalls, which were designed to only permit specific protocols and ports, but were essentially ignorant as to whether websites being accessed were malicious.


Secure web gateways were designed to perform web filtering and to block websites that were on a blacklist. The tools tend to be used independently of each other and are used to secure the periphery of a company’s infrastructure.


Recent developments augment these strategies by sharing data across multiple systems and correlating information to better understand potential threats. Next-generation firewalls are able to sniff out malicious packets through “deep packet inspection” techniques. Secure gateways have also become more sophisticated with a focus on web-based virus signatures, not just forbidden URLs.


Another recent development is the emergence of malware sandboxes creating a safe environment where tests can be run on suspicious data.

Bring Your Own Device (BYOD)

The advent of the BYOD era has also brought more reliance on network access control software to protect the network internally by making sure that devices identify themselves on the network which can regulate access rights.

Pricing Information

Network security management covers a variety of different technologies making it difficult to make general statements about pricing. Firewall devices have a broad range of costs depending on the complexity of the environment. Firewall appliances start at around $100 or less, while enterprise firewalls can cost over $25,000. Pricing structures vary, but a common approach is tiered pricing by the number of users. Secure web gateway pricing takes a similar approach.

Network Security Products

Listings (26-50 of 63)

We don't have enough ratings and reviews to provide an overall score.

SecPod Saner endpoint security solution provides continuous visibility and control for all endpoints. It proactively remediates risks and detects and responds to threats. Saner combines endpoint vulnerability, patch and compliance management with endpoint threat detection and response into one ea...

We don't have enough ratings and reviews to provide an overall score.

EventLog Analyzer is a practical solution that is designed to collect and archive huge amounts of Syslogs and SNMP traps. This helps security admins in identifying security incidents, policy violations, and operational issues. Virtually every device in an organization’s network can generate logs ...

We don't have enough ratings and reviews to provide an overall score.

vArmour is a network, application and data center security solution that provides security solutions specifically aimed at enterprises running services and apps across multiple clouds.

We don't have enough ratings and reviews to provide an overall score.

Speedify is a new kind of bonding VPN designed from the ground up for speed, security, and reliability. The vendor says Speedify's bonding protocol lets it do things no other VPN can: switching between Wi-Fi and Cellular without breaking sockets, and bonding connections together for speed boosts...

We don't have enough ratings and reviews to provide an overall score.

Awake Security Platform is a network security product designed for use in security operations centers. It parses network traffic and builds behavioral models of the activity within organizations to help security teams identify, investigate, and hunt for threats.

We don't have enough ratings and reviews to provide an overall score.

Pwnie Express in Boston offers Pwn Pulse, a network security application emphasizing an organized and comprehensive overview of all connected devices and monitoring to detect security threats.

We don't have enough ratings and reviews to provide an overall score.

Gigamon offers the GigaSECURE Security Delivery Platform is a packet broker emphasizing network threat detection and containment.

We don't have enough ratings and reviews to provide an overall score.

Infocyte HUNT aims to provide an easy-to-use, yet powerful enterprise endpoint security solution. Infocyte HUNT is a threat hunting software/platform designed to limit risk and eliminate dwell time by enabling an organization’s own IT and security professionals to proactively discover malware an...

We don't have enough ratings and reviews to provide an overall score.

With CenturyLink® DDoS Mitigation network security services you get layers of defense and visibility through enhanced network routing, rate limiting and filtering, and advanced network-based detection powered by our mitigation scrubbing center solutions. Safeguard your network, website and cloud ...

We don't have enough ratings and reviews to provide an overall score.

Sentinel IPS promises advanced threat protection at the network’s edge with Network Cloaking™, blocking malware, exploitation attempts, and other threats before they reach the firewall. Sentinel Internal Intelligence aims to give visibility inside the network, and the ability to monitor the entir...

We don't have enough ratings and reviews to provide an overall score.

DxOdyssey is lightweight software that enables you to create highly available application-level micro-tunnels from any host, to any host, anywhere – across any mix of platforms. The vendor aims to do so more easily, more securely, and more discreetly than any other solution on the market. Using D...

We don't have enough ratings and reviews to provide an overall score.

The FireEye Network Security and Forensics product combines network traffic analysis (via the FireEye SmartVision module), network forensics for attack analysis (via the PX series), and is built around the FIreEye NX series of products.