Firewall Analyzer

Firewall Log Analysis Software

Firewall Download
Case Study
  Solutions for : IT Managers   |   Network Administrator Firewall Analyzer Software - Chinese Firewall Analyzer Software - Japanese more stories...
Overview
Features
Demos
Downloads
Get Quote
Resources
Support
Case Studies
Customers
Integration
Store home » Firewall Analyzer Pricing
I have read the Click wrap License Agreement and agree to it. I am also duly authorised to execute this transaction.

Terms and Conditions

  • * Annual Maintenance & Support Fee (AMS)
  • ZOHO Corp reserves the right to change prices without notice.
  • The purchaser is responsible for any applicable sales, use and value-added taxes in their jurisdiction.
Firewall Analyzer Download
Download Free Trial Firewall Analyzer Firewall Analyzer Live Demo Firewall Analyzer Pricing & Purchase
Firewall Analyzer
Awards and Recognitions
Firewall Distributed Edition
  Next Steps
space
Select the Right Edition Choose the Right Edition
Personalized Demo Request Personalized Demo Request
Download Download
Get Online Quote Get Online Quote
Pricing & Purchase Pricing & Purchase
Ask Us Let Us Contact You
space
 
Product Info
space
  • Overview
  • User Guide
  • System Requirements
  • Managing Bandwidth Video
  • White Papers & Case Study
  • FAQ
  • More...
 
 
Features
space
  • Virtual Firewall Management
  • Web Applications Report
  • Firewall Change Management
  • Security Audit & Configuration Analysis
  • Traffic & Bandwidth Monitoring
  • Employee Internet Monitoring
  • Network Security Reports
  • Firewall Alert Administration
  • Firewall Rules Monitoring
  • Managed Firewall Service
  • Firewall Compliance Audits
  • OpManager Integration
  • More...
 
Forums
View All Forums
Partners
Fortinet Global Alliance Partner - Technology Partner Juniper Networks J Partner Check Point OPSEC Partner
 ZOHO Corporation Pvt. Ltd. All rights reserved. WebNMS Home | Trademarks | Privacy Policy | Site Map | Contact Us | Careers | Tell Us
ManageEngine ManageEngine
US :  +1 888 720 9500  |  Intl :  +1 925 924 9500
US Intl :  +1 800 443 6694  (alternative number)
Australia :  +1 800 631 268  |  UK :  0800 028 6590
Store | Reseller
ManageEngine Home Network Management Server Management Application Management Desktop Management Help Desk / Service Desk Log Management & IT Compliance MSP Solutions Integrated IT Management (IT360) On-Demand
  • Products
    Product Categories Active Directory Management Application Monitoring Bandwidth Monitoring & Traffic Analysis Compliance / Log Analysis Customer Support Software Desktop Management Help Desk & Asset Management Integrated IT Management (IT360) Managed Services Network Configuration Management Network Monitoring Software Password Management VoIP Monitoring Product List Free Trials Free Software Price List
  • |
  • Downloads
  • |
  • News
  • |
  • Support
    Support Home Evaluators Forums Documentation Case Studies Service Packs Tutorials Product Updates Knowledge Base
  • |
  • Company
  • |
  • Contact Us
  • |
  • Customers
  • |
  • Community
  • |
  • Training
  • |
  • Feedback
All Products
Enterprise Management & Security Products
Active Directory Management
Active Directory Auditing
Application Monitoring
Asset Management
Bandwidth Monitoring & Traffic Analysis
Customer Support Software
Desktop Management
EventLog Analyzer
Exchange Reporting Tool
Firewall Analyzer
Help Desk Software
Integrated IT Management (IT360)
IP Address Management (IPAM) Software
MSP Desktop Management
MSP Help Desk Software
MSP Network Management Platform
Network Configuration Management
Network Monitoring Software
Network Security Scanner with Patch Management
OS Deployment
Password Management
Self-Service Password Management
Storage Management Software
SQL Server Management
VoIP Monitoring
Website Monitoring (SaaS)
ManageEngine Free Tools
close
Edit Reseller

Network Information for the IT Manager

Traffic and Security of Enterprise Network - Snapshot View

As a CIO/CSO/IT Manager of an enterprise, you would like to apprise yourself of the traffic usage and security threatening activities of the enterprises network.

Firewall Analyzer addresses your requirements. It provides a snapshot view of the network traffic and security events of your network in the form of a dashboard. The dashboard displays the graphical overview and statistical snapshot of the total network traffic distributed among the protocols and security events distributed among various categories.

Network Traffic

For the network traffic, it addresses a critical question like who, when, and where, i.e., who (which host) is using your traffic, when (what time) the traffic was used, and where (which destination) the traffic was directed to. It provides trend of Internet traffic across the perimeter security devices.

Network Security

For the network security, you can view the latest security events received (formatted or raw SysLogs) from a particular device. You can get alerted for any of these security events and pinpoint the exact event by drilling down the reports or searching.

It provides valuable information about usage of Firewall rules. It segregates the unused rules of the Firewall and lets you to manage the rules to optimize the Firewall performance.

There are slew of pre-built reports available in Firewall Analyzer. Firewall Analyzer allows you to create the management reports, for you to peruse.

Network Information for the Security / Network Administrator

Traffic and Security Analysis of Enterprise Network

As a Security/Network Administrator of your enterprise, you would like to constantly monitor the traffic usage and security threatening activities of the enterprises network.

You get a graphical overview and statistical snapshot of the total network traffic distributed among the protocols and security events distributed among various categories, in the dashboard.

There are slew of pre-built reports available in Firewall Analyzer. You have the quick traffic reports. From the quick reports you can find out the traffic usage by

  • top hosts who initiated the traffic
  • top destinations who received the traffic
  • top protocols used for communication
  • top requests received by the URL
  • top conversations between host and destination
  • top Firewall rules used, top VPN users
  • top hosts from where the attacks originated

From the quick reports you can find out the security incidents by

  • top attacks
  • top viruses
  • top denied events
  • top security events
  • top failed log-ons

This gives a comprehensive yet concise view of traffic usage and security events.

You can always drill down to any level of details (unto raw log level) you want. It allows you to create the network reports to be submitted to the management on daily basis.

You can search from heap of raw logs for forensic analysis and network audit. You can load and search the archived logs. The search results can be used to generate reports.

You can gather valuable information about usage of Firewall rules. You can modify or remove the unused rules.

You can get alerts triggered for anomaly and threshold conditions. You can administer the alerts (a bare bone trouble ticketing utitlity).