It offers very robust protection against real-time attacks, as it detects and blocks intrusion attempts before they affect the network. It is also constantly updated with new threat signatures, which gives confidence that it is covered against recent vulnerabilities. I find it valuable that all of this is done transparently without affecting application performance or user experience, something that coincides with what others also highlight in their comments. Review collected by and hosted on G2.com.
The initial setup can be somewhat complex and requires time to adjust policies according to the specific needs of the network; furthermore, false positives are sometimes generated that block legitimate traffic, requiring manual reviews. Review collected by and hosted on G2.com.
The reviewer uploaded a screenshot or submitted the review in-app verifying them as current user.
Validated through a business email account
Organic review. This review was written entirely without invitation or incentive from G2, a seller, or an affiliate.






