Broadcom Network Flow Analysis provides network traffic visibility by capturing and analyzing network flow data, helping businesses manage and optimize their IT resources efficiently. It's designed for IT professionals looking to enhance network performance and security.

| Product | Mindshare (%) |
|---|---|
| Broadcom Network Flow Analysis | 2.1% |
| Cisco DNA Center | 9.4% |
| OpenText Network Node Manager | 5.5% |
| Other | 83.0% |
Broadcom Network Flow Analysis offers flexible pricing tailored to the needs of enterprises. Prices vary based on deployment size, features, and support levels, starting from a few thousand dollars annually. Enterprise users highlight its scalability and effectiveness, though some note its higher cost compared to other solutions. Businesses seeking comprehensive network visibility find its pricing justified by the advanced analytics and robust data visualization capabilities provided.
Users highlight that Broadcom Network Flow Analysis provides efficient customer service and robust support. Issues are addressed promptly, and the technical team offers clear guidance. Some users appreciate the knowledgeable and friendly representatives. However, a few mention occasional delays in response times.
Broadcom Network Flow Analysis aids in monitoring network traffic, identifying bottlenecks, and gaining insights into network performance issues. It supports capacity planning and ensures that resources meet organizational requirements. Ideal for large-scale networks, it provides scalability and customization for different business environments, allowing users to delve into detailed traffic patterns, optimize bandwidth allocation, and enhance overall network security.
What are the critical features of Broadcom Network Flow Analysis?In industries such as finance and telecommunications, Broadcom Network Flow Analysis is utilized to monitor high-volume data transfers, ensuring that networks operate smoothly and securely. Its ability to integrate with existing infrastructure makes it a favored choice for businesses handling sensitive data, helping them maintain compliance with industry regulations while optimizing network performance.
Broadcom Network Flow Analysis was previously known as CA NetQoS Reporter Analyzer, CA NFA, CA Network Flow Analysis.
Empowered, BCBST
| Author info | Rating | Review Summary |
|---|---|---|
| Principal Consultant at KyndleIT Consulting | 4.0 | I use Broadcom Network Flow Analysis to monitor traffic flow and protocol classification in my company. It effectively measures bandwidth utilization and manages SLAs and QoS metrics, although it lacks support for high-availability solutions. |
| SI Engineer at a tech vendor with 201-500 employees | 3.5 | I value its custom reports and data presentation for customer monitoring. I wish for a more user-friendly dashboard, as custom reports sometimes jam, needing support (5/10). Basic NetFlow knowledge is required. |
| IT Consultant at a tech vendor with 51-200 employees | 4.5 | I've used this solution for 7 years, finding its custom reporting, flow forensics, and traffic alerts very valuable. Setup was quick, and I experienced no stability or scalability issues. Enhanced API support would be my main improvement. |
| CCS at a comms service provider with 10,001+ employees | 4.5 | I find the drill-down features and utilization charts invaluable for network troubleshooting. Although customer service is poor and setup was complex, I recommend this product for its rich real-time traffic data and flexible presentation, despite not using all features. |
| Works at a tech services company with 10,001+ employees | 4.5 | I found the Anomaly Detector valuable for traffic analysis. Setup is simple but costly, with harvester capacity limiting scalability. I only recommend it for vast flow analysis, as expensive licenses are unsuitable for limited scopes. |
| IT Specialist at a tech services company with 201-500 employees | 4.0 | I primarily use Broadcom Network Flow Analysis for bucket flow visibility. The solution offers valuable features like bucketful visibility options and easy deployment. However, it could benefit from additional security features, such as a lost protection package. |