Darktrace is a leading cybersecurity solution that leverages artificial intelligence and machine learning to provide advanced threat detection, response, and risk management capabilities. Many reviewers find Darktrace's AI and machine-learning capabilities to be valuable. They appreciate its ability to detect anomalies and threats that might go unnoticed by traditional security tools. Overall, the general sentiment towards Darktrace from reviewers is positive. Users seem to appreciate its scalability, stability, AI capabilities, visibility, and ease of use.
It is inexpensive considering what it can do and the competition.
If you consider the features and the cost of market leaders, we are satisfied with the pricing.
It is inexpensive considering what it can do and the competition.
If you consider the features and the cost of market leaders, we are satisfied with the pricing.
Vectra threat detection and response is a complete cybersecurity platform that collects, detects, and prioritizes security alerts. The Cognito platform for Network Detection and Response (NDR) detects and responds to attacks inside cloud, data center, Internet of Things, and enterprise networks. The platform also provides automated response capabilities for low-level threats and escalates more severe anomalies to security personnel.
The license is based on the concurrent IP addresses that it's investigating. We have 9,800 to 10,000 IP addresses.
There are additional features that can be purchased in addition to the standard licensing fee, such as Cognito Recall and Stream.
The license is based on the concurrent IP addresses that it's investigating. We have 9,800 to 10,000 IP addresses.
There are additional features that can be purchased in addition to the standard licensing fee, such as Cognito Recall and Stream.
Cisco Secure Network Analytics is a highly effective network traffic analysis (NTA) solution that enables users to find threats in their network traffic even if those threats are encrypted. It turns an organization’s network telemetry into a tool that creates a complete field of vision for the organization’s administrators. Users can find threats that may have infiltrated their systems and stop them before they can do irreparable harm.
It is worth the cost.
Pricing is much higher compared to other solutions.
It is worth the cost.
Pricing is much higher compared to other solutions.
Parsing hundreds of trivial alerts. Managing a mountain of data. Manually forwarding info from your endpoints. Forget that. InsightIDR instantly arms you with the insight you need to make better decisions across the incident detection and response lifecycle, faster.
I am sure that there are cheaper products out there, but none that meet so many of our needs whilst maintaining stability and usability.
The team is very willing to work with companies. My suggestion is to call the Rapid7 sales department and see how they can help.
I am sure that there are cheaper products out there, but none that meet so many of our needs whilst maintaining stability and usability.
The team is very willing to work with companies. My suggestion is to call the Rapid7 sales department and see how they can help.
Kerio Control is a popular security product for small and medium-sized businesses. It is a next-generation firewall that provides unified threat management without complexity. Kerio Control provides advanced anti-virus protection and industry-leading web and content application filtering, and has a secure VPN.
Search and compare.
Pricing is good, but the licensing took a lot of time.
Search and compare.
Pricing is good, but the licensing took a lot of time.
Splunk User Behavior Analytics is a behavior-based threat detection is based on machine learning methodologies that require no signatures or human analysis, enabling multi-entity behavior profiling and peer group analytics for users, devices, service accounts and applications. It detects insider threats and external attacks using out-of-the-box purpose-built that helps organizations find known, unknown and hidden threats, but extensible unsupervised machine learning (ML) algorithms, provides context around the threat via ML driven anomaly correlation and visual mapping of stitched anomalies over various phases of the attack lifecycle (Kill-Chain View). It uses a data science driven approach that produces actionable results with risk ratings and supporting evidence that increases SOC efficiency and supports bi-directional integration with Splunk Enterprise for data ingestion and correlation and with Splunk Enterprise Security for incident scoping, workflow management and automated response. The result is automated, accurate threat and anomaly detection.
There are additional costs associated with the integrator.
The licensing costs is around 10,000 dollars.
There are additional costs associated with the integrator.
The licensing costs is around 10,000 dollars.
Check Point IPS is an intrusion prevention system that aims to detect and prevent attempts to exploit weaknesses in vulnerable systems or applications. The solution provides complete, integrated, next-generation firewall intrusion prevention capabilities at multi-gigabit speeds with a low false positive rate and high security. It helps organizations secure their enterprise network, and protect servers and critical data against known and unknown automated malware, blended threats, and other threats.
I think that the price of support is around $40,000 USD or $50,000 USD per year.
The price of this product should be reduced.
I think that the price of support is around $40,000 USD or $50,000 USD per year.
The price of this product should be reduced.
Deep Discovery is available as a physical or virtual network appliance. It’s designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates sensitive data. Specialized detection engines and custom sandbox analysis detect and prevent breaches.
Overall, the price is good.
The price of the solution is lower compared to the competition.
Overall, the price is good.
The price of the solution is lower compared to the competition.
Keep ahead of the latest threats and protect your critical data with ongoing threat prevention and analysis.
TippingPoint is not as expensive as Palo Alto but it's not as cheap as Fortigate.
It's an expensive product.
TippingPoint is not as expensive as Palo Alto but it's not as cheap as Fortigate.
It's an expensive product.
Forcepoint Next Generation Firewall is a versatile and comprehensive solution for perimeter security, offering features such as SD-WAN, IPS, VPN, and cloud or on-premises subscription keys. It is preferred by many clients over Cisco and is used for obligation redundancy, VPN access, and as the main point of security in infrastructure.
The big advantage of this solution is that we can select the right model for our requirements, which is not too expensive.
Forcepoint is very expensive but it's really secure.
The big advantage of this solution is that we can select the right model for our requirements, which is not too expensive.
Forcepoint is very expensive but it's really secure.
Fortinet FortiGate IPS is a highly effective intrusion detection and prevention solution. It is designed to secure a user’s system from end to end and ensure that users are equipped to handle even the most sophisticated threats. Organizations across a wide variety of industries trust IPS to help them prevent unwanted intrusions from harming their networks.
The pricing for FortiGate IPS is competitive with other products in the category.
We are currently evaluating a Palo Alto solution, and the pricing could be a reason for going for Palo Alto.
The pricing for FortiGate IPS is competitive with other products in the category.
We are currently evaluating a Palo Alto solution, and the pricing could be a reason for going for Palo Alto.
Palo Alto Networks URL Filtering with PAN-DB is an advanced URL filtering solution that provides a way to control web access, as well as how users interact with online content. With this solution, your organization can prevent credential phishing theft by assuming strict control over which sites users can enter their corporate credentials into. Palo Alto Networks Advanced URL Filtering with PAN-DB provides web protection by using URL database capabilities to help you automatically detect and prevent new malicious and targeted web-based threats instantly.
It is more expensive than ASA but is far cheaper than Checkpoint. So, pricing wise, it is right in the middle.
Expensive, but that's because it provides everything.
It is more expensive than ASA but is far cheaper than Checkpoint. So, pricing wise, it is right in the middle.
Expensive, but that's because it provides everything.
We provide industrial asset identification, threat detection, and response to help organizations stay ahead of adversaries. The Dragos platform delivers codified industrial cybersecurity expertise that enables security teams to detect and respond faster to industrial cybersecurity threats, reducing dwell time and down time. We enhance ICS defenders’ efficiency and effectiveness via the Dragos platform, Dragos WorldView intelligence reports, and the Dragos Threat Operations Center.
Arista NDR (formerly Awake Security) is the only advanced network detection and response company that delivers answers, not alerts. By combining artificial intelligence with human expertise, Arista NDR hunts for both insider and external attacker behaviors, while providing autonomous triage and response with full forensics across traditional, IoT, and cloud networks. Arista NDR delivers continuous diagnostics for the entire enterprise threat landscape, processes countless network data points, senses abnormalities or threats, and reacts if necessary—all in a matter of seconds. The Arista NDP platform stands out from traditional security because it is designed to mimic the human brain. It recognizes malicious intent and learns over time, giving defenders greater visibility and insight into what threats exist and how to respond to them.
The solution has saved thousands of dollars within the first day. Our ROI has to be in the tens of thousands of dollars since October last year.
The solution is very good and the pricing is also better than others...
The solution has saved thousands of dollars within the first day. Our ROI has to be in the tens of thousands of dollars since October last year.
The solution is very good and the pricing is also better than others...
Cisco NGIPS (Next-Generation IPS) is a highly effective intrusion detection and prevention solution. It is designed to secure a user’s system from end to end and ensure that users are equipped to handle even the most sophisticated threats by offering them a high level of network visibility, threat intelligence, and security automation. Organizations across a wide variety of industries trust IPS to help them prevent unwanted intrusions from harming their networks.
We buy the licensing on a yearly basis, when we renew our contract. It is around $14,000.
The price for additional throughput is the highest in the industry.
We buy the licensing on a yearly basis, when we renew our contract. It is around $14,000.
The price for additional throughput is the highest in the industry.
Snort is an open-source, rule-based, intrusion detection and prevention system. It combines the benefits of signature-, protocol-, and anomaly-based inspection methods to deliver flexible protection from malware attacks. Snort gained notoriety for being able to accurately detect threats at high speeds.
We have a three-year license for this solution.
Licensing for this solution is paid on a yearly basis.
We have a three-year license for this solution.
Licensing for this solution is paid on a yearly basis.
The licensing is on a subscription basis, and it is fairly costly. I would prefer a one-time payment.
The licenses for this solution are expensive.
The licensing is on a subscription basis, and it is fairly costly. I would prefer a one-time payment.
The licenses for this solution are expensive.
Cisco Secure Cloud Analytics is a cloud-based security solution that provides visibility and threat detection for cloud environments. It offers software mapping and automation for incident response, forensic analysis, and segmentation of IT architecture. The solution can be used on-premise or on the cloud and is used in various sectors such as insurance and government.
It is expensive.
Cisco Stealthwatch Cloud is an expensive enterprise solution.
It is expensive.
Cisco Stealthwatch Cloud is an expensive enterprise solution.
Alert Logic is a cloud-based security and compliance solution that provides threat detection and response, log management, and compliance automation. Its primary use case is to manage lag and protect the network, identify configuration issues related to security and cloud infrastructure, and serve as the primary SIEM tool before escalating tickets.
It scales pretty well, except in matters of price.
While the pricing and licensing through the AWS Marketplace is straightforward, scaling it out for larger environments has become an issue.
It scales pretty well, except in matters of price.
While the pricing and licensing through the AWS Marketplace is straightforward, scaling it out for larger environments has become an issue.
LogRhythm UEBA enables your security team to quickly and effectively detect, respond to, and neutralize both known and unknown threats. Providing evidence-based starting points for investigation, it employs a combination of scenario analytics techniques (e.g., statistical analysis, rate analysis, trend analysis, advanced correlation), and both supervised and unsupervised machine learning (ML).
Licensing is on a yearly basis. It's not expensive compared to its competitors.
The pricing is nice when compared to other products in the industry.
Licensing is on a yearly basis. It's not expensive compared to its competitors.
The pricing is nice when compared to other products in the industry.
Block More Intrusions
Stop new and unknown attacks with signature-based and signature-less intrusion prevention systems. Signature-less intrusion detection finds malicious network traffic and stops attacks where no signatures exist.
I rate the product’s pricing an eight out of ten.
The tool is competitively priced.
I rate the product’s pricing an eight out of ten.
The tool is competitively priced.
Threat Stack Cloud Security Platform is a CWPP (Cloud Workload Protection Platform) that provides your organization with comprehensive security for modern applications and APIs. It is designed specifically for monitoring cloud environments, vulnerabilities, covering workloads, infrastructure, and compliance. The solution offers application infrastructure protection for all layers of your infrastructure stack and delivers the necessary observability for proactive and targeted remediation action. In addition, it is platform-independent and easily adapts to various environments. Threat Stack Cloud Security Platform works best for companies who want real-time protection against active external threats and need to reduce alert investigation time. It is ideal for small, medium, or large-sized organizations.
It is a cost-effective choice versus other solutions on the market.
Pricing seems to be in line with the market structure. It's fine.
It is a cost-effective choice versus other solutions on the market.
Pricing seems to be in line with the market structure. It's fine.
AutoFocus contextual threat intelligence service accelerates analysis, correlation and prevention workflows. Unique, targeted attacks are automatically prioritized with full context, allowing security teams to respond to critical attacks faster, without additional IT security resources.
It is expensive.
The solution is reasonably priced.
It is expensive.
The solution is reasonably priced.
Tripwire Enterprise is a comprehensive security solution that caters to various use cases, including compliance monitoring, file integrity monitoring, security configuration management, and security policy enforcement.
Users benefit from features such as real-time threat detection and response, audit and compliance reporting tools, and configuration management capabilities. The software has proven to be effective in maintaining a secure and compliant environment, proactively identifying security threats, and enabling quick responses to incidents.
Tripwire Enterprise is scalable, suitable for small businesses and large enterprises, and has been praised by users for its ability to improve operational efficiency, streamline processes, and provide valuable insights for decision-making.
The licensing depends on the equipment, how many devices and the types of devices.
Cloud monitoring could be better. It could also be cheaper. It would be better if the company followed a pay-as-you-use model.
The licensing depends on the equipment, how many devices and the types of devices.
Cloud monitoring could be better. It could also be cheaper. It would be better if the company followed a pay-as-you-use model.
Zscaler Cloud IPS enables you to have all threat and alert data in one place. Full user, file and app context is available. Streaming to a SIEM allows further integration into the SOC ecosystem.
The software has become more expensive at present.
The product is not affordable for small and medium enterprises.
The software has become more expensive at present.
The product is not affordable for small and medium enterprises.
The cost of operations is very low.
The cost of operations is very low.
Cloud is where your business operates, where it innovates, how it enables employees, and how it connects with customers. Adversaries know this, and that's why attacks against cloud assets in IaaS, PaaS, and SaaS environments are increasing. With Reveal(x) 360, you can mitigate the blast radius of advanced threats like ransomware and supply chain attacks with unified security across multicloud and hybrid environments in a single management pane.
When compared to other solutions, it aligns with the market average, indicating a competitive pricing level.
When compared to other solutions, it aligns with the market average, indicating a competitive pricing level.