Questions about Ipswitch products?
Contact Us: 1-877-386-3763
Direct: 1-780-430-6240

WhatsUp Gold Flow Monitor 25 New Sources with 12M Service

Flow Monitor makes it easy to conduct traffic identification and analysis, as well as verify Quality of Service (QoS) through ToS, DSCP for the LAN/WAN, or new Top NBAR and CBQoS reports.
SKU: NA-6KVV-0160

Call for pricing


We Accept Visa, Mastercard, American Express Cards
Bookmark and Share

Analyze and manage network and application traffic and bandwidth

Available as an integrated WhatsUp Gold plug-in, Flow Monitor provides detailed insight into how your network bandwidth and capacity are utilized and by whom. Flow Monitor not only highlights the overall utilization of the LAN, WAN, specific device, or interface, it also indicates which users, applications and protocols are consuming the bandwidth.

With Flow Monitor you can:

  • Understand how your network is being used and by whom
  • Determine exactly which users, applications or hosts are consuming network bandwidth
  • Display top talkers (by IP address), so you can determine exactly which hosts (authorized or unauthorized) are consuming critical bandwidth. For example, YouTube™ video streaming by multiple users may cause network congestion and slow down other critical business applications
  • Verify network QoS policies required to support applications like VoIP using TOS reports
  • Group flow sources and specific interfaces to focus directly on business critical systems and data flows.
  • Properly measure bandwidth usage
  • Automatically discover and configure flow sources
  • Verify billing from bandwidth service providers with 95th percentile reporting
  • Track and resolve network traffic or congestion problems using automatic classification of traffic by type and protocol in real-time
  • Plan for spikes in usage to avoid dropped packages or delays
  • Ensure critical business applications get the bandwidth they need
  • Protect and secure your network
  • Track the number of failed interface connections, which can indicate external attacks on your network and other rogue activity directed at your network
  • Detect the use of unauthorized applications, enabling you to ensure your network’s security compliance and legal liability
  • Track traffic anomalies to quickly detect the introduction of viruses and worms into the corporate network