No more typing reviews! Try our Samantha, our new voice AI agent.

Cisco Sourcefire SNORT vs Trend Micro Deep Discovery [EOL] comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 26, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Sourcefire SNORT
Average Rating
7.8
Reviews Sentiment
6.8
Number of Reviews
20
Ranking in other categories
Intrusion Detection and Prevention Software (IDPS) (14th)
Trend Micro Deep Discovery ...
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
29
Ranking in other categories
No ranking in other categories
 

Featured Reviews

reviewer2772102 - PeerSpot reviewer
Cloud Architect at a consultancy with 1-10 employees
Logging and customizable rules have helped improve threat monitoring and detection
The logging is mainly what I consider one of the best features with Cisco Sourcefire SNORT. Being able to log and store it in a file allows you to push it to a centralized repository. The logging and reporting help improve incident response. You should always be logging threats, any sort of misconfiguration, and anything that could be an issue. It's important to at least log and monitor it. The basic rules provide a good baseline in assessing Cisco Sourcefire SNORT's ability in providing real-time analytics for threat detection, but as a professional, you should look to constantly modify that baseline. They provide extensive customizability so you can define your own rules. The customizability allows it to be adaptable in protecting against diverse network threats to the constant change.
reviewer2266119 - PeerSpot reviewer
Senior IT Security Engineer at a financial services firm with 5,001-10,000 employees
Has improved email security through advanced filtration and timely threat detection
I work with Trend Micro Apex One. I have used the Deep Discovery's Sandbox analysis feature, and we utilize another appliance known as Deep Discovery Analyzer, abbreviated as DDA. This tool makes analysis for URLs and attachments contained in inbound emails, so whenever we receive an email with a URL or attachment, it will be analyzed by Trend Micro Deep Discovery Analyzer. In evaluating Deep Discovery's real-time visibility on network traffic, it is important to note that we applied our Deep Discovery Analyzer for Trend Micro to conduct sandboxing specifically for email channels only, and we do not utilize it for network channels. For network channel sandboxing, we use a solution called FortiAnalyzer, which belongs to another team called network security. I assess Deep Discovery's effectiveness in identifying sophisticated attack patterns by looking at how it handles high traffic loads, and how effectively it can use its instances and images to analyze numerous URLs and attachments simultaneously. Additionally, I evaluate its ability to maintain round-robin or load balancing across different analyses without leaving samples queued for analysis. The performance is critical when the product updates for signatures are up-to-date, as this aids in the detection and classification of URLs and attachments without delay in the analysis process. On a scale of one to ten, I rate Trend Micro Deep Discovery a nine.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature is the ability to automatically learn the traffic in our environment, and change the merit recommendations based on that."
"The most valuable feature is reliability, and this solution is better than Check Point."
"Users have access to intelligent security automation as one of the features, which can easily automate your event impact assessment so your IPS policy tuning can be done as well as your network behavior analysis, and you can do real-time contextual awareness with correlation of events created on your applications, user devices, operating systems, or vulnerabilities, with all of this real-time data captured including your apps and port scans."
"This solution makes life a lot easier as there are fewer man-hours required and we no longer need too many resources to manage it."
"Scalability is something that Cisco has always cared about."
"The URL filtering is very good and you can create a group for customized URLs."
"There are a lot of features that I really appreciate with Firepower, which is why I advise most of my customers to go with Firepower."
"It simplifies the configuration process by offering pre-defined base configurations, including security and connectivity settings."
"The most valuable feature is that the user can customize images of virtual machines in the sandbox functionality. The other vendors only use images that were created by the vendor but not the customer, end-user or partner. This helps to detect advanced threats and attacks."
"As a security product, managing threats is crucial for my clients."
"The real-time visibility on network traffic provided by Trend Micro Deep Discovery is good, and my customer is satisfied."
"Trend Micro Deep Discovery is a very specific product for threat intelligence with smart protection."
"The most valuable features are the protection and that it is fast."
"The HTML file sandboxing is very good."
"I like the sales operations testing. and support."
"Trend Micro is a good solution and our clients are happy with it."
 

Cons

"While the alerts they offer are good, it could improve it in the sense that they should be more detailed to make the alerts more useful to us in general. Sometimes the solution will offer up false positives. Due to the fact that the alerts aren't detailed, we have to go dig around to see why is it being blocked. The solution would be infinitely better if there was just a bit more detail in the alert information and logging we receive."
"To be frank, the product is not really stable, although they're working on that. Whenever I go to the technical community with an issue, they will usually say that it is not there yet, but the technical team are working on it. The issues are not insolvable. I think they should just keep working on the product to make sure that the product can become very stable. The technical support is great. I appreciate that. We have a lot of communities supporting Firepower now, so you can find help for whatever issue you have."
"A lot of Cisco equipment is very good, but in judging the model of this solution that we have, I feel that it is the worst."
"This solution needs to be more customizable."
"There are problems setting up VPNs for some regions."
"Integration with other components — even Cisco's own products — can be enhanced to improve administrative experience."
"The implementation could be a bit easier."
"I would like to have analytics included in the suite."
"There were a few instances where legitimate traffic (WPAD) was flagged as C2 communication."
"I am not aware if Trend Micro Deep Discovery provides any return on investment or cost reductions; it may not be beneficial in terms of finance."
"The product's security features need enhancement."
"Trend Micro can improve the pricing in general. There is nothing else they can add or improve in the solution."
"I would like to see integration with third-party tools to improve the visibility of the dashboards."
"Additionally, better scanning capabilities for third-party applications would ensure comprehensive security without the need for exclusions."
"The solution could be more secure."
"All issues we faced related to false positives regarding many hashes and URLs specifically for mail gateway and sandboxing, which led us to open a threat ticket with Trend Micro support for validation."
 

Pricing and Cost Advice

"Licensing for this solution is paid on a yearly basis."
"We have a three-year license for this solution."
"If one is an extremely expensive product, and ten is cheap, I rate the tool's price as a five."
"I don't know the exact amount, but most of the time when I go to a company with a proposition, they will say, "This thing that you are selling is good, but it's expensive. Why don't you propose something like FortiGate, Check Point, or Palo Alto?" Cisco device are expensive compared to other devices."
"The cost is per port and can be expensive but it does include training and support for three years."
"Trend Micro Deep Discovery is quite expensive compared to other endpoint security products."
"The price of the solution is lower compared to the competition."
"Overall, the price is good."
"The licensing cost is a bit pricey. We pay a yearly subscription."
"The tool’s licensing costs depend on the customers."
"Its price is fine, but Trend Micro can improve the pricing in general. It is a hardware solution. It is based on the number of nodes, and according to the number of nodes, clients decide which box they should acquire. They have to renew their license every year. It is subscription-based."
"Overall, Trend Micro Deep Discovery has proven to be a reliable solution that enhances our security posture while minimizing operational disruptions."
"The pricing is okay for some, and sometimes, some people find it expensive."
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
886,576 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
University
10%
Financial Services Firm
9%
Construction Company
9%
Comms Service Provider
8%
Financial Services Firm
11%
Computer Software Company
8%
Manufacturing Company
8%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise8
Large Enterprise7
By reviewers
Company SizeCount
Small Business16
Midsize Enterprise6
Large Enterprise9
 

Questions from the Community

What is your experience regarding pricing and costs for Cisco Sourcefire SNORT?
If one is an extremely expensive product, and ten is cheap, I rate the tool's price as a five. There are some other tools in the market that are more expensive than Cisco. There are no additional c...
What needs improvement with Cisco Sourcefire SNORT?
I have not had much experience with the community-driven rule set while utilizing Cisco Sourcefire SNORT. I don't have experience with recognizing zero-day vulnerabilities, but based on my knowledg...
What is your primary use case for Cisco Sourcefire SNORT?
Endpoint protection is the main use case. The main aspect involves specifying different rules, and when network traffic hits these rules, it will try to block the traffic or at least log the traffi...
What do you like most about Trend Micro Deep Discovery?
The tool's most valuable feature is its collaboration with other products. Integrating with other security products was simple and easy.
What needs improvement with Trend Micro Deep Discovery?
Server Protect is not commonly used. When considering the Sandbox feature, it only inspects small files, and not all types of files are supported. The solution is very expensive. The solution is no...
 

Also Known As

Sourcefire SNORT
Trend Micro Deep Discovery Inspector, Trend Micro Deep Discovery Analyzer
 

Overview

 

Sample Customers

CareCore, City of Biel, Dimension Data, LightEdge, Lone Star College System, National Rugby League, Port Aventura, Smart City Networks, Telecom Italia, The Department of Education in Western Australia
Allied Telesis, Atma Jaya Catholic University of Indonesia, Babou, Blekinge County Council, Delacour, Hiroshima Prefectural Government, Live Nation Entertainment Inc., Mazda Motor Logistics Europe, McGill University Health Centre, Mikuni Corporation, OKWAVE, Sinar Mas Land, SWICA, UTOC Corporation
Find out what your peers are saying about Fortinet, Darktrace, Check Point Software Technologies and others in Intrusion Detection and Prevention Software (IDPS). Updated: April 2026.
886,576 professionals have used our research since 2012.