Introducing G2.ai, the future of software buying.Try now

Top Free Intrusion Detection and Prevention Systems (IDPS)

Check out our list of free Intrusion Detection and Prevention Systems (IDPS). Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Intrusion Detection and Prevention Systems (IDPS) to ensure you get the right product.

View Free Intrusion Detection and Prevention Systems (IDPS)

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
9 Intrusion Detection and Prevention Systems (IDPS) Products Available
(87)4.7 out of 5
15th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 69% Small-Business
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdSec features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    9.3
    Security hardening
    Average: 8.8
    8.1
    Compliance
    Average: 8.9
    8.9
    Security Monitoring
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • HH
    It is easy to use and there are already many extensions for the most popular software products. Crowdsec is at home on all the latest operating... Read review
    AJ T.
    AT
    Relatively easy to set up on individual servers and provides excellent front-line protection for web applications, including WordPress. It also... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CrowdSec
    Year Founded
    2020
    HQ Location
    Paris, FR
    Twitter
    @Crowd_Security
    19,685 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 69% Small-Business
  • 21% Mid-Market
CrowdSec features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
9.3
Security hardening
Average: 8.8
8.1
Compliance
Average: 8.9
8.9
Security Monitoring
Average: 8.9
HH
It is easy to use and there are already many extensions for the most popular software products. Crowdsec is at home on all the latest operating... Read review
AJ T.
AT
Relatively easy to set up on individual servers and provides excellent front-line protection for web applications, including WordPress. It also... Read review
Seller Details
Seller
CrowdSec
Year Founded
2020
HQ Location
Paris, FR
Twitter
@Crowd_Security
19,685 Twitter followers
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
(113)4.4 out of 5
10th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 62% Mid-Market
    • 20% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AlienVault USM (from AT&T Cybersecurity) features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Security hardening
    Average: 8.8
    9.0
    Compliance
    Average: 8.9
    9.0
    Security Monitoring
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • EM
    AlienVault has given us the opportunity to get a better look at what is going on within the network of our organization. The events shown have... Read review
    Joe L.
    JL
    In comparison to other SIEM tools, the cost vs feature prospect is very good. USM offers all the basics you would expect from a SIEM tool in an... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AT&T
    Year Founded
    1876
    HQ Location
    Dallas, TX
    Twitter
    @ATT
    890,254 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    178,523 employees on LinkedIn®
    Ownership
    NYSE: T
Product Description
How are these determined?Information
This description is provided by the seller.

AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 62% Mid-Market
  • 20% Small-Business
AlienVault USM (from AT&T Cybersecurity) features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.0
8.8
Security hardening
Average: 8.8
9.0
Compliance
Average: 8.9
9.0
Security Monitoring
Average: 8.9
EM
AlienVault has given us the opportunity to get a better look at what is going on within the network of our organization. The events shown have... Read review
Joe L.
JL
In comparison to other SIEM tools, the cost vs feature prospect is very good. USM offers all the basics you would expect from a SIEM tool in an... Read review
Seller Details
Seller
AT&T
Year Founded
1876
HQ Location
Dallas, TX
Twitter
@ATT
890,254 Twitter followers
LinkedIn® Page
www.linkedin.com
178,523 employees on LinkedIn®
Ownership
NYSE: T

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(186)4.5 out of 5
7th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

    Users
    • Cyber Security Associate
    • Cyber Security Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 40% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hybrid Cloud Security features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.0
    8.9
    Security hardening
    Average: 8.8
    8.6
    Compliance
    Average: 8.9
    8.9
    Security Monitoring
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Nico John C.
    NC
    It optimizes our cost in the cloud and also check all the gaps in between the clouds that we had in production. Read review
    Sumit K.
    SK
    Trend Micro Cloud One (which includes Deep Security) offers a unified security solution that can manage and protect workloads across physical,... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,849 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,751 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

Users
  • Cyber Security Associate
  • Cyber Security Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 40% Mid-Market
  • 33% Enterprise
Hybrid Cloud Security features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.0
8.9
Security hardening
Average: 8.8
8.6
Compliance
Average: 8.9
8.9
Security Monitoring
Average: 8.9
Nico John C.
NC
It optimizes our cost in the cloud and also check all the gaps in between the clouds that we had in production. Read review
Sumit K.
SK
Trend Micro Cloud One (which includes Deep Security) offers a unified security solution that can manage and protect workloads across physical,... Read review
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,849 Twitter followers
LinkedIn® Page
www.linkedin.com
7,751 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
(117)4.6 out of 5
Optimized for quick response
5th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Blumira provides the only cybersecurity platform that can help SMBs prevent a breach. We help lean IT teams protect their organizations against ransomware and breaches with an open SIEM+XDR platfor

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Mid-Market
    • 38% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    9.0
    Security hardening
    Average: 8.8
    8.9
    Compliance
    Average: 8.9
    9.4
    Security Monitoring
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    AI
    Blumira only takes a few clicks to set up alerting about overseas logins, odd logins, etc. If you don't have time to putz with setup, this is the... Read review
    LG
    Setting up a free account only took a few minutes and the basic detections are selected by defualt. There wasn't much that I had to do to get up... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Blumira
    Company Website
    Year Founded
    2018
    HQ Location
    Ann Arbor, Michigan
    Twitter
    @blumira
    1 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    67 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Blumira provides the only cybersecurity platform that can help SMBs prevent a breach. We help lean IT teams protect their organizations against ransomware and breaches with an open SIEM+XDR platfor

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Mid-Market
  • 38% Small-Business
Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
9.0
Security hardening
Average: 8.8
8.9
Compliance
Average: 8.9
9.4
Security Monitoring
Average: 8.9
Verified User in Information Technology and Services
AI
Blumira only takes a few clicks to set up alerting about overseas logins, odd logins, etc. If you don't have time to putz with setup, this is the... Read review
LG
Setting up a free account only took a few minutes and the basic detections are selected by defualt. There wasn't much that I had to do to get up... Read review
Seller Details
Seller
Blumira
Company Website
Year Founded
2018
HQ Location
Ann Arbor, Michigan
Twitter
@blumira
1 Twitter followers
LinkedIn® Page
www.linkedin.com
67 employees on LinkedIn®
(67)4.6 out of 5
6th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
Entry Level Price:$5.04 HOUR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance man

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Transportation/Trucking/Railroad
    Market Segment
    • 70% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ExtraHop features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Security hardening
    Average: 8.8
    7.6
    Compliance
    Average: 8.9
    9.0
    Security Monitoring
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Telecommunications
    UT
    The capability of deep dive into any OSI Layer's protocol to match your pre-configured triggers for abnormal network pattern and potential issue... Read review
    Verified User in Telecommunications
    AT
    EAsy to use, intuitive platform, drill downs Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2007
    HQ Location
    Seattle, Washington
    Twitter
    @ExtraHop
    10,921 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    725 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance man

Users
No information available
Industries
  • Hospital & Health Care
  • Transportation/Trucking/Railroad
Market Segment
  • 70% Enterprise
  • 25% Mid-Market
ExtraHop features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
8.8
Security hardening
Average: 8.8
7.6
Compliance
Average: 8.9
9.0
Security Monitoring
Average: 8.9
Verified User in Telecommunications
UT
The capability of deep dive into any OSI Layer's protocol to match your pre-configured triggers for abnormal network pattern and potential issue... Read review
Verified User in Telecommunications
AT
EAsy to use, intuitive platform, drill downs Read review
Seller Details
Company Website
Year Founded
2007
HQ Location
Seattle, Washington
Twitter
@ExtraHop
10,921 Twitter followers
LinkedIn® Page
www.linkedin.com
725 employees on LinkedIn®
(26)4.8 out of 5
1st Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    threatER is a comprehensive cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale. threatER offers a wide range o

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 62% Mid-Market
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Threater features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Security hardening
    Average: 8.8
    9.2
    Compliance
    Average: 8.9
    9.3
    Security Monitoring
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AK
    1.The interface is very user friendly. 2. Easy to whitelist / blacklist IPs and domains. 3. Great responsive support. 4. Great logging. 5.... Read review
    Michael M.
    MM
    While your SIEM may alert you of threats, Threatblockr allows you to retrieve threat intel from TAXII/STIX feeds and blocks it. Most firewalls do... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Threater
    HQ Location
    Tysons, Virginia
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

threatER is a comprehensive cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale. threatER offers a wide range o

Users
No information available
Industries
No information available
Market Segment
  • 62% Mid-Market
  • 27% Enterprise
Threater features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.0
9.4
Security hardening
Average: 8.8
9.2
Compliance
Average: 8.9
9.3
Security Monitoring
Average: 8.9
AK
1.The interface is very user friendly. 2. Easy to whitelist / blacklist IPs and domains. 3. Great responsive support. 4. Great logging. 5.... Read review
Michael M.
MM
While your SIEM may alert you of threats, Threatblockr allows you to retrieve threat intel from TAXII/STIX feeds and blocks it. Most firewalls do... Read review
Seller Details
Seller
Threater
HQ Location
Tysons, Virginia
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A network security platform, years in the making, leveraging mathematics to continuously learn, predict, and defend against attacks.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 38% Mid-Market
    • 38% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • B1 Platform by CloudCover features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Security hardening
    Average: 8.8
    8.5
    Compliance
    Average: 8.9
    9.8
    Security Monitoring
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Sparsh S.
    SS
    B1 platform by cloudcover is completely best solution for managing risks through other sources like network security and manymore. It distinguishes... Read review
    Verified User in Education Management
    UE
    I personally adore the easy layout and how user-friendly the whole platform is. It is a reliable network security system for your data as an... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2007
    HQ Location
    Minneapolis, US
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A network security platform, years in the making, leveraging mathematics to continuously learn, predict, and defend against attacks.

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 38% Mid-Market
  • 38% Small-Business
B1 Platform by CloudCover features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
8.8
Security hardening
Average: 8.8
8.5
Compliance
Average: 8.9
9.8
Security Monitoring
Average: 8.9
Sparsh S.
SS
B1 platform by cloudcover is completely best solution for managing risks through other sources like network security and manymore. It distinguishes... Read review
Verified User in Education Management
UE
I personally adore the easy layout and how user-friendly the whole platform is. It is a reliable network security system for your data as an... Read review
Seller Details
Year Founded
2007
HQ Location
Minneapolis, US
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    "Networks get hacked, become slow & go down more often than you think. Are you using the right tool to control your network?" BhaiFi is a Global Cybersecurity startup based out of India that off

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Small-Business
    • 23% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BhaiFi.ai features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Security hardening
    Average: 8.8
    10.0
    Compliance
    Average: 8.9
    10.0
    Security Monitoring
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AS
    At an affordable price point, It assists in the network's security against external intrusion. Even when usage is intense, it aids in providing... Read review
    Harjeet S.
    HS
    Bhai fi software is the best software. It will lead the industry in the future. This software will protect you from unwanted viruses and DDOS... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BhaiFi
    Year Founded
    2017
    HQ Location
    Gurgaon, Haryana
    Twitter
    @bhaifi
    71 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

"Networks get hacked, become slow & go down more often than you think. Are you using the right tool to control your network?" BhaiFi is a Global Cybersecurity startup based out of India that off

Users
No information available
Industries
No information available
Market Segment
  • 64% Small-Business
  • 23% Mid-Market
BhaiFi.ai features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
10.0
Security hardening
Average: 8.8
10.0
Compliance
Average: 8.9
10.0
Security Monitoring
Average: 8.9
AS
At an affordable price point, It assists in the network's security against external intrusion. Even when usage is intense, it aids in providing... Read review
Harjeet S.
HS
Bhai fi software is the best software. It will lead the industry in the future. This software will protect you from unwanted viruses and DDOS... Read review
Seller Details
Seller
BhaiFi
Year Founded
2017
HQ Location
Gurgaon, Haryana
Twitter
@bhaifi
71 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Syspeace is an intrusion detection and prevention system against brute force attacks on Microsoft Windows Servers. Syspeace is an intrusion protection software which most can afford regardless of busi

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Syspeace features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Syspeace
    Year Founded
    2012
    HQ Location
    Stockholm, SE
    Twitter
    @syspeace
    232 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Syspeace is an intrusion detection and prevention system against brute force attacks on Microsoft Windows Servers. Syspeace is an intrusion protection software which most can afford regardless of busi

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Syspeace features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Syspeace
Year Founded
2012
HQ Location
Stockholm, SE
Twitter
@syspeace
232 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®