Introducing G2.ai, the future of software buying.Try now

Best Intrusion Detection and Prevention Systems (IDPS)

Lauren Worth
LW
Researched and written by Lauren Worth

Intrusion detection and prevention systems (IDPS) are used to inform IT administrators and security staff of anomalies and attacks on IT infrastructure and applications. These tools detect malware, socially engineered attacks, and other web-based threats. IDPS also provide preemptive intrusion prevention capabilities for internal threats and potentially compromised systems.

Intrusion detection and prevention systems monitor systems for abnormal behavior and potential vulnerabilities that can leave a business susceptible to cyberattacks. Companies choose to adopt these to protect their sensitive business information and ensure their computing infrastructure performs as needed.

Some next-generation firewall software offer intrusion detection and prevention capabilities. But the main functionality of firewall tools will be controlling network access, rather than monitoring network behavior.

To qualify for inclusion in the Intrusion Detection and Prevention Systems (IDPS) category, a product must:

Monitor IT systems for abnormal behavior and misuse
Inform administrators of abnormal protocol activity
Monitor the performance of IT hardware and security components
Provide blocking mechanisms for web-based threats
Show More
Show Less

Best Intrusion Detection and Prevention Systems (IDPS) At A Glance

Highest Performer:
Easiest to Use:
Best Free Software:
Show LessShow More
Easiest to Use:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Intrusion Detection and Prevention Systems (IDPS) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
63 Listings in Intrusion Detection and Prevention Systems (IDPS) Available
(156)4.5 out of 5
4th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
View top Consulting Services for Palo Alto Networks Next-Generation Firewalls
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Our next-generation firewall classifies all traffic, including encrypted traffic, based on application, application function, user and content. You can create comprehensive, precise security policies,

    Users
    • Network Engineer
    • Network Security Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 47% Mid-Market
    • 37% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Networks Next-Generation Firewalls Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    29
    Features
    24
    Protection
    18
    Threat Protection
    17
    Firewall Efficiency
    16
    Cons
    Expensive
    33
    Difficult Learning Curve
    14
    Slow Performance
    13
    Poor Interface Design
    10
    Complex Configuration
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Networks Next-Generation Firewalls features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.0
    9.0
    Security hardening
    Average: 8.9
    8.9
    Compliance
    Average: 8.8
    8.9
    Security Monitoring
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,262 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18,396 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Our next-generation firewall classifies all traffic, including encrypted traffic, based on application, application function, user and content. You can create comprehensive, precise security policies,

Users
  • Network Engineer
  • Network Security Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 47% Mid-Market
  • 37% Enterprise
Palo Alto Networks Next-Generation Firewalls Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
29
Features
24
Protection
18
Threat Protection
17
Firewall Efficiency
16
Cons
Expensive
33
Difficult Learning Curve
14
Slow Performance
13
Poor Interface Design
10
Complex Configuration
9
Palo Alto Networks Next-Generation Firewalls features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.0
9.0
Security hardening
Average: 8.9
8.9
Compliance
Average: 8.8
8.9
Security Monitoring
Average: 9.0
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,262 Twitter followers
LinkedIn® Page
www.linkedin.com
18,396 employees on LinkedIn®
Ownership
NYSE: PANW
(106)4.4 out of 5
14th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Overview Our Cloud-Delivered Security Services are natively integrated, offering consistent best-in-class protection everywhere. Backed by our world-renowned Unit 42® Threat Research team, this one-o

    Users
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 41% Mid-Market
    • 34% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloud-Delivered Security Services features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Security hardening
    Average: 8.9
    8.7
    Compliance
    Average: 8.8
    8.7
    Security Monitoring
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,262 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18,396 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Overview Our Cloud-Delivered Security Services are natively integrated, offering consistent best-in-class protection everywhere. Backed by our world-renowned Unit 42® Threat Research team, this one-o

Users
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 41% Mid-Market
  • 34% Enterprise
Cloud-Delivered Security Services features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
8.3
Security hardening
Average: 8.9
8.7
Compliance
Average: 8.8
8.7
Security Monitoring
Average: 9.0
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,262 Twitter followers
LinkedIn® Page
www.linkedin.com
18,396 employees on LinkedIn®
Ownership
NYSE: PANW

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(69)4.4 out of 5
6th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point IPS (Intrusion Prevention System) combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS software solutions. IPS delivers

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 46% Mid-Market
    • 41% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Quantum Intrusion Prevention System (IPS) features and usability ratings that predict user satisfaction
    8.4
    Has the product been a good partner in doing business?
    Average: 9.0
    8.6
    Security hardening
    Average: 8.9
    9.0
    Compliance
    Average: 8.8
    8.9
    Security Monitoring
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,914 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,323 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point IPS (Intrusion Prevention System) combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS software solutions. IPS delivers

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 46% Mid-Market
  • 41% Enterprise
Check Point Quantum Intrusion Prevention System (IPS) features and usability ratings that predict user satisfaction
8.4
Has the product been a good partner in doing business?
Average: 9.0
8.6
Security hardening
Average: 8.9
9.0
Compliance
Average: 8.8
8.9
Security Monitoring
Average: 9.0
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,914 Twitter followers
LinkedIn® Page
www.linkedin.com
8,323 employees on LinkedIn®
Ownership
NASDAQ:CHKP
(91)4.3 out of 5
Optimized for quick response
12th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Palo Alto Networks' VM-Series Virtual Firewall is the industry’s leading cloud security software, delivering the world’s most effective network security to any cloud or virtualized environment. It is

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 43% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Networks VM-Series Virtual Firewall Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Protection
    17
    Features
    16
    Protection
    12
    Ease of Use
    11
    Firewall Efficiency
    11
    Cons
    Expensive
    24
    Difficult Learning Curve
    11
    Complex Configuration
    8
    Complexity
    8
    Slow Performance
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Networks VM-Series Virtual Firewall features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.0
    9.1
    Security hardening
    Average: 8.9
    9.0
    Compliance
    Average: 8.8
    9.1
    Security Monitoring
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,262 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18,396 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Palo Alto Networks' VM-Series Virtual Firewall is the industry’s leading cloud security software, delivering the world’s most effective network security to any cloud or virtualized environment. It is

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 43% Enterprise
  • 31% Mid-Market
Palo Alto Networks VM-Series Virtual Firewall Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Protection
17
Features
16
Protection
12
Ease of Use
11
Firewall Efficiency
11
Cons
Expensive
24
Difficult Learning Curve
11
Complex Configuration
8
Complexity
8
Slow Performance
8
Palo Alto Networks VM-Series Virtual Firewall features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.0
9.1
Security hardening
Average: 8.9
9.0
Compliance
Average: 8.8
9.1
Security Monitoring
Average: 9.0
Seller Details
Company Website
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,262 Twitter followers
LinkedIn® Page
www.linkedin.com
18,396 employees on LinkedIn®
(187)4.5 out of 5
13th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

    Users
    • Cyber Security Associate
    • Cyber Security Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 43% Mid-Market
    • 34% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Hybrid Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    10
    Security Protection
    7
    Compliance
    6
    Comprehensive Security
    5
    Cloud Integration
    4
    Cons
    Complexity
    6
    Complex Setup
    4
    Feature Complexity
    4
    Learning Curve
    4
    Difficult Learning
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hybrid Cloud Security features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Security hardening
    Average: 8.9
    8.6
    Compliance
    Average: 8.8
    8.9
    Security Monitoring
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    111,968 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,862 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

Users
  • Cyber Security Associate
  • Cyber Security Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 43% Mid-Market
  • 34% Enterprise
Hybrid Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
10
Security Protection
7
Compliance
6
Comprehensive Security
5
Cloud Integration
4
Cons
Complexity
6
Complex Setup
4
Feature Complexity
4
Learning Curve
4
Difficult Learning
3
Hybrid Cloud Security features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.0
8.8
Security hardening
Average: 8.9
8.6
Compliance
Average: 8.8
8.9
Security Monitoring
Average: 9.0
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
111,968 Twitter followers
LinkedIn® Page
www.linkedin.com
7,862 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
(68)4.6 out of 5
7th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
Entry Level Price:$5.04 HOUR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance man

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Transportation/Trucking/Railroad
    Market Segment
    • 69% Enterprise
    • 26% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ExtraHop Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    All-in-One Solution
    1
    Comprehensive Monitoring
    1
    Easy Deployment
    1
    Responsive Support
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ExtraHop features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Security hardening
    Average: 8.9
    7.6
    Compliance
    Average: 8.8
    9.0
    Security Monitoring
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2007
    HQ Location
    Seattle, Washington
    Twitter
    @ExtraHop
    10,835 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    761 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance man

Users
No information available
Industries
  • Hospital & Health Care
  • Transportation/Trucking/Railroad
Market Segment
  • 69% Enterprise
  • 26% Mid-Market
ExtraHop Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
All-in-One Solution
1
Comprehensive Monitoring
1
Easy Deployment
1
Responsive Support
1
Cons
This product has not yet received any negative sentiments.
ExtraHop features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
8.8
Security hardening
Average: 8.9
7.6
Compliance
Average: 8.8
9.0
Security Monitoring
Average: 9.0
Seller Details
Year Founded
2007
HQ Location
Seattle, Washington
Twitter
@ExtraHop
10,835 Twitter followers
LinkedIn® Page
www.linkedin.com
761 employees on LinkedIn®
(14)4.7 out of 5
3rd Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Whether part of a firewall solution or a separate standalone appliance, Intrusion Prevention Systems (IPS) technology is becoming an increasingly ubiquitous part of network security defenses.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 36% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiGate IPS features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    9.7
    Security hardening
    Average: 8.9
    9.3
    Compliance
    Average: 8.8
    9.3
    Security Monitoring
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,447 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15,738 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

Whether part of a firewall solution or a separate standalone appliance, Intrusion Prevention Systems (IPS) technology is becoming an increasingly ubiquitous part of network security defenses.

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 36% Enterprise
FortiGate IPS features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
9.7
Security hardening
Average: 8.9
9.3
Compliance
Average: 8.8
9.3
Security Monitoring
Average: 9.0
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,447 Twitter followers
LinkedIn® Page
www.linkedin.com
15,738 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deep Discovery Inspector is available as a physical or virtual network appliance. It's designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Mid-Market
    • 35% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Micro Deep Discovery features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    8.5
    Security hardening
    Average: 8.9
    9.0
    Compliance
    Average: 8.8
    8.5
    Security Monitoring
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    111,968 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,862 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Deep Discovery Inspector is available as a physical or virtual network appliance. It's designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Mid-Market
  • 35% Enterprise
Trend Micro Deep Discovery features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
8.5
Security hardening
Average: 8.9
9.0
Compliance
Average: 8.8
8.5
Security Monitoring
Average: 9.0
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
111,968 Twitter followers
LinkedIn® Page
www.linkedin.com
7,862 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
(51)4.5 out of 5
15th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

    Users
    • Network & Security Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 39% Mid-Market
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Infinity Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Centralized Management
    12
    Security
    11
    Easy Management
    10
    Features
    9
    Ease of Use
    8
    Cons
    Learning Curve
    10
    Complexity
    6
    Delays
    4
    Difficult Configuration
    4
    Expensive
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Infinity Platform features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Security hardening
    Average: 8.9
    8.7
    Compliance
    Average: 8.8
    8.8
    Security Monitoring
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,914 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,323 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

Users
  • Network & Security Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 39% Mid-Market
  • 31% Small-Business
Check Point Infinity Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Centralized Management
12
Security
11
Easy Management
10
Features
9
Ease of Use
8
Cons
Learning Curve
10
Complexity
6
Delays
4
Difficult Configuration
4
Expensive
4
Check Point Infinity Platform features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
9.2
Security hardening
Average: 8.9
8.7
Compliance
Average: 8.8
8.8
Security Monitoring
Average: 9.0
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,914 Twitter followers
LinkedIn® Page
www.linkedin.com
8,323 employees on LinkedIn®
Ownership
NASDAQ:CHKP
(35)4.4 out of 5
2nd Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Connecting and protecting distributed enterprises and government agencies is more important than ever before. Defending your people and critical assets starts at the new edge. Forcepoint Next-Gen Fi

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 40% Mid-Market
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forcepoint Next-Generation Firewall (NGFW) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Control
    1
    Performance Speed
    1
    Threat Protection
    1
    Cons
    Complex Configuration
    1
    Expertise Required
    1
    Limited Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forcepoint Next-Generation Firewall (NGFW) features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.0
    8.1
    Security hardening
    Average: 8.9
    7.8
    Compliance
    Average: 8.8
    8.7
    Security Monitoring
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Austin, TX
    Twitter
    @Forcepointsec
    65,600 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,679 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Connecting and protecting distributed enterprises and government agencies is more important than ever before. Defending your people and critical assets starts at the new edge. Forcepoint Next-Gen Fi

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 40% Mid-Market
  • 31% Small-Business
Forcepoint Next-Generation Firewall (NGFW) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Control
1
Performance Speed
1
Threat Protection
1
Cons
Complex Configuration
1
Expertise Required
1
Limited Customization
1
Forcepoint Next-Generation Firewall (NGFW) features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.0
8.1
Security hardening
Average: 8.9
7.8
Compliance
Average: 8.8
8.7
Security Monitoring
Average: 9.0
Seller Details
Year Founded
1994
HQ Location
Austin, TX
Twitter
@Forcepointsec
65,600 Twitter followers
LinkedIn® Page
www.linkedin.com
1,679 employees on LinkedIn®
(92)4.2 out of 5
8th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Cisco Secure Firewall portfolio delivers greater protections for your network against an increasingly evolving and complex set of threats. With Cisco, you’re investing in a foundation for security

    Users
    No information available
    Industries
    • Information Technology and Services
    • Telecommunications
    Market Segment
    • 46% Mid-Market
    • 42% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Easy Management
    1
    Firewall Efficiency
    1
    Network Security
    1
    Cons
    Complex Coding
    1
    Complex Configuration
    1
    Upgrade Difficulties
    1
    Upgrade Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv) features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    8.9
    Security hardening
    Average: 8.9
    8.8
    Compliance
    Average: 8.8
    9.2
    Security Monitoring
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    721,895 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,148 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

The Cisco Secure Firewall portfolio delivers greater protections for your network against an increasingly evolving and complex set of threats. With Cisco, you’re investing in a foundation for security

Users
No information available
Industries
  • Information Technology and Services
  • Telecommunications
Market Segment
  • 46% Mid-Market
  • 42% Enterprise
Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Easy Management
1
Firewall Efficiency
1
Network Security
1
Cons
Complex Coding
1
Complex Configuration
1
Upgrade Difficulties
1
Upgrade Issues
1
Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv) features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
8.9
Security hardening
Average: 8.9
8.8
Compliance
Average: 8.8
9.2
Security Monitoring
Average: 9.0
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
721,895 Twitter followers
LinkedIn® Page
www.linkedin.com
95,148 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Armor is a global cloud security company. We make cybersecurity and compliance simple, achievable, and manageable for managed service providers (MSPs) and their customers across endpoint, network, ser

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 83% Small-Business
    • 17% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Armor Anywhere features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Security hardening
    Average: 8.9
    10.0
    Compliance
    Average: 8.8
    10.0
    Security Monitoring
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Armor
    Year Founded
    2009
    HQ Location
    Plano, Texas
    Twitter
    @Armor
    9,791 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    227 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Armor is a global cloud security company. We make cybersecurity and compliance simple, achievable, and manageable for managed service providers (MSPs) and their customers across endpoint, network, ser

Users
No information available
Industries
No information available
Market Segment
  • 83% Small-Business
  • 17% Mid-Market
Armor Anywhere features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
10.0
Security hardening
Average: 8.9
10.0
Compliance
Average: 8.8
10.0
Security Monitoring
Average: 9.0
Seller Details
Seller
Armor
Year Founded
2009
HQ Location
Plano, Texas
Twitter
@Armor
9,791 Twitter followers
LinkedIn® Page
www.linkedin.com
227 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trend Micro TippingPoint integrates with the Deep Discovery Advanced Threat Protection Solution to detect and block targeted attacks and malware through preemptive threat prevention, threat insight an

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Micro TippingPoint features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    9.7
    Security hardening
    Average: 8.9
    8.8
    Compliance
    Average: 8.8
    9.3
    Security Monitoring
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    111,968 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,862 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Trend Micro TippingPoint integrates with the Deep Discovery Advanced Threat Protection Solution to detect and block targeted attacks and malware through preemptive threat prevention, threat insight an

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 31% Enterprise
Trend Micro TippingPoint features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
9.7
Security hardening
Average: 8.9
8.8
Compliance
Average: 8.8
9.3
Security Monitoring
Average: 9.0
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
111,968 Twitter followers
LinkedIn® Page
www.linkedin.com
7,862 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for NDR, Darktrace brings its powerful, multi-layered AI to your data to neutralize known and unknown threats in real time. While other N

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 88% Mid-Market
    • 6% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Darktrace / NETWORK Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Artificial Intelligence
    4
    Threat Detection
    4
    Cybersecurity
    3
    Implementation Ease
    3
    Monitoring
    3
    Cons
    Learning Curve
    6
    Expensive
    3
    Alert Issues
    2
    False Positives
    2
    Feature Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Darktrace / NETWORK features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Security hardening
    Average: 8.9
    10.0
    Compliance
    Average: 8.8
    10.0
    Security Monitoring
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Darktrace
    Company Website
    Year Founded
    2013
    HQ Location
    Cambridgeshire, England
    Twitter
    @Darktrace
    18,234 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,527 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for NDR, Darktrace brings its powerful, multi-layered AI to your data to neutralize known and unknown threats in real time. While other N

Users
No information available
Industries
No information available
Market Segment
  • 88% Mid-Market
  • 6% Enterprise
Darktrace / NETWORK Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Artificial Intelligence
4
Threat Detection
4
Cybersecurity
3
Implementation Ease
3
Monitoring
3
Cons
Learning Curve
6
Expensive
3
Alert Issues
2
False Positives
2
Feature Issues
2
Darktrace / NETWORK features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
10.0
Security hardening
Average: 8.9
10.0
Compliance
Average: 8.8
10.0
Security Monitoring
Average: 9.0
Seller Details
Seller
Darktrace
Company Website
Year Founded
2013
HQ Location
Cambridgeshire, England
Twitter
@Darktrace
18,234 Twitter followers
LinkedIn® Page
www.linkedin.com
2,527 employees on LinkedIn®
(119)4.6 out of 5
Optimized for quick response
5th Easiest To Use in Intrusion Detection and Prevention Systems (IDPS) software
View top Consulting Services for Blumira Automated Detection & Response
Save to My Lists
Entry Level Price:$12.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Blumira is the security operations platform built for growing teams and partners supporting them, integrating comprehensive visibility, tools, and expert guidance to give you peace of mind knowing you

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Blumira Automated Detection & Response Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    30
    Setup Ease
    21
    Alert Management
    19
    Customer Support
    19
    Alerting
    18
    Cons
    Limited Customization
    10
    Alert System
    6
    Expensive
    6
    Faulty Detection
    6
    Inefficient Alerts
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    9.0
    Security hardening
    Average: 8.9
    8.9
    Compliance
    Average: 8.8
    9.4
    Security Monitoring
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Blumira
    Company Website
    Year Founded
    2018
    HQ Location
    Ann Arbor, Michigan
    Twitter
    @blumira
    1 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    63 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Blumira is the security operations platform built for growing teams and partners supporting them, integrating comprehensive visibility, tools, and expert guidance to give you peace of mind knowing you

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Mid-Market
  • 38% Small-Business
Blumira Automated Detection & Response Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
30
Setup Ease
21
Alert Management
19
Customer Support
19
Alerting
18
Cons
Limited Customization
10
Alert System
6
Expensive
6
Faulty Detection
6
Inefficient Alerts
5
Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
9.0
Security hardening
Average: 8.9
8.9
Compliance
Average: 8.8
9.4
Security Monitoring
Average: 9.0
Seller Details
Seller
Blumira
Company Website
Year Founded
2018
HQ Location
Ann Arbor, Michigan
Twitter
@blumira
1 Twitter followers
LinkedIn® Page
www.linkedin.com
63 employees on LinkedIn®