Top Rated Cisco Secure IPS (NGIPS) Alternatives
16 out of 17 Total Reviews for Cisco Secure IPS (NGIPS)
Overall Review Sentiment for Cisco Secure IPS (NGIPS)
Log in to view review sentiment.

As cyberattacks evolve, network security requires unparalleled visibility and intelligence covering all threats for comprehensive protection. And with differing organizational responsibilities and agendas, you need a consistent security enforcement mechanism.Cisco is number one in the technical support. It's good technical support and this is actually a problem when we do the recruitment for some other products. Other products you are on hold forever and the support might be not the best compared to Cisco. These increasing operational demands call for a renewed focus on dedicated Secure IPS to provide a deeper level of security and visibility for the enterprise.The features that I find most valuable are the DDoS protection, IPS/IDS, and Firepower for web application filtering and their fingerprints are good in terms of how they whitelist and blacklist.In the virtual deployment, you have a couple of choices depending on your needs and how much bandwidth you have that needs to be inspected.Technical support is quite good. With firewalls, the last cases I had with Cisco were professionally handled quite quickly and it was great. Review collected by and hosted on G2.com.
The file trajectory, the trace in contamination files, could be improved. Review collected by and hosted on G2.com.

Customization and pre-processor rules. Well-managed portal to effectively identify signatures. High throughput and performance. Review collected by and hosted on G2.com.
Port scan rules have been causing many problems initially. It was either disabled or limited to specific flows that controlled it. As experienced, some signature rules failed to protect the vulnerability attack of remote code execution at Windows 2013 server. The signatures were patched and enabled, but required protection wasn't achieved. Review collected by and hosted on G2.com.

Today's complex networks demand a robust threat detection and containment approach. Safeguarding network assets and data from today's threats requires detailed visibility into all network layers, content and resources no matter where they are deployed.
A well designed NGIPS can provide visibility, threat detection and response that remain unavailable to firewall inspection.
An NGIPS can be set to fail-open so traffic will always flow and business is not impacted by NGIPS failure. Review collected by and hosted on G2.com.
Enabling IPS functions can impose considerable performance degradation on traffic. Review collected by and hosted on G2.com.

Helps detect potential attacks, malformed packets, block based on traffic behavior Review collected by and hosted on G2.com.
It most of the times impact network performance, sometimes blocking based on traffic behavior can block legit traffic flow needed Review collected by and hosted on G2.com.
Policy creation and deployment, central management Review collected by and hosted on G2.com.
upgrade - it's not getting better, upgrade mostly break things or will not fix old bugs, instead creates additional bugs Review collected by and hosted on G2.com.
As per my observation The integration between Firepower NGIPS and other products, like Cisco ISE and Splunk, is also a key feature of this solution Review collected by and hosted on G2.com.
As per my view the interface is little outdated. Cisco could use the latest design language they already used for other platforms Review collected by and hosted on G2.com.

List of bad sites, porn site, uneligible sites, and also has a good user interface Review collected by and hosted on G2.com.
Nothing. It has no bad thing that I didn't like. maybe the installation process can be easier Review collected by and hosted on G2.com.

NGIPS is easiest and best way to protect systems from untrusted zone. Review collected by and hosted on G2.com.
NGIPS always requires high performance devices and costly licenses. Review collected by and hosted on G2.com.