
McAfee NSP is an excellent IPS/IDS solution and one feature I absolutely love about this product is its capability to Fail-Open in case of failure through its Physical Bypass/Fail-Open ports. I simply love the fact that my network traffic keeps flowing regardless of my IPS up/down status. Review collected by and hosted on G2.com.
No doubt it is an excellent IPS/IDS solution and very well integrated with the McAfee GAM engine that is enough to stop the network intrusions in my network. However, the product is buggy which breaks my heart. During the deployment, we faced some serious bugs related to SSL decryption and Performance Charts and McAfee Technical Support took their own sweet time to resolve them. Review collected by and hosted on G2.com.
I like working with “Real-time threat analyzer”. I can see attack traffic instantly and it is very nice for visually. I also like one thing more about this software it is very fast and it automatically scans threats from your desktop and gives you the detailed instructions about the threats that this software found. Review collected by and hosted on G2.com.
Sometimes this software gives confusion about the threats. Because sometime it show threats on some file but that file is not a threat. It shows threats because that file has some programming code that he found the threats but actually, it is not a threat. I think it should need some more intelligence. Review collected by and hosted on G2.com.
The capability to understand different traffic patterns and categorize them as per the behaviour. Review collected by and hosted on G2.com.
Still needs a lot of instruction on prior basis to start the aggressive actions. Review collected by and hosted on G2.com.
End point and email security at its best Review collected by and hosted on G2.com.
Forensics are not that great. It definitely has advanced threat protection but breaxh solutions are limited Review collected by and hosted on G2.com.
The FireEye Network Security appliance does the work that we sometimes forget to do. Lets face it, we wear like a kazillion different hats and the Firewall guys are never quick to want to stop a threat at the perimeter so in comes FireEye NX. They have an always growing library of integrations or modules that can be added to help in creating a complete, well rounded security solution and is a show stopper when it comes to eliminating today's most common network threats like ransomware or data extrusion. Review collected by and hosted on G2.com.
I would like if there was a File analysis or upload feature built into the NX appliance. I know they have another product that handles that level of threat analysis more in depth but it would be extremely helpful to have within the same dashboard as the list of threats being performed against your domain or network Review collected by and hosted on G2.com.
The product has been able to identify and prevent malicious traffic observed, also the technical sales team is very supporting and knowledgeable to help us know in tricky situations. Review collected by and hosted on G2.com.
Delay in updation of Geo-location DB for which they are using Maxmind DB. Review collected by and hosted on G2.com.
In Mcafee Security Manager every alert is managed properly
All the details which are required to analyze are alert is avaialble either it is CVE ID or any information related to target or attacker Review collected by and hosted on G2.com.
the thing which i dislike is that packets are not captured properly sometimes it miss to capture the same Review collected by and hosted on G2.com.
It is used throughout the organization to provide network security. If you are downloading something at work that is malicious, McAfee will stop the download to prevent any malicious or harmful software from being downloaded on your computer. Furthermore, if you visit a site that may be potentially harmful to your computer, McAfee will block access to the site. Review collected by and hosted on G2.com.
Sometimes this could slow the bandwidth
Sometimes can stop software downloads that don't deem harmful and are necessary to download
Sometimes it may block a website that isn't harmful that you want to visit because it has helpful information Review collected by and hosted on G2.com.
Overall, it was a pretty easy product to use and had many features that worked quite well. I really liked how you could customize the alerting function with specific criteria and variables so that you have only the information that you want and need. The quarantine function also worked extremely well when you needed to respond to an incident quickly. Review collected by and hosted on G2.com.
There were some quirks with tuning and the false-positive rate was higher than I would have preferred to see. Many attacks came back as "inconclusive" which made it difficult to quickly determine the status of the event. There were also times where we would received a new signature update that would stall legitimate traffic, so I would recommend having one that is not inline for testing that is a signature set ahead of production. Review collected by and hosted on G2.com.