Introducing G2.ai, the future of software buying.Try now
Product Avatar Image
SNOK

By SecureNok

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at SNOK, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
0 out of 5 stars

How would you rate your experience with SNOK?

This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review
Product Avatar Image

Have you used SNOK before?

Answer a few questions to help the SNOK community

SNOK Reviews (0)

G2 reviews are authentic and verified.

There are not enough reviews of SNOK for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Hybrid Cloud Security Logo
Hybrid Cloud Security
4.5
(187)
Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.
2
Palo Alto Networks Next-Generation Firewalls Logo
Palo Alto Networks Next-Generation Firewalls
4.5
(157)
Our next-generation firewall classifies all traffic, including encrypted traffic, based on application, application function, user and content. You can create comprehensive, precise security policies, resulting in safe enablement of applications. This lets only authorized users run sanctioned applications, greatly reducing the surface area of cyber attacks across the organization.
3
Blumira Automated Detection & Response Logo
Blumira Automated Detection & Response
4.6
(119)
Blumira's Automated SIEM enables organizations to detect and respond effectively to cybersecurity threats without having a dedicated in-house security operations center or security expertise.
4
LevelBlue USM Anywhere Logo
LevelBlue USM Anywhere
4.4
(114)
AlienVault USM (from AT&T Cybersecurity) is a platform that provides five essential security capabilities in a single console to manage both compliance and threats, understanding the sensitive nature of IT environments, include active, passive and host-based technologies to match the requirements of each particular environment.
5
Cloud-Delivered Security Services Logo
Cloud-Delivered Security Services
4.4
(106)
Our Cloud-Delivered Security Services are natively integrated, offering consistent best-in-class protection everywhere. Backed by our world-renowned Unit 42® Threat Research team, this one-of-a-kind protection uses the network effect of 65,000 global customers to share intelligence from all threat vectors to stop known, unknown and zero-day threats 180X faster than any other platform or point solution.
6
Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv) Logo
Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv)
4.2
(92)
Cisco Secure Firewall Threat Defense Virtual (formerly FTDv/NGFWv) is a comprehensive security solution designed to protect virtualized environments across private and public clouds. It integrates Cisco's proven network firewall capabilities with advanced threat defense features, including Snort Intrusion Prevention System (IPS), URL filtering, and malware defense. This virtualized firewall ensures consistent security policies and deep visibility into network traffic, enabling organizations to detect and mitigate threats before they impact operations. Key Features and Functionality: - Advanced Threat Defense: Combines network firewall with Snort IPS, URL filtering, and malware defense to protect against known and emerging threats. - Consistent Security Policies: Maintains uniform security policies across physical, private, and public cloud environments, ensuring seamless protection as workloads move. - Deep Network Visibility: Provides comprehensive insights into network traffic, allowing for quick detection of threat origins and activities. - Automated Risk Ranking: Prioritizes threats with automated risk rankings and impact flags, enabling efficient resource allocation to critical events. - License Portability: Offers flexibility to move from on-premises private clouds to public clouds while maintaining consistent policies and unified management. - Centralized Management: Utilizes Cisco Smart Software Licensing for easy deployment, management, and tracking of virtual firewall instances. Primary Value and User Solutions: Cisco Secure Firewall Threat Defense Virtual addresses the need for robust security in dynamic, virtualized environments. By providing consistent security policies and deep visibility across various cloud platforms, it simplifies threat protection and management. Organizations benefit from automated threat prioritization, flexible deployment options, and centralized control, ensuring efficient and effective defense against a wide range of cyber threats. This solution is particularly valuable for businesses undergoing data center consolidation, office relocations, mergers, acquisitions, or experiencing fluctuating application demands, as it offers the agility and scalability required to adapt to changing security needs.
7
Palo Alto Networks VM-Series Virtual Firewall Logo
Palo Alto Networks VM-Series Virtual Firewall
4.3
(91)
Palo Alto Networks VM-Series Virtual Firewall is a cloud security software that allows businesses to prevent data loss and threats with this virtualized firewall for private and public cloud environments. VM-Series is a virtualized form factor of our next-generation firewall that can be deployed in a range of private and public cloud computing environments based on technologies from VMware, Cisco, Citrix, KVM, OpenStack, Amazon Web Services, Microsoft and Google.
8
CrowdSec Logo
CrowdSec
4.7
(87)
CrowdSec is a collaborative, free and open source security automation platform relying on both IP behavior analysis and IP reputation. CrowdSec identifies threats and shares IP addresses behind malevolent behaviors across its community, to allow everyone to block them preventively. Used in 90 countries across 6 continents, the solution builds a real-time IP reputation database that keeps growing every day and benefits all community members who have each other's backs while forming a global defense shield.
9
Check Point Quantum Intrusion Prevention System (IPS) Logo
Check Point Quantum Intrusion Prevention System (IPS)
4.4
(69)
Check Point's Quantum Intrusion Prevention System (IPS) is a comprehensive security solution designed to detect and prevent attempts to exploit vulnerabilities in systems and applications. Integrated within Check Point's Next Generation Firewall, it offers automatic updates to safeguard organizations against both longstanding and emerging threats. By combining signature-based detection, protocol validation, anomaly detection, and behavioral analysis, Quantum IPS delivers robust protection against a wide array of cyber threats. Key Features and Functionality: - Comprehensive Threat Detection: Identifies and mitigates specific known exploits, vulnerabilities (both known and unknown), protocol misuse, tunneling attempts indicating data leakage, and outbound malware communications. - Real-Time Protection Updates: Continuously updated with new defenses against emerging threats, including preemptive protections that address vulnerabilities before they are exploited. - Virtual Patching: Provides a proactive approach to security by offering robust IPS functionality that complements traditional patching strategies, ensuring networks remain secure between updates. - Efficient Deployment: Features predefined recommended profiles for immediate use, customizable signature activation rules tailored to network assets, and an optional detect-only mode for evaluation purposes. - 360° Visibility and Reporting: Seamlessly integrates with SmartEvent, enabling Security Operations Center (SOC) staff to prioritize and respond to critical events efficiently. Primary Value and User Benefits: Quantum IPS addresses the critical need for proactive and comprehensive network security by offering real-time threat prevention and automatic updates. Its integration with Check Point's security gateways ensures a unified security approach, reducing the total cost of ownership. The system's low false positive rate and efficient deployment options save valuable time for IT staff, while its robust protection mechanisms safeguard organizations against a wide spectrum of cyber threats, ensuring business continuity and data integrity.
10
ExtraHop Logo
ExtraHop
4.6
(68)
ExtraHop Reveal(x) provides cloud-native visibility, detection, and response for the hybrid enterprise.
Show More
Discussions related to SNOK

Discussions for this product are not available at this time. Be the first one to Start a discussion

Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.