The network intrusion detection and prevention system (IDPS) appliance market is composed of stand-alone physical and virtual appliances that inspect defined network traffic either on-premises or in the cloud. They are often located in the network to inspect traffic that has passed through perimeter security devices, such as firewalls, secure Web gateways and secure email gateways. IDPS devices are deployed in-line and perform full-stream reassembly of network traffic. They provide detection via several methods — for example, signatures, protocol anomaly detection, behavioral monitoring or heuristics, advanced threat defense (ATD) integration, and threat intelligence (TI). When deployed in-line, IDPSs can also use various techniques to detect and block attacks that are identified with high confidence; this is one of the primary benefits of this technology. Next-generation IDPSs have evolved in response to advanced targeted threats that can evade first-generation IDPSs.
"Trendmicro Tipping Point with Excellent Intrusion Detection and Threat Intelligence "
Trendmicro Tipping Point has an amazing intrusion detection feature that is used in our organization to monitor our network traffic for suspicious activity and actively blocks any intrusions. It is highly scalable within our organization and there is no compromise in the performance and scans for threats at high speeds without hampering the network speeds. It has helped our organization to identify and block critical threats from various sources. I'm glad that we have been using this product in the right time and saves our organization form cyber security attacks. The estimated ROI from this product is approximately 250%.
"A very reliable, value for money and easy to maintain device."
It goes on and on, year after year for many years without many issues. It is like a very reliable property that a company can have.
"High-Capacity Network Management with Convenient User Interface"
The overall experience is very good and above industry standards and better as compared to its competitors. It can handle large network traffic with great console UI and is easy to administrate.
"Stable and very reliable IPS Solution with various integration capabilities and low TCO"
The Trellix Intrusion Prevention System is an IPS Solution with a low false positive Rate and low TCO. The solution is very stable and after initial Policy configuration, signature sets update doesn't requiere lots of work.
"Implementation Simple, Support Quick and Responsive"
Working with Barkly has been a pleasure so far. We're a small company, and so are they. They understand our situation and have worked with us accordingly.
"No-Cost Software Offers Support for Custom Development"
The software is free and totally functional without cost to run. Purchasing support hours can assist with setup and troubleshooting. These hours can also be used for custom development. The staff are incredible with support and development. There is a huge list of already supported data sources but they will develop the ability for more if needed.
"Visibility and control over your network."
Easy to work with, gives a whole new set of security measurements, gives visibility and thus understanding, so that IT administrators act accordingly.
"IPS, DLP, email security all in one product"
Fidelis has been extremely responsive in support of the Elevate Network product.
"Equipment and analysts do their job with grace, letting you focus on your job."
Sad to see it go, but would love to have seen it grow.
"Interactive Options and Detailed Reporting: The Preferred Choice"
It is one of the must-have tools in our toolbox and usually the first choice in the analysis process.
"Preventing Threats: A Revolutionary Strategy in AI World"
Great Experience, especially the focus on Palo Alto and its CEO vision on staying ahead of the curve in threat prevention rather then threat defense.
"Unveiling Network Issues: Unprecedented Information Gathering Capability"
Proactive support from the vendor has been extremely helpful when making sure 3rd party items are working as intended.
"H3C‘’s products and service are powerful and reliable."
H3C‘’s products and service are powerful and reliable, and its full line of products and complete security solutions satisfied our needs totally.
"Easy to handle Mails with Boxer VMware"
Mails are secured to open in VMware in smartphones. We can work securily with the mails inspite of location and time. Also it makes simple to sync with the mails
"High performance, excellent detection and protection capacity"
NIPS provides real -time and proactive network protection. It also supports traffice management,management, effectively identifying potential abnormal traffic and preventing Dos attack
"Leading technology, but better to integrate with other venustech security products"
1. venusense NIPS can detect and block the threat efficiently 2. venustech team can trace and response the new threat quickly 3. venustech is providing a good post technical support 4. venusense NIPS is a good choice for the customers who is searching the solution with cost effective.
"Exceptional Product, Exceptional Vendor Support"
We implemented SecurityBridge about a year ago in order to assist us in securing our SAP environment and are extremely happy with the decision. It's enabled us to quickly monitor and track anomalies in real time, something that wasn't easily doable previously.
"Time and cost savings in Threat Intelligence adoption"
The solution has greatly simplified our internal workflows with IOC. We have saved a lot of work time by implementing this solution and being able to offer an answer to our customers needs from day 0
Competitor or alternative data is currently unavailable
See All Alternatives"Real Time threat protection with easy to use GUI interface and maximum effectivness"
Is one of the best IT Security solution provided and a perfecto choice if an organization need a real time detection on cyber-risks
"Red Piranha"
Red Piranha have been absolutely pivotal in bringing our data security to the next level. We have engaged them as our sole security provider and have been able to cover all the bases for us with fantastic customer support in a number of areas. We have secured our local networks by using the 25 Series Crystal Eye Devices in all our main work spaces which has an incredible intuitive interface and gives you a snapshot of the security over your whole network and allows you to enforce security policies network wide. This has been a game changer for our local networks and provides piece of mind for the whole company. The vulnerability scanning tool from the Crystal eye device has allowed us to remediate some vulnerabilities and have mitigated some significant risks. RP has conducted extensive penetration testing on all our cloud applications, websites and portals. We received a detailed report of all the areas that required immediate remediation including a level of risk and examples of how these vulnerabilities could be exploited, and what the damage to the company would be. While it would be insecure to provide exact details of what they found, I can tell you that they exposed a number of high risk vulnerabilities including -XSS Errors -DDOS vulnerabilities due to lack of rate limiting controls -Brute force vulnerabilities -Broken access control -etc. During their investigation stage they even found a public repository of an ex-employee (that hadn't worked for us for a number of years) that exposed live credentials to a database. Without this investigation and pen testing we would have been susceptible to a number of high risk vulnerabilities that were well beyond our risk assessment profile.