Network security:
Next level monitoring

  • PRTG monitors firewalls
  • PRTG monitors ports
  • PRTG monitors servers
  • PRTG uses SNMP, NetFlow, and packet sniffing
  • PRTG maintains the security of your network

 

Free Trial
No limitations for 30 days
Freeware Download
100 sensors, perfect for smaller networks


Network security:
The starting point


Every administrator is faced with the task of developing a central security plan for their company. Part of this plan involves ensuring the various security levels in the firewalls, routers, and switches are properly set. There are network security tools for this purpose, but such tools tend to be extremely expensive.

PRTG is part of your security architecture. Our network monitoring software monitors your firewalls, ports, routers, switches, servers, and much more in real-time. With PRTG, you can rest assured that your network is secure. By thoroughly monitoring your hardware, software, and traffic, you’ll quickly identify irregularities in your network. Our motto: Better safe than sorry!

Five practical network security examples:

 

i NetFlow is a protocol for collecting, aggregating and recording traffic flow data in a network. NetFlow data provide a more granular view of how bandwidth and network traffic are being used than other monitoring solutions, such as SNMP. NetFlow was developed by Cisco and is embedded in Cisco’s IOS software on the company’s routers and switches and has been supported on almost all Cisco devices since the 11.1 train of Cisco IOS Software. Read more ...

Firewall

Monitoring the firewall

The firewall is the network’s main tool for warding off attacks. If your firewall is not configured properly or is down, then all gates to your network are open. PRTG immediately lets you know if this is the case so you can quickly take action. To ensure the reliable monitoring of your network, PRTG comes equipped with both SNMP and NetFlow sensors, as well as user-defined sensors such as the HTTP XML/Rest Value Sensor. More on firewall monitoring.

traffic

Unusual traffic

An attack on your IT infrastructure can cause an unusually large amount of data to flow through your network. One of the ways that PRTG picks up on this anomaly is with its Packet Sniffing Sensor, which automatically compares values with historical data based on the time of the day and the day of the week. In turn, the software automatically displays an “unusual” status, and sends the administrator an alert so something can quickly be done to fix the problem.

Update

Windows updates

A security loophole exposes your network to hackers all over the world. But not with PRTG: The Windows Update Status Sensor immediately informs administrators if a new update is necessary, and identifies which network computers are causing security loopholes due to unpatched Windows versions. Windows monitoring not only pays dividends, but also saves an enormous amount of time and frustration.

open ports

Open ports

Open ports are necessary, but at the same time dangerous. They are used, for example, to access a network illegally or introduce Trojans. With PRTG, you will always see which TCP ports are open and which ones are closed. This information is vital, for often ports are only used on a temporary basis. Port monitoring lets you work with peace of mind.

virus scanner

Virus scanner update

Even the best antivirus scanner software is of no use if it is outdated or down. Use the PRTG WMI Security Center Sensor to monitor the status of antivirus software on the clients in your network.

Measuring network security with PRTG

 

Advantages
of monitoring network security with PRTG

 

iWhat is a sensor?

In PRTG, “Sensors” are the basic monitoring elements. One sensor usually monitors one measured value in your network, e.g. the traffic of a switch port, the CPU load of a server, the free space of a disk drive. On average you need about 5-10 sensors per device or one sensor per switch port.

View video (3:26 min.)

A constant eye on software
and hardware

PRTG is comprehensive monitoring software that lets you monitor all your software and hardware.

Prompt, customizable alarm

The built-in alarm feature of PRTG is fully customizable. Choose your own threshold values and how you’d like to be informed.

Historical data for comparison

Every PRTG sensor is equipped with an “unusual” sensor status, and will automatically sound the alarm if values emerge which are inconsistent with previous ones. Such values may be indicative of security problems.

Compatibility with all the big manufacturers

PRTG is compatible with all the major software and hardware manufacturers. Along with its custom sensors, PRTG offers special pre-configured sensors for a variety of different manufacturers.

APIs for individual customization

The documented APIs of PRTG allow you to use the monitoring tool for your own individual scenarios. PRTG is therefore perfectly suitable for any network.

A centralized monitoring solution

PRTG is a centralized monitoring tool. Gone are the days of juggling several different tools at once. The central switchboard of PRTG provides the overview you need.


Practical tip: “Hey Christian, why is network monitoring important?”

“Instead of working directly on the “front line” like a virus scanner, network monitoring is more of a security command center that keeps an eye on the overall picture. It can monitor existing security software and ensure it is online, and at the same time search for activities that are flying under the radar.”

Christian Twardawa, COO of Paessler AG

Keep a constant eye on your network –
even while on the go

PRTG can be started within minutes and it's compatible with many mobile devices.

 

PRTG comes with all the features you need, plus more your IT infrastructure won't want to live without.

 

PRTG monitors these vendors and applications, and more, in one view!

 


The five levels of meta-security

In our meta-security section, we provide detailed information on how to systematically ensure network security and thus create a double layer of protection. Find out more about the five levels of meta-security here.

PRTG sensors for meta-security

SNMP Custom
Sensor

SNMP allows you to monitor the traffic on your devices. The SNMP Custom Sensor can be configured to meet your own specific needs.

Packet Sniffer
Sensor

The PRTG Packet Sniffer Sensor lets you monitor traffic in detail. This sensor, too, comes in a customizable version.

WMI Security
Center Sensor

Use the PRTG WMI Security Center Sensor to monitor the status of your Windows security tools.

PRTG is a vital tool for getting
your IT into tip-top shape!

The costs for a one-year PRTG license pay for themselves in an average of only a few weeks.
License costs vary according to the size of your network.

Improvement in the reliability of the entire IT

PRTG improves the reliability of your network

PRTG saves network management costs

PRTG saves network management costs

PRTG saves time spent on network management

Firewalls:
PRTG and the
manufacturers


There are many different firewall manufacturers. Administrators are tasked with finding a monitoring tool that can verify that the firewall is online and that it is not displaying any unusual values.

PRTG is compatible with all the major hardware manufacturers, and comes with SNMP, NetFlow, sFlow/jFlow, IPFIX, and other user-defined sensors which can monitor them. You may therefore set up Juniper firewall monitoring, Cisco firewall monitoring, or Dell firewall monitoring – just to name a few.

Other firewall manufacturers, including Barracuda, Checkpoint, Fortinet, gateprotect, F5, Clavister Wolf, and Secure Point, can also be monitored by PRTG, as long as they support a protocol such as SNMP. This you will need to determine on a case-by-case basis.

The PRTG knowledge base contains a few examples: simply enter the name of your firewall manufacturer in the search field and browse the reader questions and articles that are returned. Of course, you can also reach our technical support department directly via the knowledge base, or share your own experience by creating a new thread.

Over 95% of our customers recommend PRTG

 

Paessler AG worldwide trialled PRTG in over 600 IT departments.
The aim was to tune the network monitoring software closer to the needs of the administrators.
The result of the survey: over 95% of the participants would recommend PRTG - or already had.

Recommend PRTG

Network security questions

 

iBandwidth is measured as the amount of data that can be transferred from one point to another within a network in a specific amount of time. Typically, bandwidth is expressed as a bitrate and measured in bits per second (bps). It refers to the transmission capacity of a connection and is an important factor when determining the quality and speed of a network.   Read more ...

security

Is network security necessary?

According to a PAESSLER AG survey, identifying and eliminating IT loopholes is one of the main functions of administrators in medium-sized companies. 58% of those surveyed designated this task as their #1 job. Uptime and ensuring adequate bandwidth came in second and third place in our survey.

budget

How do I get the required budget?

Be sure to present the issue to management in a clear-cut manner so they fully understand the risks. Calculate the cost of downtime beforehand. By doing so, you’ll increase your chances of receiving funds for good hardware and monitoring.

which tool

Which network security tools are available?

There are several different network security tools on the market. One of these is Nmap. Although PRTG is inherently not a network security tool, it indirectly serves to keep your network secure. By monitoring your software and hardware, PRTG provides you with an added layer of security. You’ll ensure your network is secure by being “better safe than sorry.” Network security tools range in price, from free to exorbitantly expensive.

danger

Should we perform a penetration test?

Many administrators periodically test their network security by way of paid or internally-executed attacks. A penetration test is useful for detecting possible security loopholes. As a result, you will get a good idea of the areas which can benefit the most from detailed PRTG monitoring.

Award winning solution

We work hard on making our software as powerful and easy-to-use
as possible for our customers each and every day.
Of course it makes us proud when we get awards for that.

 

awards

You want to know more about other network-related monitoring topics?

Here you find everything about...

PRTG as network traffic analyzer

PRTG the network diagnostics tool

PRTG as LAN monitor

Monitor latency & jitter with PRTG

PRTG makes your job easier!

From routers to switches to the server: PRTG monitors your entire network –
so you can relax and concentrate on your day-to-day tasks with peace of mind.

PRTG saves time

PRTG is a centralized tool for monitoring network security. Our dashboard and app provide for a quick overview of your entire infrastructure.

PRTG saves worry

Installing PRTG is quick and easy. Getting started or switching from another network monitoring tool is easy thanks to more than 200 predefined sensors.

PRTG saves money

80% of our customers report substantial or even exceptional network management cost savings. Our customers report that their PRTG licenses have paid for themselves in an average of a few weeks.

PRTG: The swiss army knife for sys admins

Adapt PRTG individually and dynamically to your needs relying on a strong API:

  • HTTP API: Access monitoring data and manipulate monitoring objects using HTTP requests
  • Custom Sensors: Create your own sensors for customized monitoring
  • Custom Notifications: Create your own notifications to send alarms to external systems
  • New REST API Sensor: Monitor almost everything that provides XML or JSON

box.png

Reader tips from our knowledge base

Our knowledge base contains thousands of answers to every possible question regarding monitoring with PRTG. When it comes to network security, we recommend the following articles:

IPv6 Cheat Sheet

IT security is an important factor for companies

Is IT security getting the importance it deserves in your company? In our top sheet we collected 13 efficient ways for you to sensitize everyone in your organization to IT security. Learn how to create awareness for IT security and which common technical measures you need to implement.

Get your free copy of our tip sheet about IT security now.

 

Made in Germany: The PRTG Network Monitoring Tool is the fruit of an engaged team. The company was founded by Dirk Paessler. The PAESSLER AG headquarters are located in the city of Nuremberg, in the heart of Germany. We combine typical German virtues such as high quality standards, industriousness, and commitment with international, cosmopolitan flair. Read more about our firm here. By the way: We are regularly looking for new recruits.

Case Studies: Airports, utility companies, banks, colleges, hospitals: PRTG is present in every industry. For each of our customers, business and organizational processes depend on the proper functioning of the network infrastructure. The PRTG customer satisfaction is close to 100%. Read in our case studies how our customers use PRTG.

Product tests: It goes without saying that we are convinced by the quality of PRTG. But what about the others? PRTG has always performed extremely well in tests. PRTG user “LanLine” sums it up best: “PRTG was already good several years ago, and has gotten better from version to version ever since.” Such has been our steadfast and sincere goal. Read more about monitoring software product tests and comparisons here.

Support: Our support team works hard every day to help customers solve their monitoring problems. Our goal is to resolve all inquiries within 24 hours (on business days). We've drafted a comprehensive manual and built up an extensive knowledge base featuring videos, webinars, and FAQs. All support, of course, is also included!

Getting started is easy: The trial version is free, which means you can try our monitoring tool risk-free. To switch to another version of PRTG, simply search for an appropriate license. You can upgrade any time you like.

 

shadow it

How dangerous is Shadow IT?

Any IT infrastructure that is set up without the IT department is typically called Shadow IT. From private smartphones and USB sticks to new cloud services, to private printers brought into the office – Shadow IT takes on many forms.

In our latest ebook you will read about 7 steps to gaining control of Shadow IT.

Get your free copy of our ebook about Shadow IT now.

 

PRTG

Network Monitoring Software - Version 18.4.47.1962 (December 11th, 2018)

Hosting

Download for Windows and hosted version available

Languages

English, German, Spanish, French, Portuguese, Dutch, Russian, Japanese, and Simplified Chinese

Pricing

Up to 100 sensors for free (Price List)

Unified Monitoring

Network devices, bandwidth, servers, applications, virtual environments, remote systems, IoT, and more...

Supported Vendors & Applications

More >>