Nozomi Networks Platform Pricing Overview
Nozomi Networks Platform has not provided pricing information for this product or service. This is common practice for software sellers and service providers. Contact Nozomi Networks Platform to obtain current pricing.
Nozomi Networks Platform pricing & plans
Pricing information for Nozomi Networks Platform is supplied by the software provider or retrieved from publicly
accessible pricing materials. Final cost negotiations to purchase Nozomi Networks Platform must be conducted with the
seller.
Pricing information was last updated on April 17, 2023
Top Rated Nozomi Networks Platform Alternatives
Nozomi Networks Platform Alternatives Pricing
The following is a quick overview of editions offered by other Extended Detection and Response (XDR) Platforms
![]() ESET PROTECT Advanced | Contact Us | Best-in-class endpoint protection against ransomware & zero-day threats.
Cross-platform solution with easy-to-use cloud or on-prem management, server security, advanced threat defense, and full disk encryption.
|
![]() CloudBees Platform Free Edition | $0.002000 Execution Minutes Per Month |
|
![]() Free Trial | Free Trial |
|
Various alternatives pricing & plans
Pricing information for the above various Nozomi Networks Platform alternatives is supplied by the respective software provider or retrieved from publicly accessible pricing materials. Final cost negotiations to purchase any of these products must be conducted with the seller.
Nozomi Networks Platform Categories on G2
Nozomi Networks Platform Pricing Reviews
AO
Verified User in Oil & Energy
Enterprise(> 1000 emp.)
What do you like best about Nozomi Networks Platform?
Nozomi includes detection algorithms to identify OT network intrusions and maliscious traffic. Has excellent user interface to display inbound / outbound traffic patterns. Review collected by and hosted on G2.com.
What do you dislike about Nozomi Networks Platform?
Cost of the Nozomi solution is high, but compared to other intrusion detection and protection systems, it fits into cyber security budget constraints and considerations. Review collected by and hosted on G2.com.