The Intentionet team is joining AWS. We thank our customers and the open source community for their support over the years. We are proud of the technology and the community we have built, and we are excited to continue, under a new umbrella, our mission of transforming how networks are engineered. Visit and join our Slack channel to stay abreast of ongoing developments.

Visualize how your cloud resources communicate

Understanding the connectivity between your cloud resources can be problematic. For effective network operations, you need a clear understanding at all times of how instances communicate, within a cloud, across multiple clouds and to/from the internet. Tools like AWS Network Manager or Google Cloud Network Intelligence Center allow you to explore connectivity within your cloud environments, but in very limited ways, leaving network and application team scrambling to cobble together a solution.

Connectivity and security, under a single pane of glass

Batfish Enterprise provides a unified view of connectivity across cloud environments. With Batfish Enterprise Virtual Traceroute, you can see and understand how endpoints communicate across your cloud network. Get visibility into not only the available paths between end-points, but also why paths were selected, and how packets are transformed via load balancers and filtered by network ACLs and security groups.

Batfish Enterprise Traceroute view - Internet Gateway details

Batfish Enterprise Traceroute view - instance details

Analyze the security posture of your cloud resources

Batfish Enterprise Virtual NMAP provides an unprecedented level of visibility into the security posture of your network. Virtual NMAP is a comprehensive analysis of your network, unlocking insights into all the possible flows that can reach any end-point. Just a quick glance at this dashboard and you can identify potential security holes.

Analyze and detect vulnerabilities proactively

Additionally, you can leverage Batfish Enterprise to evaluate changes you are thinking about making to the network. By getting this built-in analysis up front, you can easily identify and address vulnerabilities before they ever make it into your infrastructure.