

Find out what your peers are saying about Fortinet, Darktrace, Check Point Software Technologies and others in Intrusion Detection and Prevention Software (IDPS).
| Product | Mindshare (%) |
|---|---|
| Cisco Sourcefire SNORT | 3.1% |
| Trellix Host Intrusion Prevention System | 0.7% |
| Other | 96.2% |
| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 8 |
| Large Enterprise | 7 |
Cisco Sourcefire SNORT is a versatile cybersecurity tool offering threat detection, scalability, and integration with Cisco tools. It is recognized for ease of configuration and comprehensive protection, making it suitable for intrusion prevention and firewall applications.
Cisco Sourcefire SNORT provides advanced malware protection and integrates seamlessly with Cisco products. It enables automatic IPS tuning, real-time visibility, and intelligent security automation, which together enhance network security. Users benefit from its URL filtering, email spam elimination, and it delivers low false positives. Though highly effective, feedback highlights a desire for improvements in stability, dashboard effectiveness, traffic blocking customizations, and integration with Cisco DNA Center. Cost concerns and calls for cloud-based deployments also emerge in user feedback. Technical support and performance are also discussed, with VPN configuration posing challenges.
What are the key features of Cisco Sourcefire SNORT?Organizations primarily deploy Cisco Sourcefire SNORT for network security in sectors like finance and healthcare. Used extensively in data centers with Cisco Firepower, it provides intrusion prevention, URL filtering, and VPN security. Pre-configured settings make it practical for on-premises deployment, ensuring secure user-to-server and server-to-server interactions.
Trellix Host Intrusion Prevention System provides advanced security for enterprise networks, focusing on proactive threat prevention and real-time protection. It is designed to meet the demands of modern cybersecurity with its comprehensive features.
Designed for experienced IT professionals, Trellix Host Intrusion Prevention System effectively safeguards systems from potential threats, helping to reduce the risk of data breaches. It integrates seamlessly with existing infrastructure, offering customizable protection tailored to network requirements. Through automated threat detection and response, it optimizes security processes and minimizes manual intervention, ensuring efficient, reliable protection across enterprise environments.
What are the key features of Trellix Host Intrusion Prevention System?Trellix Host Intrusion Prevention System finds applications across industries such as finance, healthcare, and retail, where data protection is crucial. In finance, it prevents unauthorized access, ensuring transaction integrity. Healthcare facilities use it to protect patient data while retail environments rely on its capabilities to secure customer information during digital transactions. Its adaptability and robust protection make it a preferred choice for sectors with demanding security requirements.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.