Introducing G2.ai, the future of software buying.Try now

Best Intrusion Detection and Prevention Systems (IDPS)

Lauren Worth
LW
Researched and written by Lauren Worth

Intrusion detection and prevention systems (IDPS) are used to inform IT administrators and security staff of anomalies and attacks on IT infrastructure and applications. These tools detect malware, socially engineered attacks, and other web-based threats. IDPS also provide preemptive intrusion prevention capabilities for internal threats and potentially compromised systems.

Intrusion detection and prevention systems monitor systems for abnormal behavior and potential vulnerabilities that can leave a business susceptible to cyberattacks. Companies choose to adopt these to protect their sensitive business information and ensure their computing infrastructure performs as needed.

Some next-generation firewall software offer intrusion detection and prevention capabilities. But the main functionality of firewall tools will be controlling network access, rather than monitoring network behavior.

To qualify for inclusion in the Intrusion Detection and Prevention Systems (IDPS) category, a product must:

Monitor IT systems for abnormal behavior and misuse
Inform administrators of abnormal protocol activity
Monitor the performance of IT hardware and security components
Provide blocking mechanisms for web-based threats

Best Intrusion Detection and Prevention Systems (IDPS) At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
58 Listings in Intrusion Detection and Prevention Systems (IDPS) Available
(147)4.5 out of 5
4th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
View top Consulting Services for Palo Alto Networks Next-Generation Firewalls
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Our next-generation firewall classifies all traffic, including encrypted traffic, based on application, application function, user and content. You can create comprehensive, precise security policies,

    Users
    • Network Engineer
    • Network Security Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 47% Mid-Market
    • 38% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Networks Next-Generation Firewalls Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    27
    Features
    24
    Firewall Efficiency
    17
    Protection
    15
    Threat Protection
    14
    Cons
    Expensive
    28
    Slow Performance
    14
    Poor Customer Support
    10
    Difficult Learning Curve
    8
    Poor Interface Design
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Networks Next-Generation Firewalls features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.0
    9.0
    Security hardening
    Average: 8.8
    8.8
    Compliance
    Average: 8.9
    8.9
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,032 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,526 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Our next-generation firewall classifies all traffic, including encrypted traffic, based on application, application function, user and content. You can create comprehensive, precise security policies,

Users
  • Network Engineer
  • Network Security Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 47% Mid-Market
  • 38% Enterprise
Palo Alto Networks Next-Generation Firewalls Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
27
Features
24
Firewall Efficiency
17
Protection
15
Threat Protection
14
Cons
Expensive
28
Slow Performance
14
Poor Customer Support
10
Difficult Learning Curve
8
Poor Interface Design
8
Palo Alto Networks Next-Generation Firewalls features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.0
9.0
Security hardening
Average: 8.8
8.8
Compliance
Average: 8.9
8.9
Security Monitoring
Average: 8.9
Seller Details
Company Website
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,032 Twitter followers
LinkedIn® Page
www.linkedin.com
17,526 employees on LinkedIn®
(102)4.4 out of 5
10th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Overview Our Cloud-Delivered Security Services are natively integrated, offering consistent best-in-class protection everywhere. Backed by our world-renowned Unit 42® Threat Research team, this one-o

    Users
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Mid-Market
    • 34% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloud-Delivered Security Services features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.0
    8.4
    Security hardening
    Average: 8.8
    8.9
    Compliance
    Average: 8.9
    8.8
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,032 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,526 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Overview Our Cloud-Delivered Security Services are natively integrated, offering consistent best-in-class protection everywhere. Backed by our world-renowned Unit 42® Threat Research team, this one-o

Users
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Mid-Market
  • 34% Enterprise
Cloud-Delivered Security Services features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.0
8.4
Security hardening
Average: 8.8
8.9
Compliance
Average: 8.9
8.8
Security Monitoring
Average: 8.9
Seller Details
Company Website
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,032 Twitter followers
LinkedIn® Page
www.linkedin.com
17,526 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(74)4.3 out of 5
14th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Palo Alto Networks' VM-Series Virtual Firewall is the industry’s leading cloud security software, delivering the world’s most effective network security to any cloud or virtualized environment. It is

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 47% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Networks VM-Series Virtual Firewall Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Protection
    14
    Firewall Efficiency
    10
    Features
    8
    Deployment Ease
    7
    Integrations
    7
    Cons
    Expensive
    16
    Slow Performance
    7
    Difficult Learning Curve
    5
    Complex Configuration
    4
    Difficult Installation
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Networks VM-Series Virtual Firewall features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.0
    9.0
    Security hardening
    Average: 8.8
    8.9
    Compliance
    Average: 8.9
    9.1
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,032 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,526 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Palo Alto Networks' VM-Series Virtual Firewall is the industry’s leading cloud security software, delivering the world’s most effective network security to any cloud or virtualized environment. It is

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 47% Enterprise
  • 31% Mid-Market
Palo Alto Networks VM-Series Virtual Firewall Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Protection
14
Firewall Efficiency
10
Features
8
Deployment Ease
7
Integrations
7
Cons
Expensive
16
Slow Performance
7
Difficult Learning Curve
5
Complex Configuration
4
Difficult Installation
4
Palo Alto Networks VM-Series Virtual Firewall features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.0
9.0
Security hardening
Average: 8.8
8.9
Compliance
Average: 8.9
9.1
Security Monitoring
Average: 8.9
Seller Details
Company Website
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,032 Twitter followers
LinkedIn® Page
www.linkedin.com
17,526 employees on LinkedIn®
(186)4.5 out of 5
7th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

    Users
    • Cyber Security Associate
    • Cyber Security Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 40% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Hybrid Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    27
    Cloud Integration
    12
    Cloud Services
    11
    Cloud Security
    10
    Cloud Technology
    10
    Cons
    Complexity
    9
    Complex Setup
    7
    Difficult Setup
    6
    Feature Complexity
    6
    Difficulty
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hybrid Cloud Security features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.0
    8.9
    Security hardening
    Average: 8.8
    8.6
    Compliance
    Average: 8.9
    8.9
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,849 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,751 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

Users
  • Cyber Security Associate
  • Cyber Security Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 40% Mid-Market
  • 33% Enterprise
Hybrid Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
27
Cloud Integration
12
Cloud Services
11
Cloud Security
10
Cloud Technology
10
Cons
Complexity
9
Complex Setup
7
Difficult Setup
6
Feature Complexity
6
Difficulty
5
Hybrid Cloud Security features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.0
8.9
Security hardening
Average: 8.8
8.6
Compliance
Average: 8.9
8.9
Security Monitoring
Average: 8.9
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,849 Twitter followers
LinkedIn® Page
www.linkedin.com
7,751 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
(67)4.6 out of 5
6th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
Entry Level Price:$5.04 HOUR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance man

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Transportation/Trucking/Railroad
    Market Segment
    • 70% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ExtraHop Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Reliability
    5
    Visibility
    5
    Customer Support
    3
    Features
    3
    Cons
    False Positives
    3
    Expensive
    2
    Inadequate Monitoring
    2
    Missing Features
    2
    Alert Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ExtraHop features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Security hardening
    Average: 8.8
    7.6
    Compliance
    Average: 8.9
    9.0
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2007
    HQ Location
    Seattle, Washington
    Twitter
    @ExtraHop
    10,921 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    725 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance man

Users
No information available
Industries
  • Hospital & Health Care
  • Transportation/Trucking/Railroad
Market Segment
  • 70% Enterprise
  • 25% Mid-Market
ExtraHop Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Reliability
5
Visibility
5
Customer Support
3
Features
3
Cons
False Positives
3
Expensive
2
Inadequate Monitoring
2
Missing Features
2
Alert Issues
1
ExtraHop features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
8.8
Security hardening
Average: 8.8
7.6
Compliance
Average: 8.9
9.0
Security Monitoring
Average: 8.9
Seller Details
Company Website
Year Founded
2007
HQ Location
Seattle, Washington
Twitter
@ExtraHop
10,921 Twitter followers
LinkedIn® Page
www.linkedin.com
725 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deep Discovery Inspector is available as a physical or virtual network appliance. It's designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Mid-Market
    • 35% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Micro Deep Discovery features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    8.5
    Security hardening
    Average: 8.8
    9.0
    Compliance
    Average: 8.9
    8.5
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,849 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,751 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Deep Discovery Inspector is available as a physical or virtual network appliance. It's designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Mid-Market
  • 35% Enterprise
Trend Micro Deep Discovery features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
8.5
Security hardening
Average: 8.8
9.0
Compliance
Average: 8.9
8.5
Security Monitoring
Average: 8.9
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,849 Twitter followers
LinkedIn® Page
www.linkedin.com
7,751 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
(113)4.4 out of 5
9th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 62% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AlienVault USM (from AT&T Cybersecurity) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Asset Management
    1
    Automation
    1
    Dashboard Usability
    1
    Integration Capabilities
    1
    Integrations
    1
    Cons
    Expensive
    1
    Licensing Cost
    1
    Licensing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AlienVault USM (from AT&T Cybersecurity) features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Security hardening
    Average: 8.8
    9.0
    Compliance
    Average: 8.9
    9.0
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AT&T
    Year Founded
    1876
    HQ Location
    Dallas, TX
    Twitter
    @ATT
    890,254 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    178,523 employees on LinkedIn®
    Ownership
    NYSE: T
Product Description
How are these determined?Information
This description is provided by the seller.

AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 62% Mid-Market
  • 20% Small-Business
AlienVault USM (from AT&T Cybersecurity) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Asset Management
1
Automation
1
Dashboard Usability
1
Integration Capabilities
1
Integrations
1
Cons
Expensive
1
Licensing Cost
1
Licensing Issues
1
AlienVault USM (from AT&T Cybersecurity) features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.0
8.8
Security hardening
Average: 8.8
9.0
Compliance
Average: 8.9
9.0
Security Monitoring
Average: 8.9
Seller Details
Seller
AT&T
Year Founded
1876
HQ Location
Dallas, TX
Twitter
@ATT
890,254 Twitter followers
LinkedIn® Page
www.linkedin.com
178,523 employees on LinkedIn®
Ownership
NYSE: T
(35)4.4 out of 5
2nd Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Connecting and protecting distributed enterprises and government agencies is more important than ever before. Defending your people and critical assets starts at the new edge. Forcepoint Next-Gen Fi

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 37% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forcepoint Next-Generation Firewall (NGFW) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Control
    1
    Customer Support
    1
    Customization
    1
    Ease of Implementation
    1
    Integrations
    1
    Cons
    Complex Configuration
    1
    Expensive
    1
    Expertise Required
    1
    Limited Customization
    1
    Outdated Interface
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forcepoint Next-Generation Firewall (NGFW) features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.0
    8.1
    Security hardening
    Average: 8.8
    7.8
    Compliance
    Average: 8.9
    8.7
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Austin, TX
    Twitter
    @Forcepointsec
    66,455 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,730 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Connecting and protecting distributed enterprises and government agencies is more important than ever before. Defending your people and critical assets starts at the new edge. Forcepoint Next-Gen Fi

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 37% Mid-Market
  • 29% Enterprise
Forcepoint Next-Generation Firewall (NGFW) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Control
1
Customer Support
1
Customization
1
Ease of Implementation
1
Integrations
1
Cons
Complex Configuration
1
Expensive
1
Expertise Required
1
Limited Customization
1
Outdated Interface
1
Forcepoint Next-Generation Firewall (NGFW) features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.0
8.1
Security hardening
Average: 8.8
7.8
Compliance
Average: 8.9
8.7
Security Monitoring
Average: 8.9
Seller Details
Year Founded
1994
HQ Location
Austin, TX
Twitter
@Forcepointsec
66,455 Twitter followers
LinkedIn® Page
www.linkedin.com
1,730 employees on LinkedIn®
(46)4.4 out of 5
13th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point IPS (Intrusion Prevention System) combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS software solutions. IPS delivers

    Users
    No information available
    Industries
    • Financial Services
    • Computer & Network Security
    Market Segment
    • 50% Enterprise
    • 39% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point IPS (Intrusion Prevention System) features and usability ratings that predict user satisfaction
    7.9
    Has the product been a good partner in doing business?
    Average: 9.0
    8.9
    Security hardening
    Average: 8.8
    9.0
    Compliance
    Average: 8.9
    8.6
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,095 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,120 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point IPS (Intrusion Prevention System) combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS software solutions. IPS delivers

Users
No information available
Industries
  • Financial Services
  • Computer & Network Security
Market Segment
  • 50% Enterprise
  • 39% Mid-Market
Check Point IPS (Intrusion Prevention System) features and usability ratings that predict user satisfaction
7.9
Has the product been a good partner in doing business?
Average: 9.0
8.9
Security hardening
Average: 8.8
9.0
Compliance
Average: 8.9
8.6
Security Monitoring
Average: 8.9
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,095 Twitter followers
LinkedIn® Page
www.linkedin.com
8,120 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Armor is a global cloud security company. We make cybersecurity and compliance simple, achievable, and manageable for managed service providers (MSPs) and their customers across endpoint, network, ser

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 83% Small-Business
    • 17% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Armor Anywhere features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Security hardening
    Average: 8.8
    10.0
    Compliance
    Average: 8.9
    10.0
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Armor
    Year Founded
    2009
    HQ Location
    Plano, Texas
    Twitter
    @Armor
    9,860 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    224 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Armor is a global cloud security company. We make cybersecurity and compliance simple, achievable, and manageable for managed service providers (MSPs) and their customers across endpoint, network, ser

Users
No information available
Industries
No information available
Market Segment
  • 83% Small-Business
  • 17% Mid-Market
Armor Anywhere features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
10.0
Security hardening
Average: 8.8
10.0
Compliance
Average: 8.9
10.0
Security Monitoring
Average: 8.9
Seller Details
Seller
Armor
Year Founded
2009
HQ Location
Plano, Texas
Twitter
@Armor
9,860 Twitter followers
LinkedIn® Page
www.linkedin.com
224 employees on LinkedIn®
(14)4.7 out of 5
3rd Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Whether part of a firewall solution or a separate standalone appliance, Intrusion Prevention Systems (IPS) technology is becoming an increasingly ubiquitous part of network security defenses.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 36% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiGate IPS features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    9.7
    Security hardening
    Average: 8.8
    9.3
    Compliance
    Average: 8.9
    9.3
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,589 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15,343 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

Whether part of a firewall solution or a separate standalone appliance, Intrusion Prevention Systems (IPS) technology is becoming an increasingly ubiquitous part of network security defenses.

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 36% Enterprise
FortiGate IPS features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
9.7
Security hardening
Average: 8.8
9.3
Compliance
Average: 8.9
9.3
Security Monitoring
Average: 8.9
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,589 Twitter followers
LinkedIn® Page
www.linkedin.com
15,343 employees on LinkedIn®
Ownership
NASDAQ: FTNT
(66)4.1 out of 5
8th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trellix NDR delivers extended visibility, multi-layered threat detection and accelerated investigation and response into network traffic across each stage of the MITRE ATT&CK framework – spanning

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix Network Detection and Response (NDR) features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 9.0
    8.4
    Security hardening
    Average: 8.8
    8.2
    Compliance
    Average: 8.9
    8.8
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    250,223 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    823 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trellix NDR delivers extended visibility, multi-layered threat detection and accelerated investigation and response into network traffic across each stage of the MITRE ATT&CK framework – spanning

Users
No information available
Industries
No information available
Market Segment
  • 36% Mid-Market
  • 33% Small-Business
Trellix Network Detection and Response (NDR) features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 9.0
8.4
Security hardening
Average: 8.8
8.2
Compliance
Average: 8.9
8.8
Security Monitoring
Average: 8.9
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
250,223 Twitter followers
LinkedIn® Page
www.linkedin.com
823 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trend Micro TippingPoint integrates with the Deep Discovery Advanced Threat Protection Solution to detect and block targeted attacks and malware through preemptive threat prevention, threat insight an

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Micro TippingPoint features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    9.7
    Security hardening
    Average: 8.8
    8.8
    Compliance
    Average: 8.9
    9.3
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,849 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,751 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Trend Micro TippingPoint integrates with the Deep Discovery Advanced Threat Protection Solution to detect and block targeted attacks and malware through preemptive threat prevention, threat insight an

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 31% Enterprise
Trend Micro TippingPoint features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
9.7
Security hardening
Average: 8.8
8.8
Compliance
Average: 8.9
9.3
Security Monitoring
Average: 8.9
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,849 Twitter followers
LinkedIn® Page
www.linkedin.com
7,751 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
(117)4.6 out of 5
Optimized for quick response
5th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Blumira provides the only cybersecurity platform that can help SMBs prevent a breach. We help lean IT teams protect their organizations against ransomware and breaches with an open SIEM+XDR platfor

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Blumira Automated Detection & Response Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    20
    Customer Support
    17
    Setup Ease
    15
    Deployment Ease
    13
    Easy Setup
    12
    Cons
    Limited Customization
    7
    Expensive
    4
    Lack of Customization
    4
    Limited Reporting
    4
    Alert System
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    9.0
    Security hardening
    Average: 8.8
    8.9
    Compliance
    Average: 8.9
    9.4
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Blumira
    Company Website
    Year Founded
    2018
    HQ Location
    Ann Arbor, Michigan
    Twitter
    @blumira
    1 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    67 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Blumira provides the only cybersecurity platform that can help SMBs prevent a breach. We help lean IT teams protect their organizations against ransomware and breaches with an open SIEM+XDR platfor

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Mid-Market
  • 38% Small-Business
Blumira Automated Detection & Response Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
20
Customer Support
17
Setup Ease
15
Deployment Ease
13
Easy Setup
12
Cons
Limited Customization
7
Expensive
4
Lack of Customization
4
Limited Reporting
4
Alert System
3
Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
9.0
Security hardening
Average: 8.8
8.9
Compliance
Average: 8.9
9.4
Security Monitoring
Average: 8.9
Seller Details
Seller
Blumira
Company Website
Year Founded
2018
HQ Location
Ann Arbor, Michigan
Twitter
@blumira
1 Twitter followers
LinkedIn® Page
www.linkedin.com
67 employees on LinkedIn®
(92)4.2 out of 5
12th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Cisco Secure Firewall portfolio delivers greater protections for your network against an increasingly evolving and complex set of threats. With Cisco, you’re investing in a foundation for security

    Users
    No information available
    Industries
    • Information Technology and Services
    • Telecommunications
    Market Segment
    • 46% Mid-Market
    • 42% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Easy Management
    1
    Cons
    Complex Coding
    1
    Complex Configuration
    1
    Upgrade Difficulties
    1
    Upgrade Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv) features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    8.9
    Security hardening
    Average: 8.8
    8.8
    Compliance
    Average: 8.9
    9.2
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    729,024 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    94,810 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

The Cisco Secure Firewall portfolio delivers greater protections for your network against an increasingly evolving and complex set of threats. With Cisco, you’re investing in a foundation for security

Users
No information available
Industries
  • Information Technology and Services
  • Telecommunications
Market Segment
  • 46% Mid-Market
  • 42% Enterprise
Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Easy Management
1
Cons
Complex Coding
1
Complex Configuration
1
Upgrade Difficulties
1
Upgrade Issues
1
Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv) features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
8.9
Security hardening
Average: 8.8
8.8
Compliance
Average: 8.9
9.2
Security Monitoring
Average: 8.9
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
729,024 Twitter followers
LinkedIn® Page
www.linkedin.com
94,810 employees on LinkedIn®
Ownership
NASDAQ:CSCO
(26)4.8 out of 5
1st Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    threatER is a comprehensive cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale. threatER offers a wide range o

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 62% Mid-Market
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Threater features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Security hardening
    Average: 8.8
    9.2
    Compliance
    Average: 8.9
    9.3
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Threater
    HQ Location
    Tysons, Virginia
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

threatER is a comprehensive cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale. threatER offers a wide range o

Users
No information available
Industries
No information available
Market Segment
  • 62% Mid-Market
  • 27% Enterprise
Threater features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.0
9.4
Security hardening
Average: 8.8
9.2
Compliance
Average: 8.9
9.3
Security Monitoring
Average: 8.9
Seller Details
Seller
Threater
HQ Location
Tysons, Virginia
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 24% Enterprise
    • 21% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Infinity Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity Protection
    3
    Artificial Intelligence
    2
    Centralized Management
    2
    Security
    2
    Backup Solutions
    1
    Cons
    Difficult Configuration
    1
    Difficult Navigation
    1
    Expensive
    1
    Learning Curve
    1
    Overwhelming Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Infinity Platform features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Security hardening
    Average: 8.8
    8.8
    Compliance
    Average: 8.9
    8.8
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,095 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,120 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

Users
No information available
Industries
No information available
Market Segment
  • 24% Enterprise
  • 21% Small-Business
Check Point Infinity Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity Protection
3
Artificial Intelligence
2
Centralized Management
2
Security
2
Backup Solutions
1
Cons
Difficult Configuration
1
Difficult Navigation
1
Expensive
1
Learning Curve
1
Overwhelming Features
1
Check Point Infinity Platform features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
9.2
Security hardening
Average: 8.8
8.8
Compliance
Average: 8.9
8.8
Security Monitoring
Average: 8.9
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,095 Twitter followers
LinkedIn® Page
www.linkedin.com
8,120 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    High performance. Resiliency. Security operations empowerment. NGIPS receives new policy rules and signatures every two hours, so your security is always up to date.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 65% Enterprise
    • 24% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Secure IPS (NGIPS) features and usability ratings that predict user satisfaction
    8.0
    Has the product been a good partner in doing business?
    Average: 9.0
    7.9
    Security hardening
    Average: 8.8
    7.6
    Compliance
    Average: 8.9
    7.4
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    729,024 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    94,810 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

High performance. Resiliency. Security operations empowerment. NGIPS receives new policy rules and signatures every two hours, so your security is always up to date.

Users
No information available
Industries
No information available
Market Segment
  • 65% Enterprise
  • 24% Mid-Market
Cisco Secure IPS (NGIPS) features and usability ratings that predict user satisfaction
8.0
Has the product been a good partner in doing business?
Average: 9.0
7.9
Security hardening
Average: 8.8
7.6
Compliance
Average: 8.9
7.4
Security Monitoring
Average: 8.9
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
729,024 Twitter followers
LinkedIn® Page
www.linkedin.com
94,810 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A network security platform, years in the making, leveraging mathematics to continuously learn, predict, and defend against attacks.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 38% Small-Business
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • B1 Platform by CloudCover Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    8
    Network Security
    7
    Ease of Use
    6
    Reliability
    5
    Risk Management
    5
    Cons
    Not User-Friendly
    4
    Poor Customer Support
    4
    Poor Usability
    3
    UX Improvement
    3
    Lack of Mobile Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • B1 Platform by CloudCover features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Security hardening
    Average: 8.8
    8.5
    Compliance
    Average: 8.9
    9.8
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2007
    HQ Location
    Minneapolis, US
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A network security platform, years in the making, leveraging mathematics to continuously learn, predict, and defend against attacks.

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 38% Small-Business
  • 38% Mid-Market
B1 Platform by CloudCover Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
8
Network Security
7
Ease of Use
6
Reliability
5
Risk Management
5
Cons
Not User-Friendly
4
Poor Customer Support
4
Poor Usability
3
UX Improvement
3
Lack of Mobile Support
2
B1 Platform by CloudCover features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
8.8
Security hardening
Average: 8.8
8.5
Compliance
Average: 8.9
9.8
Security Monitoring
Average: 8.9
Seller Details
Year Founded
2007
HQ Location
Minneapolis, US
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
(87)4.7 out of 5
15th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 69% Small-Business
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdSec features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    9.3
    Security hardening
    Average: 8.8
    8.1
    Compliance
    Average: 8.9
    8.9
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CrowdSec
    Year Founded
    2020
    HQ Location
    Paris, FR
    Twitter
    @Crowd_Security
    19,685 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 69% Small-Business
  • 21% Mid-Market
CrowdSec features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
9.3
Security hardening
Average: 8.8
8.1
Compliance
Average: 8.9
8.9
Security Monitoring
Average: 8.9
Seller Details
Seller
CrowdSec
Year Founded
2020
HQ Location
Paris, FR
Twitter
@Crowd_Security
19,685 Twitter followers
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SNORT(r), The standard in IDS and IPS.

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 78% Mid-Market
    • 22% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Snort features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Security hardening
    Average: 8.8
    10.0
    Compliance
    Average: 8.9
    10.0
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Snort
    HQ Location
    San Jose
    Twitter
    @snort
    23,410 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

SNORT(r), The standard in IDS and IPS.

Users
No information available
Industries
  • Computer Software
Market Segment
  • 78% Mid-Market
  • 22% Small-Business
Snort features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
10.0
Security hardening
Average: 8.8
10.0
Compliance
Average: 8.9
10.0
Security Monitoring
Average: 8.9
Seller Details
Seller
Snort
HQ Location
San Jose
Twitter
@snort
23,410 Twitter followers
LinkedIn® Page
www.linkedin.com
(10)4.6 out of 5
11th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ossec is an open source host-based intrusion detection system that performs log analysis, file integrity checking, policy monitoring, rootkit detection and process monitoring.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 30% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ossec features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Security hardening
    Average: 8.8
    9.0
    Compliance
    Average: 8.9
    10.0
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ossec
    Year Founded
    2012
    HQ Location
    Mannouba, Tunis
    Twitter
    @ossecproject
    1,661 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ossec is an open source host-based intrusion detection system that performs log analysis, file integrity checking, policy monitoring, rootkit detection and process monitoring.

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 30% Mid-Market
Ossec features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
9.2
Security hardening
Average: 8.8
9.0
Compliance
Average: 8.9
10.0
Security Monitoring
Average: 8.9
Seller Details
Seller
Ossec
Year Founded
2012
HQ Location
Mannouba, Tunis
Twitter
@ossecproject
1,661 Twitter followers
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Corelight's Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detecti

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 52% Mid-Market
    • 48% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Corelight Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Threat Detection
    3
    Cybersecurity
    2
    Data Analytics
    2
    Detection
    2
    Cons
    Complexity
    3
    Complex Coding
    2
    Learning Curve
    2
    Training Deficiency
    2
    Complex Configuration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Corelight features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    7.5
    Security hardening
    Average: 8.8
    8.3
    Compliance
    Average: 8.9
    9.3
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Corelight
    Company Website
    Year Founded
    2013
    HQ Location
    San Francisco, CA
    Twitter
    @corelight_inc
    4,207 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    400 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Corelight's Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detecti

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 52% Mid-Market
  • 48% Enterprise
Corelight Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Threat Detection
3
Cybersecurity
2
Data Analytics
2
Detection
2
Cons
Complexity
3
Complex Coding
2
Learning Curve
2
Training Deficiency
2
Complex Configuration
1
Corelight features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
7.5
Security hardening
Average: 8.8
8.3
Compliance
Average: 8.9
9.3
Security Monitoring
Average: 8.9
Seller Details
Seller
Corelight
Company Website
Year Founded
2013
HQ Location
San Francisco, CA
Twitter
@corelight_inc
4,207 Twitter followers
LinkedIn® Page
www.linkedin.com
400 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OmniShield is the next-generation cybersecurity solution that extends your company's perimeter to all your sites while providing omnipresent, enterprise-grade security.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 83% Small-Business
    • 17% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Omnishield by MyDigitalShield features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OmniNET
    Year Founded
    2013
    HQ Location
    Charlotte, US
    Twitter
    @OmniNetInc
    1,174 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OmniShield is the next-generation cybersecurity solution that extends your company's perimeter to all your sites while providing omnipresent, enterprise-grade security.

Users
No information available
Industries
No information available
Market Segment
  • 83% Small-Business
  • 17% Mid-Market
Omnishield by MyDigitalShield features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
OmniNET
Year Founded
2013
HQ Location
Charlotte, US
Twitter
@OmniNetInc
1,174 Twitter followers
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Maximise security and minimise complexity. SenseOn offers a comprehensive Extended Detection & Response solution that empowers resource-conscious IT leaders to deliver enterprise-level security—wi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 86% Mid-Market
    • 14% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SenseOn Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    5
    Response Time
    3
    Alerts
    2
    Deployment Ease
    2
    Ease of Use
    2
    Cons
    Difficult Learning Curve
    1
    Expensive
    1
    Information Overload
    1
    Integration Issues
    1
    Poor Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SenseOn features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.0
    6.7
    Security hardening
    Average: 8.8
    8.7
    Compliance
    Average: 8.9
    10.0
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SenseOn
    Year Founded
    2017
    HQ Location
    London, UK
    Twitter
    @SenseonTech
    1,230 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    37 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Maximise security and minimise complexity. SenseOn offers a comprehensive Extended Detection & Response solution that empowers resource-conscious IT leaders to deliver enterprise-level security—wi

Users
No information available
Industries
No information available
Market Segment
  • 86% Mid-Market
  • 14% Enterprise
SenseOn Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
5
Response Time
3
Alerts
2
Deployment Ease
2
Ease of Use
2
Cons
Difficult Learning Curve
1
Expensive
1
Information Overload
1
Integration Issues
1
Poor Management
1
SenseOn features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.0
6.7
Security hardening
Average: 8.8
8.7
Compliance
Average: 8.9
10.0
Security Monitoring
Average: 8.9
Seller Details
Seller
SenseOn
Year Founded
2017
HQ Location
London, UK
Twitter
@SenseonTech
1,230 Twitter followers
LinkedIn® Page
www.linkedin.com
37 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The vSRX offers the same features as our physical SRX Series firewalls but in a virtualized form factor for delivering security services that scale to match network demand. It offers the same features

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Mid-Market
    • 14% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • vSRX features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Security hardening
    Average: 8.8
    9.2
    Compliance
    Average: 8.9
    8.8
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1996
    HQ Location
    Sunnyvale, CA
    Twitter
    @JuniperNetworks
    105,453 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11,795 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The vSRX offers the same features as our physical SRX Series firewalls but in a virtualized form factor for delivering security services that scale to match network demand. It offers the same features

Users
No information available
Industries
No information available
Market Segment
  • 71% Mid-Market
  • 14% Enterprise
vSRX features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
9.2
Security hardening
Average: 8.8
9.2
Compliance
Average: 8.9
8.8
Security Monitoring
Average: 8.9
Seller Details
Year Founded
1996
HQ Location
Sunnyvale, CA
Twitter
@JuniperNetworks
105,453 Twitter followers
LinkedIn® Page
www.linkedin.com
11,795 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CleanINTERNET® is an intelligence-powered security solution using high performance computing technology, patented software algorithms and uniquely skilled security analysts to deliver a robust alterna

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Centripetal CleanINTERNET ® Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Implementation Ease
    1
    Integration Capabilities
    1
    Network Security
    1
    Reliability
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Centripetal CleanINTERNET ® features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Security hardening
    Average: 8.8
    10.0
    Compliance
    Average: 8.9
    10.0
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Reston, VA
    Twitter
    @Centripetal_AI
    475 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CleanINTERNET® is an intelligence-powered security solution using high performance computing technology, patented software algorithms and uniquely skilled security analysts to deliver a robust alterna

Users
No information available
Industries
No information available
Market Segment
  • 80% Mid-Market
  • 20% Small-Business
Centripetal CleanINTERNET ® Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Implementation Ease
1
Integration Capabilities
1
Network Security
1
Reliability
1
Security
1
Cons
This product has not yet received any negative sentiments.
Centripetal CleanINTERNET ® features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
10.0
Security hardening
Average: 8.8
10.0
Compliance
Average: 8.9
10.0
Security Monitoring
Average: 8.9
Seller Details
Year Founded
2009
HQ Location
Reston, VA
Twitter
@Centripetal_AI
475 Twitter followers
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Multi-layered protection is provided, with an integrated firewall, antivirus and Intrusion Detection System (IDS). The agentless firewall ensures complete traffic control and isolation between VMs. Th

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 5nine Cloud Security features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Security hardening
    Average: 8.8
    8.3
    Compliance
    Average: 8.9
    6.7
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Acronis
    Year Founded
    2003
    HQ Location
    Schaffhausen
    Twitter
    @acronis
    95,704 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,879 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Multi-layered protection is provided, with an integrated firewall, antivirus and Intrusion Detection System (IDS). The agentless firewall ensures complete traffic control and isolation between VMs. Th

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
5nine Cloud Security features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
8.3
Security hardening
Average: 8.8
8.3
Compliance
Average: 8.9
6.7
Security Monitoring
Average: 8.9
Seller Details
Seller
Acronis
Year Founded
2003
HQ Location
Schaffhausen
Twitter
@acronis
95,704 Twitter followers
LinkedIn® Page
www.linkedin.com
1,879 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    "Networks get hacked, become slow & go down more often than you think. Are you using the right tool to control your network?" BhaiFi is a Global Cybersecurity startup based out of India that off

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Small-Business
    • 23% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BhaiFi.ai features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Security hardening
    Average: 8.8
    10.0
    Compliance
    Average: 8.9
    10.0
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BhaiFi
    Year Founded
    2017
    HQ Location
    Gurgaon, Haryana
    Twitter
    @bhaifi
    71 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

"Networks get hacked, become slow & go down more often than you think. Are you using the right tool to control your network?" BhaiFi is a Global Cybersecurity startup based out of India that off

Users
No information available
Industries
No information available
Market Segment
  • 64% Small-Business
  • 23% Mid-Market
BhaiFi.ai features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
10.0
Security hardening
Average: 8.8
10.0
Compliance
Average: 8.9
10.0
Security Monitoring
Average: 8.9
Seller Details
Seller
BhaiFi
Year Founded
2017
HQ Location
Gurgaon, Haryana
Twitter
@bhaifi
71 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Dragos Platform is the most effective technology for securing OT environments. Providing automated asset discovery and monitoring capabilities, the Platform delivers asset inventory and visibility

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Dragos Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    1
    User Interface
    1
    Cons
    Difficult Learning
    1
    Limited Customization
    1
    Usability Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Dragos Platform features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Security hardening
    Average: 8.8
    8.3
    Compliance
    Average: 8.9
    8.3
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Dragos
    Year Founded
    2016
    HQ Location
    Hanover, US
    Twitter
    @DragosInc
    26,777 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    526 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Dragos Platform is the most effective technology for securing OT environments. Providing automated asset discovery and monitoring capabilities, the Platform delivers asset inventory and visibility

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Dragos Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
1
User Interface
1
Cons
Difficult Learning
1
Limited Customization
1
Usability Issues
1
Dragos Platform features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.0
8.3
Security hardening
Average: 8.8
8.3
Compliance
Average: 8.9
8.3
Security Monitoring
Average: 8.9
Seller Details
Seller
Dragos
Year Founded
2016
HQ Location
Hanover, US
Twitter
@DragosInc
26,777 Twitter followers
LinkedIn® Page
www.linkedin.com
526 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    McAfee Host Intrusion Prevention for Server boosts server security and lowers costs by reducing the frequency and urgency of patching.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix Intrusion Prevention System features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Security hardening
    Average: 8.8
    9.2
    Compliance
    Average: 8.9
    9.2
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    250,223 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    823 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

McAfee Host Intrusion Prevention for Server boosts server security and lowers costs by reducing the frequency and urgency of patching.

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Trellix Intrusion Prevention System features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
9.2
Security hardening
Average: 8.8
9.2
Compliance
Average: 8.9
9.2
Security Monitoring
Average: 8.9
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
250,223 Twitter followers
LinkedIn® Page
www.linkedin.com
823 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CA Compliance Event Manager helps you increase your data privacy and simplify regulatory compliance

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CA Compliance Event Manager features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,146 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    58,028 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

CA Compliance Event Manager helps you increase your data privacy and simplify regulatory compliance

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
CA Compliance Event Manager features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,146 Twitter followers
LinkedIn® Page
www.linkedin.com
58,028 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The FortiGuard team develops effective countermeasures to protect more than 320,000 Fortinet customers around the world. These countermeasures include up-to-the-minute threat intelligence, delivered a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 69% Mid-Market
    • 15% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiGuard Security Subscriptions features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,589 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15,343 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

The FortiGuard team develops effective countermeasures to protect more than 320,000 Fortinet customers around the world. These countermeasures include up-to-the-minute threat intelligence, delivered a

Users
No information available
Industries
No information available
Market Segment
  • 69% Mid-Market
  • 15% Enterprise
FortiGuard Security Subscriptions features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,589 Twitter followers
LinkedIn® Page
www.linkedin.com
15,343 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloud Sandbox delivers a unique, advanced threat detection platform that can emulate the execution environment and analyze all activities related to malicious files, identify advanced threats and coll

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hillstone Cloud Sandbox features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Security hardening
    Average: 8.8
    8.3
    Compliance
    Average: 8.9
    6.7
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Santa Clara, CA
    Twitter
    @Hillstone_Net
    10,202 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    357 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cloud Sandbox delivers a unique, advanced threat detection platform that can emulate the execution environment and analyze all activities related to malicious files, identify advanced threats and coll

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Hillstone Cloud Sandbox features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.0
8.3
Security hardening
Average: 8.8
8.3
Compliance
Average: 8.9
6.7
Security Monitoring
Average: 8.9
Seller Details
Year Founded
2006
HQ Location
Santa Clara, CA
Twitter
@Hillstone_Net
10,202 Twitter followers
LinkedIn® Page
www.linkedin.com
357 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bricata is leading the next generation of advanced network detection and response for the enterprise. By fusing real-time visibility, advanced detection, analysis, forensics, incident response and thr

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NDR by Bricata features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Bricata
    Year Founded
    2014
    HQ Location
    Columbia, US
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Bricata is leading the next generation of advanced network detection and response for the enterprise. By fusing real-time visibility, advanced detection, analysis, forensics, incident response and thr

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
NDR by Bricata features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Bricata
Year Founded
2014
HQ Location
Columbia, US
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
(1)5.0 out of 5
View top Consulting Services for Nozomi Networks Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Nozomi Networks offers highly accurate, actionable intelligence and protection for integrated cybersecurity at scale. The detailed visibility and in-depth insight provided by Nozomi Networks lets us

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Nozomi Networks Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customization
    1
    Detection
    1
    Detection Efficiency
    1
    Features
    1
    Threat Detection
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Nozomi Networks Platform features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @nozominetworks
    4,159 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    93 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Nozomi Networks offers highly accurate, actionable intelligence and protection for integrated cybersecurity at scale. The detailed visibility and in-depth insight provided by Nozomi Networks lets us

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Nozomi Networks Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customization
1
Detection
1
Detection Efficiency
1
Features
1
Threat Detection
1
Cons
Expensive
1
Nozomi Networks Platform features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Twitter
@nozominetworks
4,159 Twitter followers
LinkedIn® Page
www.linkedin.com
93 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Meet HelpSysA Key Part of Fortra (the new face of HelpSystems) Powertech is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscap

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Powertech Exit Point Manager for IBM i features and usability ratings that predict user satisfaction
    0.0
    No information available
    6.7
    Security hardening
    Average: 8.8
    10.0
    Compliance
    Average: 8.9
    6.7
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,467 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,643 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Meet HelpSysA Key Part of Fortra (the new face of HelpSystems) Powertech is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscap

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Powertech Exit Point Manager for IBM i features and usability ratings that predict user satisfaction
0.0
No information available
6.7
Security hardening
Average: 8.8
10.0
Compliance
Average: 8.9
6.7
Security Monitoring
Average: 8.9
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,467 Twitter followers
LinkedIn® Page
www.linkedin.com
1,643 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    UTMStack is an All-In-One Unified Threat Management Platform that aims to simplify Cybersecurity and reduce its cost. We are a small company focused on software development. Our headquarters are loca

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UTMStack features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

UTMStack is an All-In-One Unified Threat Management Platform that aims to simplify Cybersecurity and reduce its cost. We are a small company focused on software development. Our headquarters are loca

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
UTMStack features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AhnLab AIPS is the future-driven network intrusion prevention system that detects and blocks advanced network attacks targeting organizations. Why AhnLab AIPS • Intelligence-driven Threat Preventio

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AhnLab AIPS (Advanced IPS) features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AhnLab
    Year Founded
    1995
    HQ Location
    Gyeonggi-do, South Korea
    Twitter
    @AhnLab_man
    14,871 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    295 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AhnLab AIPS is the future-driven network intrusion prevention system that detects and blocks advanced network attacks targeting organizations. Why AhnLab AIPS • Intelligence-driven Threat Preventio

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
AhnLab AIPS (Advanced IPS) features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
AhnLab
Year Founded
1995
HQ Location
Gyeonggi-do, South Korea
Twitter
@AhnLab_man
14,871 Twitter followers
LinkedIn® Page
www.linkedin.com
295 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Anakramy Guard delivers robust security monitoring and protection for your IT assets using its Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) capabilities.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Anakramy Guard features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Anakramy
    Year Founded
    2024
    HQ Location
    Bengaluru, IN
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Anakramy Guard delivers robust security monitoring and protection for your IT assets using its Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) capabilities.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Anakramy Guard features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Anakramy
Year Founded
2024
HQ Location
Bengaluru, IN
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    As a leader in advanced threat detection, BluVector is empowering security teams to get answers about real threats, allowing businesses and governments to operate with greater confidence that data and

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BluVector Cortex features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BluVector
    Year Founded
    1994
    HQ Location
    Littleton, Colorado, United States
    Twitter
    @BluVector
    694 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    614 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

As a leader in advanced threat detection, BluVector is empowering security teams to get answers about real threats, allowing businesses and governments to operate with greater confidence that data and

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
BluVector Cortex features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
BluVector
Year Founded
1994
HQ Location
Littleton, Colorado, United States
Twitter
@BluVector
694 Twitter followers
LinkedIn® Page
www.linkedin.com
614 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Telesoft CERNE combines a high rate 40Gbps IDS engine with automated record of relevant network traffic for real-time and historical threat investigation. CERNE continuously scans and collects all

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CERNE features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Telesoft
    Year Founded
    1989
    HQ Location
    Blandford, United Kingdom
    Twitter
    @Telesoft_Tech
    4,387 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    108 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Telesoft CERNE combines a high rate 40Gbps IDS engine with automated record of relevant network traffic for real-time and historical threat investigation. CERNE continuously scans and collects all

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
CERNE features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Telesoft
Year Founded
1989
HQ Location
Blandford, United Kingdom
Twitter
@Telesoft_Tech
4,387 Twitter followers
LinkedIn® Page
www.linkedin.com
108 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    India's First Secure Hypervisor, Configurable Hardware Enforced Security and Safety Solution, mainly built for mission critical servers, embedded systems, desktops to protect them from Advanced malwar

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CHESS-P features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Hyderabad, IN
    Twitter
    @securweave
    40 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

India's First Secure Hypervisor, Configurable Hardware Enforced Security and Safety Solution, mainly built for mission critical servers, embedded systems, desktops to protect them from Advanced malwar

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
CHESS-P features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Hyderabad, IN
Twitter
@securweave
40 Twitter followers
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Clone Systems VoIP IPS features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1998
    HQ Location
    Philadelphia, US
    LinkedIn® Page
    www.linkedin.com
    20 employees on LinkedIn®
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Clone Systems VoIP IPS features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1998
HQ Location
Philadelphia, US
LinkedIn® Page
www.linkedin.com
20 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloud IDS Cloud IDS (Cloud Intrusion Detection System) provides cloud-native network threat detection with industry-leading security.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloud IDS features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,753,487 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    310,860 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Cloud IDS Cloud IDS (Cloud Intrusion Detection System) provides cloud-native network threat detection with industry-leading security.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Cloud IDS features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,753,487 Twitter followers
LinkedIn® Page
www.linkedin.com
310,860 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cybowall combines multiple cybersecurity tools and capabilities in one solution - securing networks of all sizes and providing unified defense against a continuously evolving threat landscape.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cybowall features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYBONET
    Year Founded
    2002
    HQ Location
    Haifa, IL
    Twitter
    @Cybonet1
    77 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    28 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cybowall combines multiple cybersecurity tools and capabilities in one solution - securing networks of all sizes and providing unified defense against a continuously evolving threat landscape.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Cybowall features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
CYBONET
Year Founded
2002
HQ Location
Haifa, IL
Twitter
@Cybonet1
77 Twitter followers
LinkedIn® Page
www.linkedin.com
28 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    EcoStruxure Security Expert is a policy-based product that does audit, enforce and report on managed machines with respect to their assigned policies.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • EcoStruxure Security Expert features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Buchi
    LinkedIn® Page
    www.linkedin.com
    184 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

EcoStruxure Security Expert is a policy-based product that does audit, enforce and report on managed machines with respect to their assigned policies.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
EcoStruxure Security Expert features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Buchi
LinkedIn® Page
www.linkedin.com
184 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ensighten is a comprehensive website security company, offering next generation client-side protection against data loss, ad injection and intrusion. Through the Ensighten MarSecTM solution, organizat

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ensighten Website Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ensighten
    Year Founded
    2009
    HQ Location
    Menlo Park, California
    Twitter
    @ensighten
    9,516 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ensighten is a comprehensive website security company, offering next generation client-side protection against data loss, ad injection and intrusion. Through the Ensighten MarSecTM solution, organizat

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Ensighten Website Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Ensighten
Year Founded
2009
HQ Location
Menlo Park, California
Twitter
@ensighten
9,516 Twitter followers
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Your network security is as strong as your least secure endpoint. Even a single endpoint left unsecured will increase your network’s vulnerability. To strengthen your network security, you need to sec

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • eScan Enterprise EDR (with Neural Intelligence AI/ML Defense) features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    Mumbai, Maharashtra
    Twitter
    @eScanAV
    52 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    193 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Your network security is as strong as your least secure endpoint. Even a single endpoint left unsecured will increase your network’s vulnerability. To strengthen your network security, you need to sec

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
eScan Enterprise EDR (with Neural Intelligence AI/ML Defense) features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1993
HQ Location
Mumbai, Maharashtra
Twitter
@eScanAV
52 Twitter followers
LinkedIn® Page
www.linkedin.com
193 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A Key Part of Fortra (the new face of HelpSystems) Powertech is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringin

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Exit Point Manager for IBM i features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,467 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,643 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A Key Part of Fortra (the new face of HelpSystems) Powertech is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringin

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Exit Point Manager for IBM i features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,467 Twitter followers
LinkedIn® Page
www.linkedin.com
1,643 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The NSFOCUS Next Generation Intrusion Prevention System (NGIPS) provides advanced multi-stage AI analysis for detection and mitigation of tomorrow and beyond unknown and zero-day advanced persistent t

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NSFocus NGIPS features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NSFOCUS
    Year Founded
    2000
    HQ Location
    Santa Clara, California
    Twitter
    @NSFOCUS_Intl
    1,120 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    704 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The NSFOCUS Next Generation Intrusion Prevention System (NGIPS) provides advanced multi-stage AI analysis for detection and mitigation of tomorrow and beyond unknown and zero-day advanced persistent t

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
NSFocus NGIPS features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
NSFOCUS
Year Founded
2000
HQ Location
Santa Clara, California
Twitter
@NSFOCUS_Intl
1,120 Twitter followers
LinkedIn® Page
www.linkedin.com
704 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Orbit™ Intrusion Detection is a hardened Intrusion Detection System - that will assist you in seeing what traffic is going on inside or outside your network

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Orbit Intrustion Detection System features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1937
    HQ Location
    Tupelo, US
    LinkedIn® Page
    www.linkedin.com
    116 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Orbit™ Intrusion Detection is a hardened Intrusion Detection System - that will assist you in seeing what traffic is going on inside or outside your network

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Orbit Intrustion Detection System features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1937
HQ Location
Tupelo, US
LinkedIn® Page
www.linkedin.com
116 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyber security software for remote assets and small scale networks. RazorSecure Active Protection System provides continuous threat monitoring and active defence strategy for trains, buses, planes, t

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RazorSecure features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Basingstoke, GB
    LinkedIn® Page
    www.linkedin.com
    30 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyber security software for remote assets and small scale networks. RazorSecure Active Protection System provides continuous threat monitoring and active defence strategy for trains, buses, planes, t

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
RazorSecure features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2014
HQ Location
Basingstoke, GB
LinkedIn® Page
www.linkedin.com
30 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sandfly Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Christchurch, NZ
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Sandfly Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2017
HQ Location
Christchurch, NZ
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Industrial cybersecurity. Secure-NOK provides innovative solutions to solve Industrial Cybersecurity needs.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SNOK features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SecureNok
    Year Founded
    2010
    Twitter
    @securenok
    70 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Industrial cybersecurity. Secure-NOK provides innovative solutions to solve Industrial Cybersecurity needs.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
SNOK features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
SecureNok
Year Founded
2010
Twitter
@securenok
70 Twitter followers
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Suricata is a free and open source, mature, fast and robust network threat detection engine.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • suricata features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    suricata
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Suricata is a free and open source, mature, fast and robust network threat detection engine.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
suricata features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
suricata
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Syspeace is an intrusion detection and prevention system against brute force attacks on Microsoft Windows Servers. Syspeace is an intrusion protection software which most can afford regardless of busi

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Syspeace features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Syspeace
    Year Founded
    2012
    HQ Location
    Stockholm, SE
    Twitter
    @syspeace
    232 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Syspeace is an intrusion detection and prevention system against brute force attacks on Microsoft Windows Servers. Syspeace is an intrusion protection software which most can afford regardless of busi

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Syspeace features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Syspeace
Year Founded
2012
HQ Location
Stockholm, SE
Twitter
@syspeace
232 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Venusense intrusion prevention system (IPS) can recognize and block attacks and viruses, such as the Web attack, worm, spy software, Trojan, overflow attack, database attack, advanced threat attack, a

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Venusense Intrusion Prevention and Management System (IPS) features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Venustech
    Year Founded
    1996
    LinkedIn® Page
    www.linkedin.com
    446 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Venusense intrusion prevention system (IPS) can recognize and block attacks and viruses, such as the Web attack, worm, spy software, Trojan, overflow attack, database attack, advanced threat attack, a

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Venusense Intrusion Prevention and Management System (IPS) features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Venustech
Year Founded
1996
LinkedIn® Page
www.linkedin.com
446 employees on LinkedIn®