
ntopng Edge protects digital assets and online activities by binding devices to users, enforcing layer-7 policies, blocking unsafe traffic, and ensuring bandwidth availability.
Vendor
ntop
Company Website
YouTube
ntopng Edge (nEdge) is a software application designed to protect local area networks (LANs) by managing connected devices and controlling internet bandwidth usage. It ensures internet availability for business-critical applications by preventing bandwidth misuse and securing the network against unwanted traffic that could lead to data breaches. ntopng Edge allows administrators to specify per-user layer-7 protocol policies, protecting the network from malware and unsafe destinations. It also ensures fair bandwidth sharing by preventing bandwidth hogs. ntopng Edge discovers and categorizes all devices connected to the network, including silent ones, providing information about device type, family, model, and operating system. It detects new devices and can send alerts for unknown devices. The software can operate in two modes: Bridge and Router. In Bridge mode, it creates a transparent bridge between LAN and WAN interfaces, enforcing network policies without requiring reconfiguration. In Router mode, it routes traffic based on device and layer-7 application, supporting multiple WAN interfaces. Additional features include a captive portal for user authentication, load balancing, and failover in Router mode. ntopng Edge is designed to be easy to install and use, with a web-based graphical interface for controlling bandwidth and managing devices. It integrates safe DNS with IP and domain lists to provide continuous protection, automatically generating alerts and blocking communications involving malicious peers. Service micro-segmentation allows administrators to create policies that explicitly permit only certain traffic to be exchanged, tailoring security settings individually on a host basis.
Features & Benefits
- Ensured Internet Availability
- Helps network administrators ensure a smooth, controlled operation of complex networks by accurately managing the many different connected devices that compete to access the Internet.
- Layer-7 Applications Traffic Blocking/Throttling
- Enforces policies to block or throttle Layer-7 applications traffic without requiring changes in the network topology.
- Inline Unsafe Traffic Blocking
- Integrates safe DNS with IP and domain lists to provide continuous protection, automatically generating alerts and blocking communications involving malicious peers.
- Service Micro-Segmentation
- Allows administrators to create policies that explicitly permit only certain traffic to be exchanged, tailoring security settings individually on a host basis.
- Active and Silent Devices Discovery
- Discovers and accurately categorizes all the devices connected to the network, including those that are silent.
- Captive Portal
- Authenticate users with a login page before allowing them to access the Internet.
- Load Balancing and Failover
- In Router Mode, when multiple WANs are configured, powerful routing policies can be implemented on a per-user basis.