?
Solved

Network Bandwidth Monitoring Software

Posted on 2013-02-05
4
Medium Priority
?
661 Views
Last Modified: 2013-02-06
I was hoping to get some recommendations for a great software that would monitor network bandwidth.  We seem to be spiking and I can not find out where the issue is coming from.  We will pay for software, so keep that in mind.

Any thoughts would be greatly appreciated.
0
Comment
Question by:Daniel Fishkin
4 Comments
 
LVL 14

Accepted Solution

by:
BlueCompute earned 668 total points
ID: 38857600
LAN or WAN?  If your referring to internet usage then that's best monitored at the gateway (router).
0
 
LVL 20

Assisted Solution

by:agonza07
agonza07 earned 668 total points
ID: 38857688
0
 
LVL 25

Assisted Solution

by:madunix
madunix earned 664 total points
ID: 38858561
Get Cacti!

Check the following list(Free, Pay and Open Source)
http://www.ntop.org/ Ntop
http://www.groundworkopensource.com GroundWork Monitor Enterprise
http://www.hyperic.com Hyperic HQ
http://www.icinga.org Icinga
http://www.nagios.com Nagios
http://www.n-able.com N-central
http://www.op5.com op5 Monitor
http://www.open-itcockpit.com openITCockpit
http://www.opennms.org OpenNMS
http://www.hp.com/de/bto HP OpenView
http://www.bmc.com BMC PATROL ProactiveNet Performance Management
http://www.shinken-monitoring.org Shinken
http://www.ibm.com/software/de/tivoli IBM Tivoli
http://www.ca.com/de CA Unicenter
http://www.whatsupgold.com WhatsUp Gold
http://www.zabbix.com Zabbix
http://www.zenoss.com Zenoss Enterprise
http://cacti.net/  cacti
http://oss.oetiker.ch/mrtg/  mrtg
http://www.paessler.com/prtg PRTG
http://www.softperfect.com/products/networx/
0
 

Author Closing Comment

by:Daniel Fishkin
ID: 38862577
Thanks for all the great input
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Trying to figure out group policy inheritance and which settings apply where can be a chore.  Here's a very simple summary I've written which might help.  Keep in mind, this is just a high-level conceptual overview where I try to avoid getting bogge…
An article on effective troubleshooting
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Suggested Courses
Course of the Month17 days, 13 hours left to enroll

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question