Introducing G2.ai, the future of software buying.Try now
Product Avatar Image

Snort

Show rating breakdown
18 reviews
  • 1 profiles
  • 1 categories
Average star rating
4.0
Serving customers since
Profile Filters

All Products & Services

Profile Name

Star Rating

6
10
2
0
0

Snort Reviews

Review Filters
Profile Name
Star Rating
6
10
2
0
0
Charan S.
CS
Charan S.
❖ Cybersecurity Practitioner ❖ Writer ✱ Volunteer ┇ Seeking impactful collaborations in cybersecurity ━ open to new opportunities. Let's connect▶
11/22/2025
Validated Reviewer
Review source: G2 invite
Incentivized Review

Snort: The network Security Watchdog

Snort can detect malware and suspicious activities. We can customise its rules for tailored protection. Also due to being open source, it got an active community for support, resources, and collaboration.
ML
Maria L.
06/10/2019
Validated Reviewer
Review source: Organic

There is no burden on other software.

All our co-conspirators are using equivalents according to anyone's prerequisites, regardless of their yield ,are perfect ,and the error rate is below 0.015% because this ratio is very small, we can no doubt ignore it and apply to the product.
JG
Juih G.
04/23/2019
Validated Reviewer
Review source: Organic

Can be used as observation app

I adore Snort. It fills my heart with joy significantly additional fascinating. I inflict it to somebody World Health Organization has to have Associate in Nursing IDS on the sting of their system.

About

Contact

HQ Location:
San Jose

Social

@snort

What is Snort?

Snort is a highly respected open-source network intrusion detection and prevention system. Developed by Sourcefire and now part of Cisco, it operates by analyzing network traffic to detect and prevent attacks. Snort utilizes a rule-driven language that combines the benefits of signature, protocol, and anomaly-based inspection methods, allowing it to effectively identify malicious traffic on a network.The platform is famously robust and flexible, capable of real-time traffic analysis and packet logging on IP networks. It supports a wide range of actions for identifying suspicious activity, including alerts, logging, and active responses. Snort's user community actively contributes to a regularly updated database of threat detection rules, ensuring that the platform remains on the forefront of threat detection technology.

Details