• Categories

    • Loading categories...

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Intrusion Detection and Prevention Systems

Intrusion Detection and Prevention Systems Reviews and Ratings

What is intrusion detection and prevention systems (IPS) software?

The network intrusion detection and prevention system (IDPS) appliance market is composed of stand-alone physical and virtual appliances that inspect defined network traffic either on-premises or in the cloud. They are often located in the network to inspect traffic that has passed through perimeter security devices, such as firewalls, secure Web gateways and secure email gateways. IDPS devices are deployed in-line and perform full-stream reassembly of network traffic. They provide detection via several methods — for example, signatures, protocol anomaly detection, behavioral monitoring or heuristics, advanced threat defense (ATD) integration, and threat intelligence (TI). When deployed in-line, IDPSs can also use various techniques to detect and block attacks that are identified with high confidence; this is one of the primary benefits of this technology. Next-generation IDPSs have evolved in response to advanced targeted threats that can evade first-generation IDPSs.

How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of ANY.RUN Sandbox
ANY.RUN Sandbox
Logo of Palo Alto Networks Threat Prevention
Palo Alto Networks Threat Prevention
Logo of Hillstone S-Series Intrusion Prevention System
Hillstone S-Series Intrusion Prevention System
For 50M-1B USD Companies
Logo of Trellix Network Security
Trellix Network Security
Logo of ANY.RUN Sandbox
ANY.RUN Sandbox
Logo of Trend Micro TippingPoint Threat Protection System
Trend Micro TippingPoint Threat Protection System
For North America
Logo of Trend Micro TippingPoint Threat Protection System
Trend Micro TippingPoint Threat Protection System
Logo of Trellix Network Security
Trellix Network Security
Logo of Secureworks Managed iSensor Network Intrusion Prevention System
Secureworks Managed iSensor Network Intrusion Prevention System
Integration & Deployment
Logo of Hillstone S-Series Intrusion Prevention System
Hillstone S-Series Intrusion Prevention System
Logo of ANY.RUN Sandbox
ANY.RUN Sandbox
Logo of Palo Alto Networks Threat Prevention
Palo Alto Networks Threat Prevention

Product Listings

Filter by

Products 1 - 20 of 55
Sort by
Logo of Trend Micro TippingPoint Threat Protection System

Trend Micro TippingPoint Threat Protection System

By Trend Micro

4.8
(175 Ratings)

Trend Micro is a global company specializing in cybersecurity. With comprehensive experience and global threat research, the principal business issue the company addresses is digital safety. Its cybersecurity platform is designed to protect numerous organizations and individuals across diverse clouds, networks, devices, and endpoints. The primary area of operation is in cloud and enterprise cybersecurity distinctive for providing advanced threat defense techniques suitable for various platforms. Additionally, the company offers central visibility for swift and improved detection and response. The threat research team of the company supplies essential intelligence and insights, thereby augmenting the effectiveness of the cybersecurity platform and assisting worldwide organizations in combating cyber threats. With a team of 7,000 employees spread across 65 countries, the primary aim of the company is to assist organizations in securing their connected world.

Show More Details
Logo of Cisco Secure Firewall

Cisco Secure Firewall

By Cisco Systems

4.1
(79 Ratings)

Cisco is a company that specializes in networking technologies, particularly Internet Protocol (IP)-based solutions. It was established in 1984 by a group of computer scientists from Stanford University. As of today, Cisco has a global workforce, continuing to innovate in various fields, notably in routing and switching. Adding to its core business, the company also delves into emerging technologies including home networking, IP telephony, optical networking, security features, storage area networking, and wireless technology. Moreover, Cisco extends its expertise to offer a sweeping range of services such as technical support and advanced services. The company sells its products and services on an enterprise level, to commercial businesses, service providers, and end-users.

Show More Details
Logo of Trellix Intrusion Prevention System

Trellix Intrusion Prevention System

By Trellix

4.4
(77 Ratings)

Trellix operates as an international entity devoted to reshaping the cybersecurity landscape. The key business issue the company addresses revolves around the escalation of sophisticated threats challenging organizations today. To combat this, Trellix offers an open and native detection and response platform, building a secure and resilient operational structure. The company embraces machine learning and automation, drawing upon the proficiency of its security professionals and an expansive partner ecosystem to deliver technological advancements. The application of their expertise serves to benefit an extensive user base comprising numerous business and government organizations.

Show More Details
Logo of Trellix Network Security

Trellix Network Security

By Trellix

4.8
(71 Ratings)

Trellix operates as an international entity devoted to reshaping the cybersecurity landscape. The key business issue the company addresses revolves around the escalation of sophisticated threats challenging organizations today. To combat this, Trellix offers an open and native detection and response platform, building a secure and resilient operational structure. The company embraces machine learning and automation, drawing upon the proficiency of its security professionals and an expansive partner ecosystem to deliver technological advancements. The application of their expertise serves to benefit an extensive user base comprising numerous business and government organizations.

Show More Details
Logo of Alert Logic Managed Detection and Response (MDR)

Alert Logic Managed Detection and Response (MDR)

By Fortra

3.2
(44 Ratings)

HelpSystems, now rebranded as Fortra, focuses on addressing the increasing complexity of data protection in an era of escalating cyber threats. In an environment where the only certainty is change, the company acknowledges the necessity of adaptability for sustainable growth. Guided by feedback, Fortra takes on problem-solving and delivers tailored solutions to help organizations deal with their cybersecurity challenges effectively. Specializing in areas such as data security, infrastructure protection, managed services, and threat research and intelligence, the company strives to enhance security maturity and simultaneously reduce the operational challenges associated with it. The fundamental belief driving Fortra is the conviction that no problem is insurmountable. The company is committed to forging a secure future in cybersecurity.

Show More Details
Logo of Security Onion

Security Onion

By Security Onion

4.5
(42 Ratings)

Security Onion Solutions, founded in 2014 by Doug Burks, provides a free and open source platform for intrusion detection, network security monitoring, and log management. The platform, called the Security Onion project, was started by Doug Burks in 2008 to analyze network layers. Additionally, Security Onion Solutions offers professional services and training related to the use of their platform.

Show More Details
Logo of Hillstone S-Series Intrusion Prevention System

Hillstone S-Series Intrusion Prevention System

By Hillstone Networks

4.6
(31 Ratings)

Hillstone Networks is a cybersecurity firm providing comprehensive digital protection to over 28,000 enterprises globally. The company delivers integrative cybersecurity solutions to safeguard valuable business resources and infrastructure, extending its coverage from the edge to the cloud. Its cybersecurity approach offers control and consolidation in different technological environments, regardless of the workload's location. Hillstone Networks’ array of cybersecurity solutions focuses on the crucial aspect of securing digital transformation.

Show More Details
Logo of Fidelis Network

Fidelis Network

By Fidelis Security

4.5
(22 Ratings)

Established in 2002, Fidelis Security empowers enterprises and government agencies to proactively combat cyber threats. Their comprehensive solutions are focused on detecting, investigating, and responding to threats across complex network, endpoint, and cloud environments.

Fidelis enables enterprises to rapidly detect and respond to cyberattacks by providing deep analysis and comprehensive visibility. Trusted by a wide range of industries, Fidelis is committed to continuous innovation.

Their flagship products, Fidelis Elevate and Halo, work together seamlessly. Elevate serves as a central hub for streamlined threat detection and response, while Halo offers continuous monitoring tailored exclusively for cloud security. This combined approach enables firms to stay ahead of the ever-changing cyber threat landscape while protecting their sensitive data and infrastructure.

Show More Details
Logo of ANY.RUN Sandbox

ANY.RUN Sandbox

By ANY.RUN

4.8
(21 Ratings)

ANY.RUN serves as a sophisticated online malware analysis service, designed to research dynamic and static aspects of diverse cyber threats. It operates primarily as an interactive tool for assessment, purposed to present exhaustive information through task execution. The prime goal of ANY.RUN is to offer a full-fledged panorama of the process creation in real time during simulation, boosting research accuracy. Understanding the limitations of automated analysis, often susceptible to deception by advanced malicious applications, ANY.RUN offers a more reliable method of interactive examination, enabling real-time access to the sandbox simulation.

Show More Details
Logo of Secureworks Managed iSensor Network Intrusion Prevention System

Secureworks Managed iSensor Network Intrusion Prevention System

By Sophos

4.7
(16 Ratings)

Sophos is a global provider of advanced cybersecurity solutions. Their main focus is the delivery of an extensive range of security technologies including Managed Detection and Response (MDR), incident response services, as well as endpoint, network, email, and cloud security systems. These products and services are designed to help organizations combat various cyber threats such as active adversaries, ransomware, phishing, and malware. The company offers fully-managed, turnkey security solutions, providing cybersecurity-as-a-service to organizations worldwide. Moreover, Sophos hosts a cloud-based management console, known as Sophos Central, and supports the Sophos X-Ops, a cross-domain threat intelligence unit. The unit enriches the Sophos Adaptive Cybersecurity Ecosystem by optimizing its centralized data lake with a powerful set of open APIs. Sophos' operations are globally distributed and the company's headquarters are in Oxford, U.K.

Show More Details
Logo of Palo Alto Networks Threat Prevention

Palo Alto Networks Threat Prevention

By Palo Alto Networks

4.5
(14 Ratings)

Palo Alto Networks is a global cybersecurity organization shaping the future of cloud-centric technology. The main business objective is to provide effective cybersecurity solutions, maintaining and valuing the digital way of life. It addresses the significant issue of maintaining digital security in an increasingly online-centric world. The company utilizes innovative approaches leveraging advancements in artificial intelligence, analytics, automation, and orchestration. Offering an integrated platform and bolstering a burgeoning ecosystem of collaborators, it assures protection across various platforms including clouds, networks, and mobile devices. The organization envisions a progressively safe and secure digital world each day.

Show More Details
Logo of Weagle

Weagle

By Weagle

4.3
(10 Ratings)

Weagle is an enterprise security software designed to protect sensitive business data during web browsing. It provides companies with full control and privacy over data generated through online searches, both on the web search and AI chat, anonymizes browsing data which is then stored in a secure data wallet and automatically migrated to the company's proprietary servers and deleted every 24 hours.

It also filters out fake news and irrelevant content during work searches to boost employee productivity.

Chat AI masks sensitive data (names, phone numbers, bank details) with a data masking algorithm before sending prompts and uploads for analysis.

All employee online activity is then monitored and managed by the CISO Dashboard, which allows security levels to be set and KPIs to be shown.

Key features include data leak prevention, secure encrypted web searching, content controls and filters, and collaboration tools for teams.

Show More Details
Logo of Corelight Open NDR Platform

Corelight Open NDR Platform

By Corelight

5
(9 Ratings)

Corelight is a company that primarily focuses on network security. Its objective is to transform network and cloud data into detailed evidence to help counter ever-evolving cyber threats. The company offers an open Network Detection and Response (NDR) platform that provides a comprehensive, correlated view of the network, granting unmatched visibility to users. With the advantage of swift investigation, expert-like cyber threat hunting and potential attack disruption capabilities, Corelight targets to enhance cybersecurity preparedness. It offers both on-premise and cloud-based sensors capable of capturing standard industry telemetry and insights that align with pre-existing user tools and processes. Clients of Corelight span diverse sectors, including large scale businesses, government agencies and research institutions.

Show More Details
Logo of SecBlade IPS

SecBlade IPS

By H3C

4.9
(9 Ratings)

Digital Solutions Inc. concentrates on the research, manufacturing, consulting, selling, and service offering of various digital solutions. Their main objective is to provide comprehensive digital solutions that encompass cloud computing, big data, connectivity and security, along with IT consulting services. The organization works on facilitating a connection between technology and businesses to resolve critical issues.

Show More Details
Logo of Virtual Next-Generation IPS (NGIPSv) for VMware

Virtual Next-Generation IPS (NGIPSv) for VMware

By Cisco Systems

4.4
(9 Ratings)

Cisco is a company that specializes in networking technologies, particularly Internet Protocol (IP)-based solutions. It was established in 1984 by a group of computer scientists from Stanford University. As of today, Cisco has a global workforce, continuing to innovate in various fields, notably in routing and switching. Adding to its core business, the company also delves into emerging technologies including home networking, IP telephony, optical networking, security features, storage area networking, and wireless technology. Moreover, Cisco extends its expertise to offer a sweeping range of services such as technical support and advanced services. The company sells its products and services on an enterprise level, to commercial businesses, service providers, and end-users.

Show More Details
Logo of NSFOCUS IPS

NSFOCUS IPS

By NSFOCUS

5
(8 Ratings)

NSFOCUS is a global security company with a focus on internet and application security. With more than two decades of industry experience, the firm operates worldwide with over 4000 employees. It has established two headquarters, one in Beijing, China and another in Santa Clara, CA, USA, alongside 50 other offices globally, protecting telcos, ISPs, hosting providers, financial institutions, government agencies and enterprises from advanced cyberattacks. Utilizing a multi-tenant and distributed cloud security platform, NSFOCUS ensures security is integrated into the internet backbone. It operates in data centers globally, facilitates enterprises to tap into the benefits of cloud computing, and provides comprehensive security and performance. The company also aids partners in offering superior security as a service in a straightforward and intelligent manner. NSFOCUS provides comprehensive, carrier-grade, hybrid DDoS and web security driven by global threat intelligence.

Show More Details
Logo of Venusense Intrusion Prevention and Management System (IPS)

Venusense Intrusion Prevention and Management System (IPS)

By Venustech

4.4
(8 Ratings)

Venustech focuses on network security through its dedicated research and development center. The company has obtained several technical patents and has made distinctive technological achievements, such as creating the first IDS hardware product and introducing the first 10 Gigabit multi-core UTM platform. In its pursuit towards enhanced network security, Venustech has identified numerous common vulnerabilities and was a notable participant of the Microsoft MAPP program in China. Despite its remarkable advancements in the information security market, Venustech is continually striving to provide safer and more efficient solutions to better manage and alleviate any network security concerns.

Show More Details
Logo of SecurityBridge Platform

SecurityBridge Platform

By SecurityBridge

5
(5 Ratings)

SecurityBridge is an SAP-native cybersecurity platform that helps organizations protect critical business systems. It integrates real-time threat monitoring, vulnerability management, and compliance capabilities directly into the SAP environment, supporting businesses in safeguarding data integrity, confidentiality, and availability with minimal manual effort.

Serving as a Cybersecurity Command Center for SAP, SecurityBridge provides a clear, comprehensive view of SAP security posture while ensuring ease of use, efficient implementation, and a straightforward licensing model. With security and compliance at its core, SecurityBridge enables organizations worldwide to address evolving SAP security challenges.

Show More Details
Logo of Maltiverse

Maltiverse

By Maltiverse

4.5
(4 Ratings)

Maltiverse works as a broker for Threat intelligence sources that are aggregated from more than a hundred different Public, Private and Community sources. Once the data is ingested, the IoC Scoring Algorithm applies a qualitative classification to the IoC that changes. Finally this data can be queried in a Threat Intelligence feed that can be delivered to your Firewalls, SOAR, SIEM, EDR or any other technology.

Show More Details
Logo of Aramis

Aramis

By aizoOn

5
(3 Ratings)

aizoOn is an independent technological and innovation consulting firm operating globally with presences in Italy, Europe, Australia, and the USA. The firm's vision encompasses the pervasive application of a scientific and quantitative approach aimed at fostering a more responsible and sustainable society. The firm's mission focuses on supporting the future of various entities in the digital age by offering expertise in technology and innovation. aizoOn utilizes an ecosystemic approach, bringing innovation through a co-creation process with institutions, citizens, as well as public and private organizations. The firm also lays emphasis on professional growth, maintaining a continual focus on the evolution of a professional environment.

Show More Details

Gartner Research

Market Guide for Intrusion Detection and Prevention Systems

Top Trending Products

ANY.RUN SandboxRakeen IPS

Popular Product Comparisons

Palo Alto Networks Threat Prevention vs Trellix Intrusion Prevention SystemCisco Secure Firewall vs Security Onion

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.