"It is quite an intelligent product."
"Cisco Sourcefire SNORT is easy to configure and the reporting is great. It's also very user-friendly."
"The solution appears to be stable, although we haven't used it heavily."
"This is a good security product."
"The product is at the forefront of auto-remediation networking. It's great."
"The implementation could be a bit easier."
"I did not experience any pain points that required improvement. Maybe a couple of false-positives, but that's about it."
"I'm not aware of any lacking features."
"The price of Splunk UBA is too high."
"Currently, a lot of network operations need improvement. We still need people to handle incidents. Our vision is to leverage status and convert it directly from the network devices. It would be ideal if we could take action using APIs and API code and remove manual processes."
Snort is an open-source, rule-based, intrusion detection and prevention system. It combines the benefits of signature-, protocol-, and anomaly-based inspection methods to deliver flexible protection from malware attacks. Snort gained notoriety for being able to accurately detect threats at high speeds.
Cisco Sourcefire SNORT is ranked 15th in Intrusion Detection and Prevention Software (IDPS) with 2 reviews while Splunk User Behavior Analytics is ranked 11th in Intrusion Detection and Prevention Software (IDPS) with 3 reviews. Cisco Sourcefire SNORT is rated 7.6, while Splunk User Behavior Analytics is rated 8.6. The top reviewer of Cisco Sourcefire SNORT writes "Intelligent with good threat detection capabilities but could be easier to implement". On the other hand, the top reviewer of Splunk User Behavior Analytics writes "Stable, with good automation capabilities, however, we want to be able to automate even more". Cisco Sourcefire SNORT is most compared with Check Point IPS, Palo Alto Networks Threat Prevention, Fortinet FortiGate IPS, Cisco NGIPS and Fortinet FortiWeb, whereas Splunk User Behavior Analytics is most compared with Darktrace, Elastic Enterprise Search, Cisco Stealthwatch, Microsoft Defender for Identity and IBM QRadar User Behavior Analytics. See our Cisco Sourcefire SNORT vs. Splunk User Behavior Analytics report.
See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.