Try our new research platform with insights from 80,000+ expert users

AppNeta by Broadcom vs SolarWinds NPM comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 10, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

AppNeta by Broadcom
Ranking in Network Monitoring Software
49th
Ranking in Cloud Monitoring Software
33rd
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
17
Ranking in other categories
Digital Experience Monitoring (DEM) (11th), DX NetOps (3rd)
SolarWinds NPM
Ranking in Network Monitoring Software
4th
Ranking in Cloud Monitoring Software
8th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
160
Ranking in other categories
IT Infrastructure Monitoring (5th)
 

Mindshare comparison

As of January 2026, in the Network Monitoring Software category, the mindshare of AppNeta by Broadcom is 0.7%, up from 0.7% compared to the previous year. The mindshare of SolarWinds NPM is 3.4%, down from 4.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Network Monitoring Software Market Share Distribution
ProductMarket Share (%)
SolarWinds NPM3.4%
AppNeta by Broadcom0.7%
Other95.9%
Network Monitoring Software
 

Featured Reviews

Out West - PeerSpot reviewer
Project Manager and IT Management Consultant at a integrator with 1,001-5,000 employees
Provides great visibility, offers quantifiable data, and helps with testing latency tolerance
When you look in the layer 7 environment, you actually can see the code operating against the two parties. It could be a client server, a web server, or a database server. It could be a database server and another database server. You can look at whatever those application components are and you see how they're interoperating. If for some reason, there's a runaway command or something that's inefficient, you can see the command that's being executed and the players that it's operating against. I did that with the infrastructure team and the application development team, and we could very quickly remedy problems with the application that the organization was facing for an extended period of time, even before my project was initiated. I've recently looked at their current offering and see that they can investigate Layer 7 network to see what commands are being written and passed or returned. That's quite useful. It will help identify latency and if it is related to the traffic or the code itself. That, in turn, helps people debug more quickly. We can rectify issues in days as opposed to months. I like that we have quantifiable data in order to get true measures. The solution provides more visibility into the monitoring of traffic. It helps address blind spots. It develops an intelligent fabric that gives you a more realistic view of the true traffic within the environment. When it comes to the visibility into the infrastructure, it is imperative that the people applying these probes understand the reference architecture and understand their segmentation model. Sometimes if an organization has a compliance responsibility, then normally, the segmentation models are somewhat defined. If, for some reason, the organization is open and there aren't too many like that anymore, then there are no problems. You start to segment the incident and try to understand the relationship between these different assets and the environment, it might block traffic and you might not be able to see it. When you're dealing with Cisco fabric, if for some reason you have a host hanging off a distribution switch and another host hanging off a distribution switch based on the Cisco fabric, that traffic may never hit the core switch. Sometimes people analyze NetFlow off the core, but if something is operating through a distribution switch, you will never see that traffic when you're dealing with a Cisco fabric. I define that as a layer 2 blind spot. In order for you to rectify that, you have to have probes in environments that travel through the course switch to see the full amount of traffic. Once you set up the fabric, that becomes one large network to your network environment, and they're not traffic tracking anything within it until it hits a port somewhere. Alerting is becoming more critical over time. I've been in this business for a long time. Twenty years ago we'd be in a data center and we'd have a perimeter network and we'd be done. The bottom line would be very difficult for someone to come in and compromise my environment. Then we extended our environments from on-premise into co-location. Now we actually have traffic that goes over a wide area network. As such, our security profile changes over time. At first, we would normally do it through all layer 2 relationships or VPN-type environments, but now we're doing it over the internet. The instant we poke a hole through your internet, even though we have a tunnel within it, we're exposed to a higher-threat environment. Now that we're in the cloud, we're going through a higher-threat environment. Around two years ago there was an exploit that focused on the chip. So even if I'm using a cloud provider, I'm leveraging their hypervisor, and I have my own tenancy, at the end of the day everything runs through a processor. So when that processor exploit came through, around four years ago, that problem's wide open. At the end of the day, now more than ever, monitoring is important. Somebody noticed a spike in traffic, somebody compromised the environment. It was a ransomware attack. Because of that leading indicator plus the consideration of the compute environment as well, they could shut down the attack but if they didn't have that capability, they would've been taken advantage of. Based on the ability to look for those leading indicators that can be fed back or introduced into your SIEM environment to make sure that you're responding to any threats that may occur, which are more prevalent now than ever before. The user interface they have right now is very powerful.
Vivek Jaiswal - PeerSpot reviewer
Manager IT at a manufacturing company with 1,001-5,000 employees
Central monitoring has improved outage alerts and now needs smarter detection and modern dashboards
Regarding the automated network topology and mapping feature in SolarWinds NPM, I am not satisfied with it. For static monitoring, it is acceptable. However, if it is possible, I would need a feature in SolarWinds in the future for some kind of malfunctioning detection, such as malware attacks or that type of environment. We did not have any facility to detect that in SolarWinds. I think it would be better to incorporate those types of features. Regarding customization options in SolarWinds, the ability to customize the dashboard has room for improvement. The dashboard is quite old, and we need some improvement in it. Nowadays, we have multiple tools with AI-based monitoring and web-based dashboards. SolarWinds also has a web-based dashboard, but I think there is scope for improvement in the UI. There may be other areas I would like to improve in SolarWinds NPM.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"This solution helps prove that, if we move to cloud, we'll still be as effective as we are on-premises."
"Delivery and experience are valuable. The usage in terms of the traffic application captures and other similar things is also valuable."
"We get complete, hop-by-hop visibility into the internet and we can know how much latency is taking place from one hop to another. That way, we know whether a particular hop belongs to the ISP, or that it is something owned by our own client's office, or is something to do with the SaaS network."
"A lot of times one of the AppNeta transactions showed that there is an issue, whereas everything seemed to be working properly. Once we dug into it, we realized that it really was highlighting a problem that otherwise we would not have seen."
"The solution's technical support is very good."
"The product helps us understand networks and user experience. It helps us to understand the issues."
"The main feature that we use is what they call Delivery, which is the testing of network paths end-to-end."
"SolarWinds NPM is a scalable solution since it can handle a huge number of users."
"Provides a good level of tools and covers essential components."
"The solution is stable and reliable."
"Can easily be interconnected with other management systems."
"The set up was very easy. We didn't have any problems with the setup. The deployment took less than an hour."
"What I've found most valuable about the solution is that it's scalable."
"The solution ranks as one of the top five monitoring tools."
"We have configured multiple alerts for our network devices, including routers and switches, so that we are notified if any interface goes down."
 

Cons

"I think some of the product's documentation has shortcomings and needs improvement."
"Having to deal with configuring the end devices using a USB stick is a bit cumbersome. It would be nice if there was a better way of handling that."
"Cloud monitoring could be better. That's one of the biggest pain points for me. I have shared this feedback with them multiple times, but they're limited to some extent. That's one area where I've seen a problem."
"They should try and make diagnostics run a bit quicker. When the problem occurs on a network, AppNeta runs automatic diagnostics on the end-to-end path. The path it was testing only to the destination, it now runs the same test to all of the devices and all the intermediate devices. Depending on the number of intermediate devices, it can take several minutes to run. If we're trying to find or diagnose a problem that only lasts two or three minutes, it may be that the diagnostics is still running by the time the problem is cleared. The only thing, which I have also mentioned to AppNeta in the past, is that there should be much faster and much more lightweight diagnostics, which can be completed within 30 seconds or one minute, rather than in 5 to 10 minutes."
"I would like to see some advanced dashboard features. It could also be integrated with third-party tools. For example, an integration with a reporting solution would be helpful. Out-of-the-box, there are few dashboards or reports. What it does have is useful, but there should be additional dashboards."
"Instead of integrating with other people, they should expand their interior capabilities."
"AppNeta by Broadcom needs to add more features to its dashboards. It also needs to work on providing out-of-the-box reports."
"SolarWinds NPM can be very slow at times. The database optimization can be done to improve the product performance."
"The product is scalable, but at a cost. Extra modules have to be purchased for each extra server. The initial set up isn't complex, but will require someone who is experienced with the network monitoring system"
"It is not that stable. As a Windows software, I have seen issues with SolarWinds. The performance is slow."
"The scalability can be better."
"They have had a rather large security breach in the past. It's cost some companies customers."
"We decided that we were no longer going to trust that their products have not been capitalized."
"The console could be more user-friendly. It would be better if SolarWinds updated the user interface."
"This solution would benefit from expanding on the capabilities within the API."
 

Pricing and Cost Advice

"The small probe is probably around $3,000 and the very large probe that they make for massive data centers might be $50,000 or $60,000. It's a subscription model, so the payment is per year."
"We typically don't get involved in the commercial side, but the list price is probably something like $3,000 for a small probe. However, that gives all of the features that the probe can do, whether or not you use them. In the old days, up until two or three years ago, each of the separate features was a separately licensable module so that you could add things that you wanted, and you didn't have to add things that you didn't want. They've changed all that now, and everything the probe can do is a part of the base license."
"It's worth the money."
"AppNeta by Broadcom is not expensive."
"I inherited this from a different version, and I haven't yet gone through a renewal because we had purchased three years upfront. So, to me, that still remains to be seen. Once it comes up for renewal, we'll see what happens. Especially because now it is Broadcom, it is going to change anyway."
"Broadcom software is always a little expensive because they provide quality."
"I find the solution's price to be fairly good."
"We have a multi-year license for the use of this solution. There are additional costs for recourses in the environment."
"It is expensive."
"SolarWinds is expensive. That's why it's primarily banks using the solution. Small businesses can't afford it. Due to its pricing, most smaller enterprises like manufacturing companies are not interested. For example, we have a client who is also interested in traffic monitoring, but they are not purchasing SolarWinds because of the cost."
"We pay approximately $700 per year for renewal of the license."
"SolarWinds NPM has different pricing models available. The cost of the solution is less than some competitors."
"The solution's pricing is low compared to a lot of other tools in the market."
"The price is more expensive than some other products, such as ManageEngine."
"The pricing is very expensive for SolarWinds. That's a huge disadvantage for it."
report
Use our free recommendation engine to learn which Network Monitoring Software solutions are best for your needs.
881,282 professionals have used our research since 2012.
 

Comparison Review

it_user174738 - PeerSpot reviewer
IT Developer at a tech services company with 51-200 employees
May 31, 2015
Nagios vs. Zabbix vs. PRTG vs. Spiceworks vs. Solarwinds Network Performance Monitor
I have researched a quite a few network monitoring tools which can be used for various monitoring purposes of not only the servers, but the intermediate routers as well. There are majorly three types of these softwares. Ones which are completely open-source, you can do almost anything you want…
 

Top Industries

By visitors reading reviews
Manufacturing Company
15%
Financial Services Firm
15%
Computer Software Company
7%
Insurance Company
7%
Manufacturing Company
11%
Financial Services Firm
10%
Computer Software Company
9%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise5
Large Enterprise8
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise33
Large Enterprise85
 

Questions from the Community

What open source tool can one use to measure bandwidth from one's upstream service provider?
One I am looking closely at is AppNeta. They have an appliance that can digest the flow and do a better job than Netflow. The other one we are using is ExtraHop. This has both a Datacenter Hig...
What is the best network monitoring software for large enterprises?
It actually depends on the exact purpose or kind of devices (network devices, servers, something else). Some tools are better for only network devices while others are better for a cloud monitoring...
What is the best network monitoring software for large enterprises?
We are partners with SolarWinds and we sell a lot of Network management to large enterprises also because of scalability, products like Network Performance Monitor & Netflow Traffic Analyzer ar...
 

Also Known As

No data available
Solarwinds Network Performance Monitor, SolarWinds Network Bandwidth Analyzer
 

Overview

 

Sample Customers

Ebay, Citrix, National Instruments, Marriott, AT&T, Bon-Ton, McDonald's, Netflix, PayPal, Uber, QAD
Microsoft, Federal Express, Hewlett-Packard, and MasterCard
Find out what your peers are saying about AppNeta by Broadcom vs. SolarWinds NPM and other solutions. Updated: January 2026.
881,282 professionals have used our research since 2012.