  # Best Intrusion Detection and Prevention Systems (IDPS)

  *By [Lauren Worth](https://research.g2.com/insights/author/lauren-worth)*

   Intrusion detection and prevention systems (IDPS) are used to inform IT administrators and security staff of anomalies and attacks on IT infrastructure and applications. These tools detect malware, socially engineered attacks, and other web-based threats. IDPS also provide preemptive intrusion prevention capabilities for internal threats and potentially compromised systems.

Intrusion detection and prevention systems monitor systems for abnormal behavior and potential vulnerabilities that can leave a business susceptible to cyberattacks. Companies choose to adopt these to protect their sensitive business information and ensure their computing infrastructure performs as needed.

Some next-generation [firewall software](https://www.g2.com/categories/firewall) offer intrusion detection and prevention capabilities. But the main functionality of firewall tools will be controlling network access, rather than monitoring network behavior.

To qualify for inclusion in the Intrusion Detection and Prevention Systems (IDPS) category, a product must:

- Monitor IT systems for abnormal behavior and misuse
- Inform administrators of abnormal protocol activity
- Monitor the performance of IT hardware and security components
- Provide blocking mechanisms for web-based threats




  ## How Many Intrusion Detection and Prevention Systems (IDPS) Products Does G2 Track?
**Total Products under this Category:** 62

  
## How Does G2 Rank Intrusion Detection and Prevention Systems (IDPS) Products?

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 1,600+ Authentic Reviews
- 62+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.

  
## Which Intrusion Detection and Prevention Systems (IDPS) Is Best for Your Use Case?

- **Leader:** [Palo Alto Networks Next-Generation Firewalls](https://www.g2.com/products/palo-alto-networks-next-generation-firewalls/reviews)
- **Highest Performer:** [ExtraHop](https://www.g2.com/products/extrahop/reviews)
- **Easiest to Use:** [threatER](https://www.g2.com/products/threater/reviews)
- **Top Trending:** [Palo Alto Networks VM-Series Virtual Firewall](https://www.g2.com/products/palo-alto-networks-vm-series-virtual-firewall/reviews)
- **Best Free Software:** [CrowdSec](https://www.g2.com/products/crowdsec/reviews)

  
---

**Sponsored**

### ManageEngine ADAudit Plus

ADAudit Plus is a UBA-driven auditor that helps keep your AD, Azure AD, file systems (including Windows, NetApp, EMC, Synology, Hitachi, and Huawei), Windows servers, and workstations secure and compliant. ADAudit Plus transforms raw and noisy event log data into real-time reports and alerts, enabling you to get full visibility into activities happening across your Windows Server ecosystem in just a few clicks. More than 10,000 organizations across the world trust ADAudit Plus to: 1. Instantly notify them about changes in their Windows Server environments. 2. Continuously track Windows user logon activity. 3. Monitor the active and idle time spent by employees at their workstations. 4. Detect and troubleshoot AD account lockouts. 5. Provide a consolidated audit trail of privileged user activities across their domains. 6. Track changes and sign-ins in Azure AD. 7. Audit file accesses across Windows, NetApp, EMC, Synology, Hitachi, and Huawei file systems. 8. Monitor file integrity across local files residing on Windows systems. 9. Mitigate insider threats by leveraging UBA and response automation. 10. Generate audit-ready compliance reports for SOX, the GDPR, and other IT mandates.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=1663&amp;secure%5Bdisplayable_resource_id%5D=2179&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=neighbor_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=2380&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=5691&amp;secure%5Bresource_id%5D=1663&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fintrusion-detection-and-prevention-systems-idps&amp;secure%5Btoken%5D=970855754646a6523842b91463d5f4524effbbf9c748e2d6de6dac164dd9cc76&amp;secure%5Burl%5D=https%3A%2F%2Fwww.manageengine.com%2Fproducts%2Factive-directory-audit%2F%3Futm_source%3DG2%26utm_medium%3Dtpac%26utm_campaign%3DADAP-UEBA&amp;secure%5Burl_type%5D=custom_url)

---

  ## What Are the Top-Rated Intrusion Detection and Prevention Systems (IDPS) Products in 2026?
### 1. [Palo Alto Networks Next-Generation Firewalls](https://www.g2.com/products/palo-alto-networks-next-generation-firewalls/reviews)
  Our next-generation firewall classifies all traffic, including encrypted traffic, based on application, application function, user and content. You can create comprehensive, precise security policies, resulting in safe enablement of applications. This lets only authorized users run sanctioned applications, greatly reducing the surgace area of cyber attacks across the organization.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 163
**How Do G2 Users Rate Palo Alto Networks Next-Generation Firewalls?**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.0/10)
- **Security hardening:** 9.0/10 (Category avg: 8.9/10)
- **Compliance:** 8.8/10 (Category avg: 8.9/10)
- **Security Monitoring:** 8.9/10 (Category avg: 9.0/10)

**Who Is the Company Behind Palo Alto Networks Next-Generation Firewalls?**

- **Seller:** [Palo Alto Networks](https://www.g2.com/sellers/palo-alto-networks)
- **Year Founded:** 2005
- **HQ Location:** Santa Clara, CA
- **Twitter:** @PaloAltoNtwks (128,825 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/30086/ (21,355 employees on LinkedIn®)
- **Ownership:** NYSE: PANW

**Who Uses This Product?**
  - **Who Uses This:** Network Engineer, Network Security Engineer
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 46% Mid-Market, 38% Enterprise


#### What Are Palo Alto Networks Next-Generation Firewalls's Pros and Cons?

**Pros:**

- Ease of Use (25 reviews)
- Features (23 reviews)
- Protection (17 reviews)
- Threat Protection (17 reviews)
- Firewall Efficiency (14 reviews)

**Cons:**

- Expensive (32 reviews)
- Difficult Learning Curve (15 reviews)
- Slow Performance (15 reviews)
- Poor Interface Design (10 reviews)
- Complex Configuration (9 reviews)

### 2. [Palo Alto Networks VM-Series Virtual Firewall](https://www.g2.com/products/palo-alto-networks-vm-series-virtual-firewall/reviews)
  Palo Alto Networks&#39; VM-Series Virtual Firewall is the industry’s leading cloud security software, delivering the world’s most effective network security to any cloud or virtualized environment. It is a virtualized form factor of Palo Alto Networks&#39; next-generation firewalls, built to protect your applications from zero-day threats, providing consistent security and easy deployment across all clouds and virtualized environments, including technologies from Amazon Web Services, Microsoft Azure, Google Cloud, VMware, Cisco, KVM, Nutanix, OpenStack, and more.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 92
**How Do G2 Users Rate Palo Alto Networks VM-Series Virtual Firewall?**

- **Has the product been a good partner in doing business?:** 8.6/10 (Category avg: 9.0/10)
- **Security hardening:** 9.1/10 (Category avg: 8.9/10)
- **Compliance:** 9.0/10 (Category avg: 8.9/10)
- **Security Monitoring:** 9.1/10 (Category avg: 9.0/10)

**Who Is the Company Behind Palo Alto Networks VM-Series Virtual Firewall?**

- **Seller:** [Palo Alto Networks](https://www.g2.com/sellers/palo-alto-networks)
- **Year Founded:** 2005
- **HQ Location:** Santa Clara, CA
- **Twitter:** @PaloAltoNtwks (128,825 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/30086/ (21,355 employees on LinkedIn®)
- **Ownership:** NYSE: PANW

**Who Uses This Product?**
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 43% Enterprise, 30% Mid-Market


#### What Are Palo Alto Networks VM-Series Virtual Firewall's Pros and Cons?

**Pros:**

- Features (18 reviews)
- Threat Protection (18 reviews)
- Protection (13 reviews)
- Security (13 reviews)
- Deployment Ease (11 reviews)

**Cons:**

- Expensive (26 reviews)
- Difficult Learning Curve (11 reviews)
- Complex Configuration (10 reviews)
- Slow Performance (9 reviews)
- Complexity (8 reviews)

### 3. [Cloud-Delivered Security Services](https://www.g2.com/products/cloud-delivered-security-services/reviews)
  Overview Our Cloud-Delivered Security Services are natively integrated, offering consistent best-in-class protection everywhere. Backed by our world-renowned Unit 42® Threat Research team, this one-of-a-kind protection uses the network effect of 70,000+ global customers to share intelligence across all threat vectors to stop known, unknown and zero-day threats 180X faster than any other platform or point solution and prevent patient zero. What are Cloud-Delivered Security Services? A comprehensive suite of natively-integrated security services delivered from the cloud that provide protection for a customer’s entire network, securing all users, applications, devices, and data, regardless of the location. Our security services are powered by Precision AI™ and analyze real network traffic inline and stop threats in real time, including phishing, malware, command and control, ransomware, DNS-layered threats, and much more. These services include: Advanced Threat Prevention, the industry’s leading intrusion prevention system that addresses known and unknown command-and-control attacks from red team tools, as well as injection attacks and vulnerability exploits. Advanced WildFire, the industry’s largest malware analysis engine that stops the first instance of known, unknown and highly-evasive malware. Advanced URL Filtering, the industry’s first web security engine to stop unknown phishing attacks in real time. Advanced DNS Security, the industry’s most comprehensive DNS security solution that offers over 2x more threat coverage than the next leading security vendor and is also the industry’s first solution to stop network-based DNS hijacking attacks in real time. IoT/OT Security, the industry’s most comprehensive zero trust solution for IoT devices, helping you see and secure all connected devices in your network. NG-CASB, our SaaS application and data security solution that allows you to discover and control all of the SaaS consumption in your network. AI Access Security, our solution that ensures safe use of GenAI apps with access control, data protection and real-time visibility of over 600 applications, so that your employees can securely use AI to increase their productivity. With the power of AI and a robust global cloud infrastructure, Palo Alto Networks Cloud-Delivered Security Services can scale to stay ahead of today&#39;s threats and keep up with your organization&#39;s network security needs.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 101
**How Do G2 Users Rate Cloud-Delivered Security Services?**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.0/10)
- **Security hardening:** 8.3/10 (Category avg: 8.9/10)
- **Compliance:** 8.7/10 (Category avg: 8.9/10)
- **Security Monitoring:** 8.7/10 (Category avg: 9.0/10)

**Who Is the Company Behind Cloud-Delivered Security Services?**

- **Seller:** [Palo Alto Networks](https://www.g2.com/sellers/palo-alto-networks)
- **Year Founded:** 2005
- **HQ Location:** Santa Clara, CA
- **Twitter:** @PaloAltoNtwks (128,825 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/30086/ (21,355 employees on LinkedIn®)
- **Ownership:** NYSE: PANW

**Who Uses This Product?**
  - **Who Uses This:** Network Engineer
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 41% Mid-Market, 34% Enterprise


### 4. [Check Point Quantum Intrusion Prevention System (IPS)](https://www.g2.com/products/check-point-quantum-intrusion-prevention-system-ips/reviews)
  Check Point&#39;s Quantum Intrusion Prevention System (IPS) is a comprehensive security solution designed to detect and prevent attempts to exploit vulnerabilities in systems and applications. Integrated within Check Point&#39;s Next Generation Firewall, it offers automatic updates to safeguard organizations against both longstanding and emerging threats. By combining signature-based detection, protocol validation, anomaly detection, and behavioral analysis, Quantum IPS delivers robust protection against a wide array of cyber threats. Key Features and Functionality: - Comprehensive Threat Detection: Identifies and mitigates specific known exploits, vulnerabilities (both known and unknown), protocol misuse, tunneling attempts indicating data leakage, and outbound malware communications. - Real-Time Protection Updates: Continuously updated with new defenses against emerging threats, including preemptive protections that address vulnerabilities before they are exploited. - Virtual Patching: Provides a proactive approach to security by offering robust IPS functionality that complements traditional patching strategies, ensuring networks remain secure between updates. - Efficient Deployment: Features predefined recommended profiles for immediate use, customizable signature activation rules tailored to network assets, and an optional detect-only mode for evaluation purposes. - 360° Visibility and Reporting: Seamlessly integrates with SmartEvent, enabling Security Operations Center (SOC) staff to prioritize and respond to critical events efficiently. Primary Value and User Benefits: Quantum IPS addresses the critical need for proactive and comprehensive network security by offering real-time threat prevention and automatic updates. Its integration with Check Point&#39;s security gateways ensures a unified security approach, reducing the total cost of ownership. The system&#39;s low false positive rate and efficient deployment options save valuable time for IT staff, while its robust protection mechanisms safeguard organizations against a wide spectrum of cyber threats, ensuring business continuity and data integrity.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 59
**How Do G2 Users Rate Check Point Quantum Intrusion Prevention System (IPS)?**

- **Has the product been a good partner in doing business?:** 8.4/10 (Category avg: 9.0/10)
- **Security hardening:** 8.6/10 (Category avg: 8.9/10)
- **Compliance:** 9.0/10 (Category avg: 8.9/10)
- **Security Monitoring:** 8.9/10 (Category avg: 9.0/10)

**Who Is the Company Behind Check Point Quantum Intrusion Prevention System (IPS)?**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,991 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)
- **Ownership:** NASDAQ:CHKP

**Who Uses This Product?**
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 46% Mid-Market, 41% Enterprise


### 5. [Hybrid Cloud Security](https://www.g2.com/products/trend-micro-hybrid-cloud-security/reviews)
  In today&#39;s complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend&#39;s Cloud Security provides essential visibility, allowing you and your teams to secure every aspect of your transformation and eliminate disruptive security silos. Automate security policies, deployments, monitoring, and compliance audits seamlessly from a single console, ensuring the automatic protection of all workloads from both known and unknown threats. With Cloud-Native Application Protection and robust platform capabilities, Trend empowers you to proactively address vulnerabilities and defend against threats. Gain centralized visibility, continuous asset discovery, and contextualized risk assessments, equipping your team with everything necessary to stay ahead of potential cloud security risks.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 181
**How Do G2 Users Rate Hybrid Cloud Security?**

- **Has the product been a good partner in doing business?:** 9.1/10 (Category avg: 9.0/10)
- **Security hardening:** 8.8/10 (Category avg: 8.9/10)
- **Compliance:** 8.6/10 (Category avg: 8.9/10)
- **Security Monitoring:** 8.9/10 (Category avg: 9.0/10)

**Who Is the Company Behind Hybrid Cloud Security?**

- **Seller:** [Trend Micro](https://www.g2.com/sellers/trend-micro)
- **Year Founded:** 1988
- **HQ Location:** Tokyo
- **LinkedIn® Page:** https://www.linkedin.com/company/4312/ (8,090 employees on LinkedIn®)
- **Ownership:** OTCMKTS:TMICY
- **Total Revenue (USD mm):** $1,515

**Who Uses This Product?**
  - **Who Uses This:** Cyber Security Associate, Cyber Security Engineer
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 43% Mid-Market, 34% Enterprise


#### What Are Hybrid Cloud Security's Pros and Cons?

**Pros:**

- Security (9 reviews)
- Security Protection (7 reviews)
- Compliance (6 reviews)
- Cloud Security (4 reviews)
- Comprehensive Security (4 reviews)

**Cons:**

- Complexity (6 reviews)
- Complex Setup (4 reviews)
- Feature Complexity (4 reviews)
- Learning Curve (4 reviews)
- Difficult Learning (3 reviews)

### 6. [Check Point Infinity Platform](https://www.g2.com/products/check-point-infinity-platform/reviews)
  Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 51
**How Do G2 Users Rate Check Point Infinity Platform?**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.0/10)
- **Security hardening:** 9.1/10 (Category avg: 8.9/10)
- **Compliance:** 8.7/10 (Category avg: 8.9/10)
- **Security Monitoring:** 8.7/10 (Category avg: 9.0/10)

**Who Is the Company Behind Check Point Infinity Platform?**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,991 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)
- **Ownership:** NASDAQ:CHKP

**Who Uses This Product?**
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 43% Mid-Market, 31% Enterprise


#### What Are Check Point Infinity Platform's Pros and Cons?

**Pros:**

- Centralized Management (12 reviews)
- Security (11 reviews)
- Easy Management (10 reviews)
- Features (9 reviews)
- Ease of Use (8 reviews)

**Cons:**

- Learning Curve (10 reviews)
- Complexity (6 reviews)
- Delays (4 reviews)
- Difficult Configuration (4 reviews)
- Expensive (4 reviews)

### 7. [FortiGate IPS](https://www.g2.com/products/fortigate-ips/reviews)
  Whether part of a firewall solution or a separate standalone appliance, Intrusion Prevention Systems (IPS) technology is becoming an increasingly ubiquitous part of network security defenses.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 12
**How Do G2 Users Rate FortiGate IPS?**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.0/10)
- **Security hardening:** 9.7/10 (Category avg: 8.9/10)
- **Compliance:** 9.3/10 (Category avg: 8.9/10)
- **Security Monitoring:** 9.3/10 (Category avg: 9.0/10)

**Who Is the Company Behind FortiGate IPS?**

- **Seller:** [Fortinet](https://www.g2.com/sellers/fortinet)
- **Year Founded:** 2000
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @Fortinet (151,491 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6460/ (16,112 employees on LinkedIn®)
- **Ownership:** NASDAQ: FTNT

**Who Uses This Product?**
  - **Company Size:** 50% Mid-Market, 36% Enterprise


### 8. [ExtraHop](https://www.g2.com/products/extrahop/reviews)
  ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance management uniquely delivers the instant visibility and unparalleled decryption capabilities organizations need to expose the cyber risks and performance issues that other tools can’t see. When organizations have full network transparency with ExtraHop, they can investigate smarter, stop threats faster, and keep operations running. RevealX deploys on premises or in the cloud. It addresses the following use cases: - Ransomware - Zero trust - Software supply chain attacks - Lateral movement and C2 communication - Security hygiene - Network and Application Performance Management - IDS - Forensics and more A few of our differentiators: Continuous and on-demand PCAP: Full packet processing is superior to NetFlow and yields higher quality detections. Strategic decryption across a variety of protocols, including SSL/TLS, MS-RPC, WinRM, and SMBv3, gives you better visibility into early-stage threats hiding in encrypted traffic as they attempt to move laterally across your network. Protocol coverage: RevealX decodes more than 70 network protocols. Cloud-scale machine learning: Rather than relying on limited &quot;on-box&quot; compute power for analysis and detections, RevealX uses sophisticated cloud-hosted and cloud-scale machine learning workloads to identify suspicious behavior in real time and create high-fidelity alerts. ExtraHop was named a Leader in The Forrester Wave™: Network Analysis and Visibility, Q2 2023. Key Technology Integration and Go-to-Market Partners: CrowdStrike: RevealX integrates with CrowdStrike Falcon® LogScale, Falcon Insight XDR, Falcon Threat Graph, and Falcon Intelligence. Splunk SOAR AWS Google Cloud Security Founded in 2007, ExtraHop is privately held and headquartered in Seattle, Wash. To learn more, visit www.extrahop.com.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 68
**How Do G2 Users Rate ExtraHop?**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.0/10)
- **Security hardening:** 8.8/10 (Category avg: 8.9/10)
- **Compliance:** 7.6/10 (Category avg: 8.9/10)
- **Security Monitoring:** 9.0/10 (Category avg: 9.0/10)

**Who Is the Company Behind ExtraHop?**

- **Seller:** [ExtraHop Networks](https://www.g2.com/sellers/extrahop-networks)
- **Year Founded:** 2007
- **HQ Location:** Seattle, Washington
- **Twitter:** @ExtraHop (10,736 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/extrahop-networks/ (800 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Hospital &amp; Health Care, Transportation/Trucking/Railroad
  - **Company Size:** 69% Enterprise, 26% Mid-Market


#### What Are ExtraHop's Pros and Cons?

**Pros:**

- All-in-One Solution (1 reviews)
- Comprehensive Monitoring (1 reviews)
- Easy Deployment (1 reviews)
- Responsive Support (1 reviews)


### 9. [threatER](https://www.g2.com/products/threater/reviews)
  threatER is the leading preemptive cybersecurity platform for building and maintaining trust at scale. Our SaaS solution continuously learns from all available data, allowing you to gain better insights and extract more value from your security stack. threatER transforms your security stack into a smart, adaptive and automated prevention engine. With threatER you reduce risk, get more value from your security investments and reinforce trust across every connection without slowing down your business. Learn more at www.threater.com.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 33
**How Do G2 Users Rate threatER?**

- **Has the product been a good partner in doing business?:** 9.5/10 (Category avg: 9.0/10)
- **Security hardening:** 9.4/10 (Category avg: 8.9/10)
- **Compliance:** 9.2/10 (Category avg: 8.9/10)
- **Security Monitoring:** 9.0/10 (Category avg: 9.0/10)

**Who Is the Company Behind threatER?**

- **Seller:** [threatER](https://www.g2.com/sellers/threater)
- **Company Website:** https://www.threater.com/
- **HQ Location:** Tysons, Virginia
- **LinkedIn® Page:** https://www.linkedin.com/company/threater/ (28 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 56% Mid-Market, 32% Enterprise


#### What Are threatER's Pros and Cons?

**Pros:**

- Ease of Use (7 reviews)
- Performance Efficiency (3 reviews)
- Security (3 reviews)
- Setup Ease (3 reviews)
- Threat Protection (3 reviews)

**Cons:**

- Performance Issues (3 reviews)
- Compatibility Issues (2 reviews)
- False Positives (2 reviews)
- Access Control (1 reviews)
- Access Issues (1 reviews)

### 10. [Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv)](https://www.g2.com/products/cisco-secure-firewall-threat-defense-virtual-formerly-ngfwv/reviews)
  Cisco Secure Firewall Threat Defense Virtual (formerly FTDv/NGFWv) is a comprehensive security solution designed to protect virtualized environments across private and public clouds. It integrates Cisco&#39;s proven network firewall capabilities with advanced threat defense features, including Snort Intrusion Prevention System (IPS), URL filtering, and malware defense. This virtualized firewall ensures consistent security policies and deep visibility into network traffic, enabling organizations to detect and mitigate threats before they impact operations. Key Features and Functionality: - Advanced Threat Defense: Combines network firewall with Snort IPS, URL filtering, and malware defense to protect against known and emerging threats. - Consistent Security Policies: Maintains uniform security policies across physical, private, and public cloud environments, ensuring seamless protection as workloads move. - Deep Network Visibility: Provides comprehensive insights into network traffic, allowing for quick detection of threat origins and activities. - Automated Risk Ranking: Prioritizes threats with automated risk rankings and impact flags, enabling efficient resource allocation to critical events. - License Portability: Offers flexibility to move from on-premises private clouds to public clouds while maintaining consistent policies and unified management. - Centralized Management: Utilizes Cisco Smart Software Licensing for easy deployment, management, and tracking of virtual firewall instances. Primary Value and User Solutions: Cisco Secure Firewall Threat Defense Virtual addresses the need for robust security in dynamic, virtualized environments. By providing consistent security policies and deep visibility across various cloud platforms, it simplifies threat protection and management. Organizations benefit from automated threat prioritization, flexible deployment options, and centralized control, ensuring efficient and effective defense against a wide range of cyber threats. This solution is particularly valuable for businesses undergoing data center consolidation, office relocations, mergers, acquisitions, or experiencing fluctuating application demands, as it offers the agility and scalability required to adapt to changing security needs.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 89
**How Do G2 Users Rate Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv)?**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.0/10)
- **Security hardening:** 8.9/10 (Category avg: 8.9/10)
- **Compliance:** 8.8/10 (Category avg: 8.9/10)
- **Security Monitoring:** 9.2/10 (Category avg: 9.0/10)

**Who Is the Company Behind Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv)?**

- **Seller:** [Cisco](https://www.g2.com/sellers/cisco)
- **Year Founded:** 1984
- **HQ Location:** San Jose, CA
- **Twitter:** @Cisco (721,419 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cisco/ (95,742 employees on LinkedIn®)
- **Ownership:** NASDAQ:CSCO

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Telecommunications
  - **Company Size:** 45% Mid-Market, 42% Enterprise


#### What Are Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv)'s Pros and Cons?

**Pros:**

- Ease of Use (1 reviews)
- Easy Management (1 reviews)
- Firewall Efficiency (1 reviews)
- Network Security (1 reviews)

**Cons:**

- Complex Coding (1 reviews)
- Complex Configuration (1 reviews)
- Complexity (1 reviews)
- Dependency Issues (1 reviews)
- Difficult Management (1 reviews)

### 11. [Trend Micro TippingPoint](https://www.g2.com/products/trend-micro-tippingpoint/reviews)
  Trend Micro TippingPoint integrates with the Deep Discovery Advanced Threat Protection Solution to detect and block targeted attacks and malware through preemptive threat prevention, threat insight and prioritization, and real-time enforcement and remediation.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 25
**How Do G2 Users Rate Trend Micro TippingPoint?**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.0/10)
- **Security hardening:** 9.7/10 (Category avg: 8.9/10)
- **Compliance:** 8.8/10 (Category avg: 8.9/10)
- **Security Monitoring:** 9.3/10 (Category avg: 9.0/10)

**Who Is the Company Behind Trend Micro TippingPoint?**

- **Seller:** [Trend Micro](https://www.g2.com/sellers/trend-micro)
- **Year Founded:** 1988
- **HQ Location:** Tokyo
- **LinkedIn® Page:** https://www.linkedin.com/company/4312/ (8,090 employees on LinkedIn®)
- **Ownership:** OTCMKTS:TMICY
- **Total Revenue (USD mm):** $1,515

**Who Uses This Product?**
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 38% Small-Business, 31% Enterprise


### 12. [Forcepoint Next-Generation Firewall (NGFW)](https://www.g2.com/products/forcepoint-next-generation-firewall-ngfw/reviews)
  Connecting and protecting distributed enterprises and government agencies is more important than ever before. Defending your people and critical assets starts at the new edge. Forcepoint Next-Gen Firewall combines true enterprise-class SD-WAN, advanced intrusion prevention, and seamless integration with cloud-based SASE security to keep your people and data safe—all at global scale. Forcepoint Next-Gen Firewall provides: - Proactively detect and discover advanced threats - Keep people and data safe with a human-centric approach to SASE security - Protect distributed enterprises and government agencies using secure branch networking and SD-WAN


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 32
**How Do G2 Users Rate Forcepoint Next-Generation Firewall (NGFW)?**

- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 9.0/10)
- **Security hardening:** 8.1/10 (Category avg: 8.9/10)
- **Compliance:** 7.8/10 (Category avg: 8.9/10)
- **Security Monitoring:** 8.7/10 (Category avg: 9.0/10)

**Who Is the Company Behind Forcepoint Next-Generation Firewall (NGFW)?**

- **Seller:** [Forcepoint](https://www.g2.com/sellers/forcepoint)
- **Year Founded:** 1994
- **HQ Location:** Austin, TX
- **Twitter:** @Forcepointsec (65,452 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/forcepoint/ (1,658 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 40% Mid-Market, 31% Small-Business


#### What Are Forcepoint Next-Generation Firewall (NGFW)'s Pros and Cons?

**Pros:**

- Control (1 reviews)
- Performance Speed (1 reviews)
- Threat Protection (1 reviews)

**Cons:**

- Complex Configuration (1 reviews)
- Expertise Required (1 reviews)
- Limited Customization (1 reviews)

### 13. [Trend Micro Deep Discovery](https://www.g2.com/products/trend-micro-trend-micro-deep-discovery/reviews)
  Deep Discovery Inspector is available as a physical or virtual network appliance. It&#39;s designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates sensitive data. Specialized detection engines and custom sandbox analysis detect and prevent breaches.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 16
**How Do G2 Users Rate Trend Micro Deep Discovery?**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.0/10)
- **Security hardening:** 8.5/10 (Category avg: 8.9/10)
- **Compliance:** 9.0/10 (Category avg: 8.9/10)
- **Security Monitoring:** 8.5/10 (Category avg: 9.0/10)

**Who Is the Company Behind Trend Micro Deep Discovery?**

- **Seller:** [Trend Micro](https://www.g2.com/sellers/trend-micro)
- **Year Founded:** 1988
- **HQ Location:** Tokyo
- **LinkedIn® Page:** https://www.linkedin.com/company/4312/ (8,090 employees on LinkedIn®)
- **Ownership:** OTCMKTS:TMICY
- **Total Revenue (USD mm):** $1,515

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 41% Mid-Market, 35% Enterprise


### 14. [Armor Agent](https://www.g2.com/products/armor-agent/reviews)
  Armor Agent protects Windows and Linux servers wherever they run, in public cloud, private cloud, or on-premises environments, with a single, lightweight agent that installs with one line of code. The agent combines malware protection, intrusion prevention (IDS/IPS), file integrity monitoring, vulnerability scanning, patch monitoring, and behavioral threat detection into one deployment. Rather than stitching together multiple point tools, Armor Agent consolidates core workload security into a unified agent managed through the Armor platform. Armor Agent is available in two tiers. The Free Tier covers up to 5 endpoints at no cost, with full malware and intrusion defense, vulnerability scanning, patch monitoring, and file integrity monitoring included. The Premium Tier adds security alerts, log search, threat intelligence, threat hunting, dedicated support, and 24×7 SOC monitoring at $99/month per endpoint with no endpoint limit. Both tiers support compliance requirements for HIPAA, PCI DSS, HITRUST, and ISO frameworks. Get started with the Free Tier at https://www.armor.com/free/armor-agent


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 12
**How Do G2 Users Rate Armor Agent?**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.0/10)
- **Security hardening:** 10.0/10 (Category avg: 8.9/10)
- **Compliance:** 10.0/10 (Category avg: 8.9/10)
- **Security Monitoring:** 10.0/10 (Category avg: 9.0/10)

**Who Is the Company Behind Armor Agent?**

- **Seller:** [Armor](https://www.g2.com/sellers/armor)
- **Year Founded:** 2009
- **HQ Location:** Plano, Texas
- **Twitter:** @Armor (9,751 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/333863/ (204 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 83% Small-Business, 17% Mid-Market


### 15. [Darktrace / NETWORK](https://www.g2.com/products/darktrace-network/reviews)
  Darktrace / NETWORK™ is the industry’s most advanced Network Detection and Response (NDR) solution. It learns what normal behavior is for your entire modern network, using Self-Learning AI to detect and autonomously contain any activity that could cause business disruption including known, novel and insider threats. - Sophisticated agentic AI to automate triage and investigation at speed and scale - Recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for NDR - Over 10,000 customers globally


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 43
**How Do G2 Users Rate Darktrace / NETWORK?**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.0/10)
- **Security hardening:** 10.0/10 (Category avg: 8.9/10)
- **Compliance:** 10.0/10 (Category avg: 8.9/10)
- **Security Monitoring:** 10.0/10 (Category avg: 9.0/10)

**Who Is the Company Behind Darktrace / NETWORK?**

- **Seller:** [Darktrace](https://www.g2.com/sellers/darktrace)
- **Company Website:** https://www.darktrace.com
- **Year Founded:** 2013
- **HQ Location:** Cambridgeshire, England
- **Twitter:** @Darktrace (18,181 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/5013440/ (2,548 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 59% Mid-Market, 33% Enterprise


#### What Are Darktrace / NETWORK's Pros and Cons?

**Pros:**

- Monitoring (5 reviews)
- Artificial Intelligence (4 reviews)
- Threat Detection (4 reviews)
- Customer Support (3 reviews)
- Cybersecurity (3 reviews)

**Cons:**

- Learning Curve (6 reviews)
- Expensive (4 reviews)
- Alert Issues (2 reviews)
- Complex Setup (2 reviews)
- False Positives (2 reviews)

### 16. [Blumira Automated Detection &amp; Response](https://www.g2.com/products/blumira-automated-detection-response/reviews)
  Blumira is an integrated security operations platform built for growing teams and the partners supporting them to gain complete visibility into their environment, identify and address risk faster, and deliver advanced security and compliance. The platform includes: - Managed Detections for automated threat hunting to identify attacks early - AI Investigation with 98.5% accurate, human-in-the-loop triage validated against real cases - Rapid Response with automation and 1-click actions to contain and block threats immediately - One Year of Data Retention with unlimited log ingestion to satisfy compliance requirements - Advanced Reporting and dashboards for forensics and easy investigation - Endpoint &amp; Identity Protection (EDR/ITDR) for real-time remediation across devices and users - 24/7 Security Operations support for critical priority issues


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 122
**How Do G2 Users Rate Blumira Automated Detection &amp; Response?**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.0/10)
- **Security hardening:** 9.0/10 (Category avg: 8.9/10)
- **Compliance:** 8.9/10 (Category avg: 8.9/10)
- **Security Monitoring:** 9.4/10 (Category avg: 9.0/10)

**Who Is the Company Behind Blumira Automated Detection &amp; Response?**

- **Seller:** [Blumira](https://www.g2.com/sellers/blumira)
- **Company Website:** https://www.blumira.com
- **Year Founded:** 2018
- **HQ Location:** Ann Arbor, Michigan
- **Twitter:** @blumira (1 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/blumira/ (67 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** IT Manager
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 51% Mid-Market, 36% Small-Business


#### What Are Blumira Automated Detection &amp; Response's Pros and Cons?

**Pros:**

- Ease of Use (33 reviews)
- Customer Support (20 reviews)
- Setup Ease (20 reviews)
- Alerting (16 reviews)
- Alert Management (16 reviews)

**Cons:**

- Limited Customization (11 reviews)
- Alert System (7 reviews)
- Expensive (6 reviews)
- Faulty Detection (6 reviews)
- Inefficient Alert System (6 reviews)

### 17. [Cisco Secure IPS (NGIPS)](https://www.g2.com/products/cisco-secure-ips-ngips/reviews)
  High performance. Resiliency. Security operations empowerment. NGIPS receives new policy rules and signatures every two hours, so your security is always up to date.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 13
**How Do G2 Users Rate Cisco Secure IPS (NGIPS)?**

- **Has the product been a good partner in doing business?:** 8.0/10 (Category avg: 9.0/10)
- **Security hardening:** 7.9/10 (Category avg: 8.9/10)
- **Compliance:** 7.6/10 (Category avg: 8.9/10)
- **Security Monitoring:** 7.4/10 (Category avg: 9.0/10)

**Who Is the Company Behind Cisco Secure IPS (NGIPS)?**

- **Seller:** [Cisco](https://www.g2.com/sellers/cisco)
- **Year Founded:** 1984
- **HQ Location:** San Jose, CA
- **Twitter:** @Cisco (721,419 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cisco/ (95,742 employees on LinkedIn®)
- **Ownership:** NASDAQ:CSCO

**Who Uses This Product?**
  - **Company Size:** 65% Enterprise, 24% Mid-Market


### 18. [Trellix Network Detection and Response (NDR)](https://www.g2.com/products/trellix-network-detection-and-response-ndr/reviews)
  Trellix NDR delivers extended visibility, multi-layered threat detection and accelerated investigation and response into network traffic across each stage of the MITRE ATT&amp;CK framework – spanning data centers, hybrid cloud environments, branch offices, and corporate campuses.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 64
**How Do G2 Users Rate Trellix Network Detection and Response (NDR)?**

- **Has the product been a good partner in doing business?:** 8.2/10 (Category avg: 9.0/10)
- **Security hardening:** 8.4/10 (Category avg: 8.9/10)
- **Compliance:** 8.2/10 (Category avg: 8.9/10)
- **Security Monitoring:** 8.8/10 (Category avg: 9.0/10)

**Who Is the Company Behind Trellix Network Detection and Response (NDR)?**

- **Seller:** [Trellix](https://www.g2.com/sellers/trellix)
- **Year Founded:** 2004
- **HQ Location:** Milpitas, CA
- **Twitter:** @Trellix (241,603 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/44195/ (803 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 36% Mid-Market, 33% Small-Business


### 19. [LevelBlue USM Anywhere](https://www.g2.com/products/levelblue-usm-anywhere/reviews)
  LevelBlue USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and on-premises environments. USM Anywhere includes purpose-built cloud sensors that natively monitor your Amazon Web Services (AWS) and Microsoft Azure cloud environments. On premises, lightweight virtual sensors run on Microsoft Hyper-V and VMware ESXi to monitor your virtual private cloud and physical IT infrastructure. With USM Anywhere, you can rapidly deploy sensors into your cloud and on-premises environments while centrally managing data collection, security analysis, and threat detection from the AlienVault Secure Cloud. Five Essential Security Capabilities in a Single SaaS Platform AlienVault USM Anywhere provides five essential security capabilities in a single SaaS solution, giving you everything you need for threat detection, incident response, and compliance management—all in a single pane of glass. With USM Anywhere, you can focus on finding and responding to threats, not managing software. An elastic, cloud-based security solution, USM Anywhere can readily scale to meet your threat detection needs as your hybrid cloud environment changes and grows. 1. Asset Discovery 2. Vulnerability Assessment 3. Intrusion Detection 4. Behavioral Monitoring 5. SIEM


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 102
**How Do G2 Users Rate LevelBlue USM Anywhere?**

- **Has the product been a good partner in doing business?:** 8.6/10 (Category avg: 9.0/10)
- **Security hardening:** 8.8/10 (Category avg: 8.9/10)
- **Compliance:** 9.0/10 (Category avg: 8.9/10)
- **Security Monitoring:** 9.0/10 (Category avg: 9.0/10)

**Who Is the Company Behind LevelBlue USM Anywhere?**

- **Seller:** [LevelBlue](https://www.g2.com/sellers/levelblue-49a2e3c1-ca90-4308-b899-08973f657bae)
- **HQ Location:** Dallas, Texas, United States
- **LinkedIn® Page:** https://www.linkedin.com/company/levelbluecyber/ (638 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 62% Mid-Market, 20% Small-Business


### 20. [Snort](https://www.g2.com/products/snort/reviews)
  SNORT(r), The standard in IDS and IPS.


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 18
**How Do G2 Users Rate Snort?**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 9.0/10)
- **Security hardening:** 10.0/10 (Category avg: 8.9/10)
- **Compliance:** 10.0/10 (Category avg: 8.9/10)
- **Security Monitoring:** 10.0/10 (Category avg: 9.0/10)

**Who Is the Company Behind Snort?**

- **Seller:** [Snort](https://www.g2.com/sellers/snort)
- **HQ Location:** San Jose
- **Twitter:** @snort (23,381 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/snort/about/ (1 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Computer Software
  - **Company Size:** 78% Mid-Market, 22% Small-Business


### 21. [CrowdSec](https://www.g2.com/products/crowdsec/reviews)
  CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security infrastructure offer a low technical entry barrier and a high-security gain. Once an unwanted behavior is detected, it is automatically blocked. The aggressive IP, scenario triggered and the timestamp is sent for curation, to avoid poisoning &amp; false positives. If verified, this IP is then redistributed to all CrowdSec users running the same scenario. By sharing the threat they faced, all users are protecting each other.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 84
**How Do G2 Users Rate CrowdSec?**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.0/10)
- **Security hardening:** 9.3/10 (Category avg: 8.9/10)
- **Compliance:** 8.1/10 (Category avg: 8.9/10)
- **Security Monitoring:** 8.9/10 (Category avg: 9.0/10)

**Who Is the Company Behind CrowdSec?**

- **Seller:** [CrowdSec](https://www.g2.com/sellers/crowdsec)
- **Year Founded:** 2020
- **HQ Location:** Paris, FR
- **Twitter:** @Crowd_Security (19,512 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/crowdsec/?originalSubdomain=fr (37 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 69% Small-Business, 21% Mid-Market


### 22. [Ossec](https://www.g2.com/products/ossec/reviews)
  Ossec is an open source host-based intrusion detection system that performs log analysis, file integrity checking, policy monitoring, rootkit detection and process monitoring.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 10
**How Do G2 Users Rate Ossec?**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.0/10)
- **Security hardening:** 9.2/10 (Category avg: 8.9/10)
- **Compliance:** 9.0/10 (Category avg: 8.9/10)
- **Security Monitoring:** 10.0/10 (Category avg: 9.0/10)

**Who Is the Company Behind Ossec?**

- **Seller:** [Ossec](https://www.g2.com/sellers/ossec)
- **Year Founded:** 2012
- **HQ Location:** Mannouba, Tunis
- **Twitter:** @ossecproject (1,637 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/5108000/ (27 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 50% Small-Business, 30% Mid-Market


### 23. [B1 Platform by CloudCover](https://www.g2.com/products/b1-platform-by-cloudcover/reviews)
  A network security platform, years in the making, leveraging mathematics to continuously learn, predict, and defend against attacks.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 43
**How Do G2 Users Rate B1 Platform by CloudCover?**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 9.0/10)
- **Security hardening:** 8.8/10 (Category avg: 8.9/10)
- **Compliance:** 8.5/10 (Category avg: 8.9/10)
- **Security Monitoring:** 9.6/10 (Category avg: 9.0/10)

**Who Is the Company Behind B1 Platform by CloudCover?**

- **Seller:** [CloudCover, Inc.](https://www.g2.com/sellers/cloudcover-inc)
- **Year Founded:** 2007
- **HQ Location:** Minneapolis, US
- **LinkedIn® Page:** https://www.linkedin.com/company/1642753 (14 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 39% Mid-Market, 39% Small-Business


### 24. [Corelight](https://www.g2.com/products/corelight/reviews)
  Corelight&#39;s Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detection (IDS), and PCAP functionality in a single solution and by providing security analysts with machine learning-assisted investigations and one-click-pivots from prioritized alerts to the evidence needed to investigate and remediate them. Network Detection and Response platforms monitor and analyze network traffic, delivering telemetry into existing SIEM, XDR, or SaaS-based solutions. Corelight’s platform is unique because our detections and visibility engineering are community driven—with continuous content creation from Zeek®, Suricata IDS, and other Intel communities. And our integration with CrowdStrike XDR enables cross platform (EDR+NDR) analytics. This provides you with the most complete network visibility, powerful analytics, and threat hunting capabilities, and accelerates investigation across your entire kill chain. Corelight also delivers a comprehensive suite of network security analytics that help organizations identify more than 75 adversarial TTPs across the MITRE ATT&amp;CK® spectrum including Exfiltration, Command and Control (C2), and Lateral Movement. These detections reveal known and unknown threats via hundreds of unique insights and alerts across machine learning, behavioral analysis, and signature-based approaches. CORELIGHT PRODUCTS + SERVICES Open NDR Platform Appliance, Cloud, Software, Virtual and SaaS Sensors IDS Fleet Manager Investigator Threat Hunting Platform Smart PCAP Corelight Training CERTIFICATIONS FIPS 140-2


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 20
**How Do G2 Users Rate Corelight?**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.0/10)
- **Security hardening:** 7.5/10 (Category avg: 8.9/10)
- **Compliance:** 8.3/10 (Category avg: 8.9/10)
- **Security Monitoring:** 9.3/10 (Category avg: 9.0/10)

**Who Is the Company Behind Corelight?**

- **Seller:** [Corelight](https://www.g2.com/sellers/corelight)
- **Company Website:** https://www.corelight.com/
- **Year Founded:** 2013
- **HQ Location:** San Francisco, CA
- **Twitter:** @corelight_inc (4,217 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/corelight (464 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 50% Enterprise, 50% Mid-Market


#### What Are Corelight's Pros and Cons?

**Pros:**

- Comprehensive Security (2 reviews)
- Cybersecurity (2 reviews)
- Network Security (2 reviews)
- Security (2 reviews)
- Security Features (2 reviews)

**Cons:**

- Complex Coding (2 reviews)
- Complex Configuration (2 reviews)
- Complexity (2 reviews)
- Complex Setup (2 reviews)
- Learning Curve (2 reviews)

### 25. [SenseOn](https://www.g2.com/products/senseon/reviews)
  Maximise security and minimise complexity. SenseOn offers a comprehensive Extended Detection &amp; Response solution that empowers resource-conscious IT leaders to deliver enterprise-level security—without the enterprise price tag. SenseOn protects your endpoints, network, users, and cloud. We offer AV, EDR, NDR, EPP, and XDR products—all through a single, integrated platform deployed in minutes. Some of our core capabilities include: • Combat alert fatigue with our AI that sifts through the noise so you don’t have to, allowing you to reduce false positive alerts and amplify your talent. We achieved 0 false positives in the latest AV-Comparatives test. • Be supported 24/7 with our Live Chat feature that connects you instantly with SenseOn Security Analysts or our Customer Success team (no bots here!). • Our SenseOn platform accelerates investigations and reduces workload, eliminating the challenges of complex data ingestion, unmanageable data volumes, and poor visibility. • Report the value of your team to the wider business with our easy-to-use dashboards or by integrating with your existing reporting tools, helping you make the most of your cybersecurity investment. Learn more about what we do: https://www.senseon.io/


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 7
**How Do G2 Users Rate SenseOn?**

- **Has the product been a good partner in doing business?:** 9.8/10 (Category avg: 9.0/10)
- **Security hardening:** 6.7/10 (Category avg: 8.9/10)
- **Compliance:** 8.7/10 (Category avg: 8.9/10)
- **Security Monitoring:** 10.0/10 (Category avg: 9.0/10)

**Who Is the Company Behind SenseOn?**

- **Seller:** [SenseOn](https://www.g2.com/sellers/senseon)
- **Year Founded:** 2017
- **HQ Location:** London, England, United Kingdom
- **Twitter:** @SenseonTech (1,215 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/senseon-tech/ (67 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 86% Mid-Market, 14% Enterprise


#### What Are SenseOn's Pros and Cons?

**Pros:**

- Customer Support (5 reviews)
- Response Time (3 reviews)
- Alerts (2 reviews)
- Deployment Ease (2 reviews)
- Ease of Use (2 reviews)

**Cons:**

- Difficult Learning Curve (1 reviews)
- Expensive (1 reviews)
- Information Overload (1 reviews)
- Integration Issues (1 reviews)
- Poor Management (1 reviews)


    ## What Is Intrusion Detection and Prevention Systems (IDPS)?
  [Network Security Software](https://www.g2.com/categories/network-security)
  ## What Software Categories Are Similar to Intrusion Detection and Prevention Systems (IDPS)?
    - [Firewall Software](https://www.g2.com/categories/firewall-software)
    - [Network Traffic Analysis (NTA) Software](https://www.g2.com/categories/network-traffic-analysis-nta)
    - [Network Detection and Response (NDR) Software](https://www.g2.com/categories/network-detection-and-response-ndr)

  
    
