• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Intrusion Detection and Prevention Systems

Intrusion Detection and Prevention Systems Reviews and Ratings

What is intrusion detection and prevention systems (IPS) software?

The network intrusion detection and prevention system (IDPS) appliance market is composed of stand-alone physical and virtual appliances that inspect defined network traffic either on-premises or in the cloud. They are often located in the network to inspect traffic that has passed through perimeter security devices, such as firewalls, secure Web gateways and secure email gateways. IDPS devices are deployed in-line and perform full-stream reassembly of network traffic. They provide detection via several methods — for example, signatures, protocol anomaly detection, behavioral monitoring or heuristics, advanced threat defense (ATD) integration, and threat intelligence (TI). When deployed in-line, IDPSs can also use various techniques to detect and block attacks that are identified with high confidence; this is one of the primary benefits of this technology. Next-generation IDPSs have evolved in response to advanced targeted threats that can evade first-generation IDPSs.

How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of ANY.RUN Sandbox
ANY.RUN Sandbox
Logo of Palo Alto Networks Threat Prevention
Palo Alto Networks Threat Prevention
Logo of Hillstone S-Series Intrusion Prevention System
Hillstone S-Series Intrusion Prevention System
For 50M-1B USD Companies
Logo of Trellix Network Security
Trellix Network Security
Logo of ANY.RUN Sandbox
ANY.RUN Sandbox
Logo of Trend Micro TippingPoint Threat Protection System
Trend Micro TippingPoint Threat Protection System
For North America
Logo of Trend Micro TippingPoint Threat Protection System
Trend Micro TippingPoint Threat Protection System
Logo of Trellix Network Security
Trellix Network Security
Logo of Secureworks Managed iSensor Network Intrusion Prevention System
Secureworks Managed iSensor Network Intrusion Prevention System
Integration & Deployment
Logo of Hillstone S-Series Intrusion Prevention System
Hillstone S-Series Intrusion Prevention System
Logo of ANY.RUN Sandbox
ANY.RUN Sandbox
Logo of Palo Alto Networks Threat Prevention
Palo Alto Networks Threat Prevention

Product Listings

Filter by

Products 1 - 20 of 55
Sort by
Logo of Trend Micro TippingPoint Threat Protection System

Trend Micro TippingPoint Threat Protection System

By Trend Micro

4.7
(176 Ratings)

Trend Micro TippingPoint Threat Protection System is a software designed to provide network security by detecting and preventing advanced threats and vulnerabilities. It uses intrusion prevention, threat intelligence and application control features to monitor network traffic and identify potentially malicious activities. The software enables organizations to address business problems related to unauthorized access, exploitation of network weaknesses and lateral movement of threats. Centralized management and automated threat response are included to support policy enforcement and rapid mitigation. It is commonly used in enterprise environments to enhance security posture while managing compliance requirements and minimizing operational risks associated with cyberattacks.

Show More Details
Logo of Cisco Secure Firewall

Cisco Secure Firewall

By Cisco Systems

4.1
(79 Ratings)

Cisco Secure Firewall is a software designed to provide network security through threat detection and prevention, application visibility, and policy enforcement. The software supports firewall capabilities by inspecting incoming and outgoing network traffic and blocking unauthorized access. It offers intrusion prevention, advanced malware protection, and URL filtering, helping organizations protect against security threats across different environments including physical, virtual, and cloud. Cisco Secure Firewall enables centralized management, automation of security policies, and integration with threat intelligence. The software addresses the business problem of safeguarding data and assets from cyber threats while supporting regulatory compliance requirements.

Show More Details
Logo of Trellix Intrusion Prevention System

Trellix Intrusion Prevention System

By Trellix

4.4
(77 Ratings)

Trellix Intrusion Prevention System is a software designed to detect and prevent unauthorized access and malicious activity within network environments. The software offers real-time threat detection, signature-based and behavioral analysis, and automated response capabilities to address various types of cyber threats. It provides advanced visibility into network traffic, enabling organizations to identify and address vulnerabilities, reduce the risk of data breaches, and maintain compliance with internal and regulatory security standards. Trellix Intrusion Prevention System integrates with other security tools to support centralized management and improves operational efficiency by streamlining incident response processes. The software aims to minimize business disruptions caused by cyber attacks and supports organizations in protecting sensitive data.

Show More Details
Logo of Trellix Network Security

Trellix Network Security

By Trellix

4.8
(71 Ratings)

Trellix Network Security is a software designed to protect organizations from advanced threats by monitoring network traffic, detecting intrusions, and responding to suspicious activities in real time. The software provides features such as deep packet inspection, threat intelligence integration, and automated response mechanisms to prevent unauthorized access and data breaches. It addresses the business need for safeguarding digital assets, maintaining regulatory compliance, and reducing downtime associated with cyberattacks. The software supports visibility across distributed environments and facilitates investigation and remediation of security incidents to enhance network protection and operational resilience.

Show More Details
Logo of Alert Logic Managed Detection and Response (MDR)

Alert Logic Managed Detection and Response (MDR)

By LevelBlue (Alert Logic)

3.3
(44 Ratings)

Alert Logic Managed Detection and Response is a software designed to provide continuous monitoring and threat detection across cloud, on-premises, and hybrid environments. The software uses advanced analytics and threat intelligence to identify suspicious activity and potential breaches. It offers automated response capabilities and incident management to support organizations in addressing security threats promptly. Alert Logic Managed Detection and Response streamlines compliance requirements and provides reporting tools for security teams. This software aims to support organizations in detecting, analyzing, and responding to cybersecurity threats while reducing the resources required for in-house monitoring and investigation.

Show More Details
Logo of Security Onion

Security Onion

By Security Onion

4.5
(42 Ratings)

Security Onion is a software for network security monitoring, intrusion detection, and log management. The software aggregates data from multiple sources to provide comprehensive network visibility and facilitates the detection, investigation, and response to security incidents. Security Onion integrates tools for full packet capture, traffic analysis, and threat hunting, enabling security teams to identify suspicious activity, analyze network events, and correlate security data. The software offers indexing and search capabilities for logs and network metadata, supporting the efficient management and analysis of security information to address challenges in incident detection and response within organizational networks.

Show More Details
Logo of ANY.RUN Sandbox

ANY.RUN Sandbox

By ANY.RUN

4.9
(37 Ratings)

ANY.RUN provides an interactive sandbox for malware analysis, offering deep visibility into threat behavior in a secure, cloud-based environment with Windows, Linux, and Android support. It helps SOC teams accelerate monitoring, triage, DFIR, and threat hunting —enabling them to analyze more threats in a team and process more alerts in less time.

Show More Details
Logo of Hillstone S-Series Intrusion Prevention System

Hillstone S-Series Intrusion Prevention System

By Hillstone Networks

4.6
(31 Ratings)

Hillstone S-Series Intrusion Prevention System is a software designed to provide network security by detecting and preventing unauthorized access and malicious activities. The software uses a combination of signature-based and behavior-based threat detection methods to identify a wide range of network threats, such as malware, exploits, and suspicious traffic patterns. It offers real-time traffic inspection and automated response capabilities to mitigate potential attacks while supporting scalability for large and distributed network environments. Hillstone S-Series Intrusion Prevention System addresses the need for organizations to protect sensitive data, maintain network integrity, and comply with security policies by continuously monitoring for vulnerabilities and promptly blocking detected threats.

Show More Details
Logo of Fidelis Network

Fidelis Network

By Fidelis Security

4.5
(22 Ratings)

Fidelis Network is a software designed for advanced threat detection and response within enterprise networks. The software provides visibility across network traffic and enables the identification of malicious activities by analyzing network protocols, files, and behaviors. Features include intrusion detection, automated threat containment, and deep packet inspection. Fidelis Network integrates with endpoint detection and response solutions, supporting coordinated investigation workflows. The software assists organizations in managing complex security environments by correlating data from multiple network segments and detecting threats that evade traditional security measures. It addresses business risks associated with data breaches and targeted attacks by enabling both real-time and retrospective analysis of network events.

Show More Details
Logo of Secureworks Managed iSensor Network Intrusion Prevention System

Secureworks Managed iSensor Network Intrusion Prevention System

By Sophos

4.8
(16 Ratings)

Secureworks Managed iSensor Network Intrusion Prevention System is a software designed to monitor and protect network environments by detecting and preventing unauthorized access and suspicious activities. The software utilizes real-time traffic analysis, deep packet inspection, and advanced threat intelligence to identify potential threats and vulnerabilities within the network. It supports centralized management, automated alerts, and reporting capabilities, helping organizations address security concerns and maintain compliance with regulatory requirements. The software is used to reduce the risk of data breaches and downtime by providing proactive network defense and mitigation of threats at the perimeter level, allowing businesses to safeguard critical information and maintain operational continuity.

Show More Details
Logo of Palo Alto Networks Threat Prevention

Palo Alto Networks Threat Prevention

By Palo Alto Networks

4.6
(14 Ratings)

Palo Alto Networks Threat Prevention is a software solution designed to detect and prevent a range of cyber threats such as malware, exploits, and command-and-control activity across network traffic. The software utilizes multiple security technologies, including signature-based detection and advanced analysis methods, to identify known and unknown threats. It provides protection for organizations by scanning network traffic in real time and blocking malicious files, links, and behaviors. The software assists enterprises in reducing the risk of breaches by automating threat identification and response processes, and enabling consistent security policy enforcement across physical, virtual, and cloud environments.

Show More Details
Logo of Weagle

Weagle

By Weagle

4.3
(10 Ratings)

Weagle is an enterprise security software that safeguards sensitive business data during web and AI browsing, granting companies complete control and protection over data generated through browsers and search engines. Our solution comprises a browser security plugin and an integrated Security Search Engine, enabling enterprises to enhance their SASE strategy. Additionally, we provide Secure Deployment of LLMs within our security infrastructure, where sensitive data is masked using advanced GenAI DLP features at the browser level. The Weagle CISO Dashboard oversees and manages all employees' browser activities, empowering administrators to establish security protocols, monitor KPIs, and prevent data leaks through secure encrypted web browsing, content controls, and policy settings.

Show More Details
Logo of Corelight Open NDR Platform

Corelight Open NDR Platform

By Corelight

5
(9 Ratings)

Corelight's Open NDR Platform transforms network and cloud activity into evidence so defenders can stay ahead of ever-changing attacks. Delivered through an open, extensible architecture powered by Zeek, Suricata, and YARA, it combines network security monitoring, intrusion detection, static file analysis, AI, and Smart PCAP in one platform. Corelight applies the right detection approach per threat, using machine learning, behavioral analytics, and signatures to reduce false positives and accelerate detection engineering response time. By correlating alerts, packets, and context into structured, comprehensive evidence, Corelight enhances visibility, analytics, and investigation speed while integrating seamlessly with existing SIEM, XDR, and SOAR tools.

Show More Details
Logo of SecBlade IPS

SecBlade IPS

By H3C

4.9
(9 Ratings)

SecBlade IPS is a software designed to provide intrusion prevention capabilities for network environments. The software monitors network traffic and analyzes data to detect and prevent a range of cyber threats such as unauthorized access, malware, and exploitation attempts. SecBlade IPS utilizes signature-based and behavior-based detection methods to identify suspicious activity and enforce security policies. It supports real-time threat detection, traffic filtering, and customizable rules to address specific organizational requirements. The software integrates with network infrastructure to offer centralized management, reporting, and adaptability to evolving threat landscapes. SecBlade IPS is implemented to help organizations safeguard their digital assets and maintain the integrity of network operations by minimizing exposure to security vulnerabilities and attacks.

Show More Details
Logo of Virtual Next-Generation IPS (NGIPSv) for VMware

Virtual Next-Generation IPS (NGIPSv) for VMware

By Cisco Systems

4.4
(9 Ratings)

Virtual Next-Generation IPS (NGIPSv) for VMware is a software solution designed to provide intrusion prevention capabilities within virtualized environments. The software analyzes network traffic to identify, block, and report on potential threats, unauthorized access, or suspicious activity, helping organizations protect virtualized workloads on VMware platforms. It offers features such as deep packet inspection, threat intelligence integration, and customizable security policies. The software enables administrators to detect a range of security threats including malware, exploits, and policy violations, while offering automated responses to incidents. NGIPSv supports scalability and works alongside virtualization management systems, addressing the challenge of securing dynamic virtual infrastructures without requiring hardware appliances.

Show More Details
Logo of NSFOCUS IPS

NSFOCUS IPS

By NSFOCUS

5
(8 Ratings)

NSFOCUS IPS is a software designed to provide intrusion prevention and detection capabilities within enterprise network environments. The software monitors network traffic in real time to identify and block malicious activities, vulnerabilities, and unauthorized access attempts. It offers signature-based and behavior-based detection, threat intelligence integration, and customizable security policies. NSFOCUS IPS supports automated responses to detected threats and delivers detailed reporting and visibility into network attack patterns. The software aims to enhance network protection by reducing risks associated with threats such as malware, zero-day exploits, and targeted attacks, supporting organizations in maintaining compliance and safeguarding critical assets.

Show More Details
Logo of Venusense Intrusion Prevention and Management System (IPS)

Venusense Intrusion Prevention and Management System (IPS)

By Venustech

4.4
(8 Ratings)

Venusense Intrusion Prevention and Management System is a software designed to provide integrated network security by monitoring, detecting, and preventing malicious activities and unauthorized access within organizational networks. The software combines real-time analysis, traffic inspection, and advanced threat identification to help organizations protect key data and IT assets. Its features include threat detection, attack signature analysis, and event correlation, enabling effective network security management and incident response. The software is developed to address challenges such as network intrusions, data breaches, and policy violations by offering continuous monitoring, logs, and reporting capabilities, assisting organizations in maintaining compliance and operational security.

Show More Details
Logo of SecurityBridge Platform

SecurityBridge Platform

By SecurityBridge

5
(5 Ratings)

SecurityBridge Platform is a software designed to help organizations secure their SAP environments. The software provides functionalities such as threat detection, vulnerability management, patch management, and compliance monitoring. It enables users to identify risks, monitor for malicious activities, and automate security assessments within SAP systems. The software is used for centralizing the management of SAP security, offering capabilities to analyze system configurations, detect unauthorized access attempts, and manage remediation activities. It aims to address the business problem of maintaining robust security posture in complex SAP landscapes, ensuring operational continuity and minimizing exposure to cyber threats.

Show More Details
Logo of Maltiverse

Maltiverse

By Maltiverse

4.5
(4 Ratings)

Maltiverse is a software focused on threat intelligence and cybersecurity, providing functionalities for the aggregation, analysis, and enrichment of threat data. The software allows organizations to collate information from multiple sources to identify and assess malicious activities such as indicators related to malware, phishing, and other cyber threats. Maltiverse supports integration with security tools and workflows, enabling users to enhance their incident detection and response capabilities. Through automated and manual threat data analysis, the software aids in improving situational awareness and security decision-making, supporting organizations in managing risk and reducing exposure to cyber threats.

Show More Details
Logo of Aramis

Aramis

By aizoOn

5
(3 Ratings)

Aramis is a software designed to support advanced analytics and optimization for supply chain and production management. The software provides tools for data collection, modeling, forecasting, and scenario analysis to assist businesses in addressing operational challenges and improving efficiency. It enables organizations to monitor key performance indicators, evaluate resource utilization, and streamline decision-making processes in areas such as logistics, inventory, and manufacturing. By integrating data from various sources, the software facilitates simulation and prediction of process outcomes, contributing to cost control and risk management objectives for companies seeking to improve supply chain performance and production planning.

Show More Details

Gartner Research

Market Guide for Intrusion Detection and Prevention Systems

Top Trending Products

ANY.RUN SandboxTrend Micro TippingPoint Threat Protection SystemSecurityGen Intrusion Detection System

Popular Product Comparisons

Palo Alto Networks Threat Prevention vs Trellix Intrusion Prevention SystemCisco Secure Firewall vs Security Onion

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.