The king of software for capturing and analyzing network traffic
October 31, 2022

The king of software for capturing and analyzing network traffic

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Wireshark

Wireshark software is used every day by me and my IT team as a specific tool for capturing and analyzing traffic on our networks. It is super intuitive and complete to identify the different types of protocols that travel through our network and identify anomalies, failures, and prevention of attack problems. We have been using Wireshark for about 3 years, and only with this tool do we have deep details of the inbound and outbound traffic of our lan and wlan network, and we do daily analysis and reports to always seek the best performance and security.
  • Ease of capturing and analyzing incoming and outgoing network traffic.
  • It allows offline analysis of inspected and captured packages.
  • Excellent and friendly interface.
  • Large community with great support and advanced feature tips.
  • Windows compatible.
  • It is bad for parsing very large packets.
  • It takes time and patience to analyze all packages.
  • Real-time packet capture from different network interfaces (ethernet, wireless, bluetooth)
  • Deep packet analysis offline
  • Network monitoring for better management
  • Identification of inbound and outbound traffic by protocol, ports and IPs
  • Essential for getting data from the network to improve security every day
  • It's free and has an immediate financial return

Do you think Wireshark delivers good value for the price?

Yes

Are you happy with Wireshark's feature set?

Yes

Did Wireshark live up to sales and marketing promises?

Yes

Did implementation of Wireshark go as expected?

Yes

Would you buy Wireshark again?

Yes

Wireshark is made up of advanced features for capturing packets and analyzing network protocols and can be used to capture different network cards and technologies such as wifi and BlueTooth. We recommend the use of this tool by all IT professionals as it is fundamental for the security of the network and identifies everything that is traveling on the network by protocol, ports, and IPs and then analyzes it to solve problems and security flaws with the internet.