WhatsUp Gold Flow Monitor (v. 16) - license

Mfg. Part: NA-6KVV-0160 | CDW Part: 2932749 | UNSPSC: 43232804
  • (v. 16)
  • license + 1 Year Service Agreement
  • 25 sources
  • Win
View Full

Request Pricing

This item is currently unavailable to purchase online.

Please contact us to place this order

Contact Sales Assistance
(800) 800-4239, Monday-Friday 7am-7:30pm CT

Email our Sales Assistance Team , Response within 24 Hours

Made For Each Other
Quick View
Total Price:

Product Overview

Main Features
  • (v. 16)
  • license + 1 Year Service Agreement
  • 25 sources
  • Win
WhatsUp Gold Flow Monitor provides in-depth insight into how your network is performing, allowing you to gather information analyze and report on traffic patterns and bandwidth utilization in real time. Flow Monitor not only highlights overall utilization for the LAN or WAN or for a specific device or interface, it also indicates the users, applications, and protocols that are consuming valuable network bandwidth. Flow Monitor offers network managers the ability to configure data it collects with thresholds. Thresholds allow managers to establish operational criteria and receive alerts when abnormal or specific events occur.

With WhatsUp Gold Flow Monitor, analyzing network traffic patterns and understanding how network bandwidth is utilized has never been simpler. Flow Monitor provides the level of insight you need to instantly identify network problems - such as which users are affecting overall performance or which applications need more bandwidth - so you can take action to ensure the network is performing within parameters.

WhatsUp Gold Flow Monitor enhances network security by providing detailed reporting of ICMP errors and failed connections by protocol type. and TCP port address. This information gives you real-time indications of where external attacks may have occurred - enabling you to take action before a major security breach can happen.

WhatsUp Gold Flow Monitor gives you a global view of your network traffic with the relevant information you need to understand what applications and which users and protocols are consuming network bandwidth.

^ Back to Top