Best Intrusion Detection and Prevention Systems (IDPS) - Page 2

LW
Researched and written by Lauren Worth

Intrusion detection and prevention systems (IDPS) are used to inform IT administrators and security staff of anomalies and attacks on IT infrastructure and applications. These tools detect malware, socially engineered attacks, and other web-based threats. IDPS also provide preemptive intrusion prevention capabilities for internal threats and potentially compromised systems.

Intrusion detection and prevention systems monitor systems for abnormal behavior and potential vulnerabilities that can leave a business susceptible to cyberattacks. Companies choose to adopt these to protect their sensitive business information and ensure their computing infrastructure performs as needed.

Some next-generation firewall software offer intrusion detection and prevention capabilities. But the main functionality of firewall tools will be controlling network access, rather than monitoring network behavior.

To qualify for inclusion in the Intrusion Detection and Prevention Systems (IDPS) category, a product must:

Monitor IT systems for abnormal behavior and misuse
Inform administrators of abnormal protocol activity
Monitor the performance of IT hardware and security components
Provide blocking mechanisms for web-based threats

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
59 Listings in Intrusion Detection and Prevention Systems (IDPS) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    High performance. Resiliency. Security operations empowerment. NGIPS receives new policy rules and signatures every two hours, so your security is always up to date.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 65% Enterprise
    • 24% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Secure IPS (NGIPS) features and usability ratings that predict user satisfaction
    8.0
    Has the product been a good partner in doing business?
    Average: 9.0
    7.9
    Security hardening
    Average: 8.8
    7.6
    Compliance
    Average: 8.8
    7.4
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    732,001 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97,323 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

High performance. Resiliency. Security operations empowerment. NGIPS receives new policy rules and signatures every two hours, so your security is always up to date.

Users
No information available
Industries
No information available
Market Segment
  • 65% Enterprise
  • 24% Mid-Market
Cisco Secure IPS (NGIPS) features and usability ratings that predict user satisfaction
8.0
Has the product been a good partner in doing business?
Average: 9.0
7.9
Security hardening
Average: 8.8
7.6
Compliance
Average: 8.8
7.4
Security Monitoring
Average: 8.9
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
732,001 Twitter followers
LinkedIn® Page
www.linkedin.com
97,323 employees on LinkedIn®
Ownership
NASDAQ:CSCO
(91)4.2 out of 5
15th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Cisco Secure Firewall portfolio delivers greater protections for your network against an increasingly evolving and complex set of threats. With Cisco, you’re investing in a foundation for security

    Users
    No information available
    Industries
    • Information Technology and Services
    • Telecommunications
    Market Segment
    • 45% Mid-Market
    • 43% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Configuration Ease
    1
    Easy Management
    1
    Updates
    1
    Cons
    Complex Coding
    1
    Complex Configuration
    1
    Difficult Management
    1
    Integration Issues
    1
    Limited Flexibility
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv) features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Security hardening
    Average: 8.8
    8.3
    Compliance
    Average: 8.8
    8.9
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    732,001 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97,323 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

The Cisco Secure Firewall portfolio delivers greater protections for your network against an increasingly evolving and complex set of threats. With Cisco, you’re investing in a foundation for security

Users
No information available
Industries
  • Information Technology and Services
  • Telecommunications
Market Segment
  • 45% Mid-Market
  • 43% Enterprise
Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Configuration Ease
1
Easy Management
1
Updates
1
Cons
Complex Coding
1
Complex Configuration
1
Difficult Management
1
Integration Issues
1
Limited Flexibility
1
Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv) features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
8.3
Security hardening
Average: 8.8
8.3
Compliance
Average: 8.8
8.9
Security Monitoring
Average: 8.9
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
732,001 Twitter followers
LinkedIn® Page
www.linkedin.com
97,323 employees on LinkedIn®
Ownership
NASDAQ:CSCO

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 35% Enterprise
    • 20% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Infinity Platform features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Security hardening
    Average: 8.8
    8.9
    Compliance
    Average: 8.8
    8.9
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,380 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,920 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

Users
No information available
Industries
No information available
Market Segment
  • 35% Enterprise
  • 20% Small-Business
Check Point Infinity Platform features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.0
9.4
Security hardening
Average: 8.8
8.9
Compliance
Average: 8.8
8.9
Security Monitoring
Average: 8.9
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,380 Twitter followers
LinkedIn® Page
www.linkedin.com
7,920 employees on LinkedIn®
Ownership
NASDAQ:CHKP
(87)4.7 out of 5
14th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 69% Small-Business
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdSec features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    9.3
    Security hardening
    Average: 8.8
    8.1
    Compliance
    Average: 8.8
    8.9
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CrowdSec
    Year Founded
    2020
    HQ Location
    Paris, FR
    Twitter
    @Crowd_Security
    19,777 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 69% Small-Business
  • 21% Mid-Market
CrowdSec features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
9.3
Security hardening
Average: 8.8
8.1
Compliance
Average: 8.8
8.9
Security Monitoring
Average: 8.9
Seller Details
Seller
CrowdSec
Year Founded
2020
HQ Location
Paris, FR
Twitter
@Crowd_Security
19,777 Twitter followers
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A network security platform, years in the making, leveraging mathematics to continuously learn, predict, and defend against attacks.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 38% Small-Business
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • B1 Platform by CloudCover Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    20
    Network Security
    18
    Ease of Use
    13
    Protection
    11
    Cybersecurity
    10
    Cons
    Poor Customer Support
    9
    Not User-Friendly
    5
    Poor Interface
    5
    Poor Interface Design
    5
    Integration Issues
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • B1 Platform by CloudCover features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Security hardening
    Average: 8.8
    8.5
    Compliance
    Average: 8.8
    9.8
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2007
    HQ Location
    Minneapolis, US
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A network security platform, years in the making, leveraging mathematics to continuously learn, predict, and defend against attacks.

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 38% Small-Business
  • 38% Mid-Market
B1 Platform by CloudCover Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
20
Network Security
18
Ease of Use
13
Protection
11
Cybersecurity
10
Cons
Poor Customer Support
9
Not User-Friendly
5
Poor Interface
5
Poor Interface Design
5
Integration Issues
4
B1 Platform by CloudCover features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
8.8
Security hardening
Average: 8.8
8.5
Compliance
Average: 8.8
9.8
Security Monitoring
Average: 8.9
Seller Details
Year Founded
2007
HQ Location
Minneapolis, US
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SNORT(r), The standard in IDS and IPS.

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 78% Mid-Market
    • 22% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Snort features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Security hardening
    Average: 8.8
    10.0
    Compliance
    Average: 8.8
    10.0
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Snort
    HQ Location
    San Jose
    Twitter
    @snort
    23,571 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

SNORT(r), The standard in IDS and IPS.

Users
No information available
Industries
  • Computer Software
Market Segment
  • 78% Mid-Market
  • 22% Small-Business
Snort features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
10.0
Security hardening
Average: 8.8
10.0
Compliance
Average: 8.8
10.0
Security Monitoring
Average: 8.9
Seller Details
Seller
Snort
HQ Location
San Jose
Twitter
@snort
23,571 Twitter followers
LinkedIn® Page
www.linkedin.com
(10)4.6 out of 5
11th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ossec is an open source host-based intrusion detection system that performs log analysis, file integrity checking, policy monitoring, rootkit detection and process monitoring.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 30% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ossec features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Security hardening
    Average: 8.8
    9.0
    Compliance
    Average: 8.8
    10.0
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ossec
    Year Founded
    2012
    HQ Location
    Mannouba, Tunis
    Twitter
    @ossecproject
    1,677 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ossec is an open source host-based intrusion detection system that performs log analysis, file integrity checking, policy monitoring, rootkit detection and process monitoring.

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 30% Mid-Market
Ossec features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
9.2
Security hardening
Average: 8.8
9.0
Compliance
Average: 8.8
10.0
Security Monitoring
Average: 8.9
Seller Details
Seller
Ossec
Year Founded
2012
HQ Location
Mannouba, Tunis
Twitter
@ossecproject
1,677 Twitter followers
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Corelight's Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detecti

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Corelight Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Analytics
    2
    Detailed Analysis
    2
    Detection
    2
    Detection Efficiency
    2
    Ease of Use
    2
    Cons
    Complexity
    2
    Complex Coding
    1
    Data Management
    1
    Data Management Issues
    1
    Delayed Detection
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Corelight features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    7.5
    Security hardening
    Average: 8.8
    8.3
    Compliance
    Average: 8.8
    9.3
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Corelight
    Company Website
    Year Founded
    2013
    HQ Location
    San Francisco, CA
    Twitter
    @corelight_inc
    4,209 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    325 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Corelight's Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detecti

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Corelight Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Analytics
2
Detailed Analysis
2
Detection
2
Detection Efficiency
2
Ease of Use
2
Cons
Complexity
2
Complex Coding
1
Data Management
1
Data Management Issues
1
Delayed Detection
1
Corelight features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
7.5
Security hardening
Average: 8.8
8.3
Compliance
Average: 8.8
9.3
Security Monitoring
Average: 8.9
Seller Details
Seller
Corelight
Company Website
Year Founded
2013
HQ Location
San Francisco, CA
Twitter
@corelight_inc
4,209 Twitter followers
LinkedIn® Page
www.linkedin.com
325 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OmniShield is the next-generation cybersecurity solution that extends your company's perimeter to all your sites while providing omnipresent, enterprise-grade security.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 83% Small-Business
    • 17% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Omnishield by MyDigitalShield features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OmniNET
    Year Founded
    2013
    HQ Location
    Charlotte, US
    Twitter
    @OmniNetInc
    1,184 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OmniShield is the next-generation cybersecurity solution that extends your company's perimeter to all your sites while providing omnipresent, enterprise-grade security.

Users
No information available
Industries
No information available
Market Segment
  • 83% Small-Business
  • 17% Mid-Market
Omnishield by MyDigitalShield features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
OmniNET
Year Founded
2013
HQ Location
Charlotte, US
Twitter
@OmniNetInc
1,184 Twitter followers
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Maximise security and minimise complexity. SenseOn offers a comprehensive Extended Detection & Response solution that empowers resource-conscious IT leaders to deliver enterprise-level security—wi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 86% Mid-Market
    • 14% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SenseOn Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    5
    Response Time
    3
    Alerts
    2
    Deployment Ease
    2
    Ease of Use
    2
    Cons
    Difficult Learning Curve
    1
    Expensive
    1
    Information Overload
    1
    Integration Issues
    1
    Poor Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SenseOn features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.0
    6.7
    Security hardening
    Average: 8.8
    8.7
    Compliance
    Average: 8.8
    10.0
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SenseOn
    Year Founded
    2017
    HQ Location
    London, UK
    Twitter
    @SenseonTech
    1,238 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    37 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Maximise security and minimise complexity. SenseOn offers a comprehensive Extended Detection & Response solution that empowers resource-conscious IT leaders to deliver enterprise-level security—wi

Users
No information available
Industries
No information available
Market Segment
  • 86% Mid-Market
  • 14% Enterprise
SenseOn Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
5
Response Time
3
Alerts
2
Deployment Ease
2
Ease of Use
2
Cons
Difficult Learning Curve
1
Expensive
1
Information Overload
1
Integration Issues
1
Poor Management
1
SenseOn features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.0
6.7
Security hardening
Average: 8.8
8.7
Compliance
Average: 8.8
10.0
Security Monitoring
Average: 8.9
Seller Details
Seller
SenseOn
Year Founded
2017
HQ Location
London, UK
Twitter
@SenseonTech
1,238 Twitter followers
LinkedIn® Page
www.linkedin.com
37 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The vSRX offers the same features as our physical SRX Series firewalls but in a virtualized form factor for delivering security services that scale to match network demand. It offers the same features

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Mid-Market
    • 14% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • vSRX features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Security hardening
    Average: 8.8
    9.2
    Compliance
    Average: 8.8
    8.8
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1996
    HQ Location
    Sunnyvale, CA
    Twitter
    @JuniperNetworks
    106,170 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    12,217 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The vSRX offers the same features as our physical SRX Series firewalls but in a virtualized form factor for delivering security services that scale to match network demand. It offers the same features

Users
No information available
Industries
No information available
Market Segment
  • 71% Mid-Market
  • 14% Small-Business
vSRX features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
9.2
Security hardening
Average: 8.8
9.2
Compliance
Average: 8.8
8.8
Security Monitoring
Average: 8.9
Seller Details
Year Founded
1996
HQ Location
Sunnyvale, CA
Twitter
@JuniperNetworks
106,170 Twitter followers
LinkedIn® Page
www.linkedin.com
12,217 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lastline’s Network Detection and Response platform delivers the visibility security professionals need to detect and contain sophisticated cyberthreats before they disrupt your business. We offer the

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Lastline Defender Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Artificial Intelligence
    3
    Features
    3
    AI Automation
    2
    Deployment Ease
    2
    Cons
    Limited Features
    4
    Poor Customer Support
    3
    Poor Documentation
    3
    Difficult Configuration
    2
    Inefficient Automation
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lastline Defender features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Security hardening
    Average: 8.8
    8.3
    Compliance
    Average: 8.8
    8.3
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    59,799 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    61,034 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Lastline’s Network Detection and Response platform delivers the visibility security professionals need to detect and contain sophisticated cyberthreats before they disrupt your business. We offer the

Users
No information available
Industries
No information available
Market Segment
  • 46% Mid-Market
  • 31% Enterprise
Lastline Defender Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Artificial Intelligence
3
Features
3
AI Automation
2
Deployment Ease
2
Cons
Limited Features
4
Poor Customer Support
3
Poor Documentation
3
Difficult Configuration
2
Inefficient Automation
2
Lastline Defender features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.0
8.3
Security hardening
Average: 8.8
8.3
Compliance
Average: 8.8
8.3
Security Monitoring
Average: 8.9
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
59,799 Twitter followers
LinkedIn® Page
www.linkedin.com
61,034 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CleanINTERNET® is an intelligence-powered security solution using high performance computing technology, patented software algorithms and uniquely skilled security analysts to deliver a robust alterna

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Centripetal CleanINTERNET ® Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Alerts
    2
    Reliability
    2
    Security Protection
    2
    Automation
    1
    Cons
    Data Privacy
    1
    False Positives
    1
    Incomplete Information
    1
    Logging Issues
    1
    Poor Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Centripetal CleanINTERNET ® features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Security hardening
    Average: 8.8
    10.0
    Compliance
    Average: 8.8
    10.0
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Reston, VA
    Twitter
    @Centripetal_AI
    479 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CleanINTERNET® is an intelligence-powered security solution using high performance computing technology, patented software algorithms and uniquely skilled security analysts to deliver a robust alterna

Users
No information available
Industries
No information available
Market Segment
  • 80% Mid-Market
  • 20% Small-Business
Centripetal CleanINTERNET ® Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Alerts
2
Reliability
2
Security Protection
2
Automation
1
Cons
Data Privacy
1
False Positives
1
Incomplete Information
1
Logging Issues
1
Poor Reporting
1
Centripetal CleanINTERNET ® features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
10.0
Security hardening
Average: 8.8
10.0
Compliance
Average: 8.8
10.0
Security Monitoring
Average: 8.9
Seller Details
Year Founded
2009
HQ Location
Reston, VA
Twitter
@Centripetal_AI
479 Twitter followers
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Multi-layered protection is provided, with an integrated firewall, antivirus and Intrusion Detection System (IDS). The agentless firewall ensures complete traffic control and isolation between VMs. Th

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 50% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 5nine Cloud Security features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Security hardening
    Average: 8.8
    8.3
    Compliance
    Average: 8.8
    6.7
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Acronis
    Year Founded
    2003
    HQ Location
    Schaffhausen
    Twitter
    @acronis
    96,175 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,982 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Multi-layered protection is provided, with an integrated firewall, antivirus and Intrusion Detection System (IDS). The agentless firewall ensures complete traffic control and isolation between VMs. Th

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 50% Enterprise
5nine Cloud Security features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
8.3
Security hardening
Average: 8.8
8.3
Compliance
Average: 8.8
6.7
Security Monitoring
Average: 8.9
Seller Details
Seller
Acronis
Year Founded
2003
HQ Location
Schaffhausen
Twitter
@acronis
96,175 Twitter followers
LinkedIn® Page
www.linkedin.com
1,982 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    "Networks get hacked, become slow & go down more often than you think. Are you using the right tool to control your network?" BhaiFi is a Global Cybersecurity startup based out of India that off

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Small-Business
    • 23% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BhaiFi.ai features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Security hardening
    Average: 8.8
    10.0
    Compliance
    Average: 8.8
    10.0
    Security Monitoring
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BhaiFi
    Year Founded
    2017
    HQ Location
    Gurgaon, Haryana
    Twitter
    @bhaifi
    71 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

"Networks get hacked, become slow & go down more often than you think. Are you using the right tool to control your network?" BhaiFi is a Global Cybersecurity startup based out of India that off

Users
No information available
Industries
No information available
Market Segment
  • 64% Small-Business
  • 23% Mid-Market
BhaiFi.ai features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
10.0
Security hardening
Average: 8.8
10.0
Compliance
Average: 8.8
10.0
Security Monitoring
Average: 8.9
Seller Details
Seller
BhaiFi
Year Founded
2017
HQ Location
Gurgaon, Haryana
Twitter
@bhaifi
71 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®