All the device manufactures have their own software and most likely they are preferred over other third party. Primary reason is that single vendor approach still reduces risk for operation team.
However there are third party tools like Solar winds etc. more details mentioned in an article below.
For choice I listed few below most effective.
- SolarWinds Network Performance
Far more than just a simple scanner. Most network security issues arise when configurations are changed and SolarWinds NPM identifies these and can automatically resolve many. Alongside solid vulnerability scanning and advanced options to create and monitor policies, this is by far the top choice for network monitoring systems.
- Paessler PRTG Network MonitorFree network monitoring software that uses SNMP, packet sniffing and WMI to monitor your network.
- AteraCloud-based RMM system includes a large range of monitors – server, network device, and application – suitable for all sized businesses.
- Site24x7Network management platform tools that can monitor network devices, websites, servers, applications, and more.
- ManageEngine OpManagerNetwork monitor that can monitor SNMP devices, switches, servers, and virtualized network services.
- Nagios Core– One of the top open-source network monitoring tools. Includes a dashboard view, alerts system, community plugins, and more.
- Zabbix– Open source network monitoring software with SNMP and IPMP monitoring. Includes an alerts system and community plugins.
- Zenoss Cloud – Application and network service monitoring tool with machine learning anomaly detection and root cause analysis.
- Icinga– Open source network monitoring system with a DSL. Includes extensions.
- Spiceworks Connectivity Dashboard– Free network monitoring software with a high-quality dashboard and simple alert system.
So essentially two things to keep in mind from SNMP based monitoring to proprietary monitoring to some Netflow and now network devices are moving to Telemetry based real time monitoring.
The real choice selection is based on the end user environment is it more based on LAN or uptime for the operation team also involves the bandwidth monitoring or link monitoring
The purpose of this article is also consider Device monitoring ( personal computing devices ) and Content protection as a one strategy solution and not separate. However important is to understand that there is no single solution or single vendor approach here.
This is where approach of system integrators means a lot. Randomly selecting vendor to stitch a solution is by far the biggest reason for projects taking time to complete and rather leave customer dissatisfaction.
We have compiled a list of approach ( practices and solution ) for the current times where SaaS based application also play there part.
- Consider Physical security of devices ( this includes passwords, device auto lock out, Auto Wipe )
- Mobile Device management or Mobile Application management – This doesnt need to be for all devices but could be for devices and users that deal with sensitive information.
- Information Security practices.
- Privilege access management and Device management- Although highlighted by NESA in UAE , still lot of customers don’t use it.
- Centralized monitoring and reporting.
- SaaS application security and monitoring.
- Policy framework to be created for type of content and information to be used freely in an enterprise.