Cloudflare is a highly-regarded Content Delivery Network (CDN) and a Distribution Denial of Service (DDoS) protection solution. The robust global cloud platform that is Cloudflare ensures users are able to connect to the internet quickly, securely, and reliably. Cloudflare is one of the world's largest networks in the marketplace today. Using Cloudflare, businesses, educational entities, NGOs, vloggers, bloggers, and anyone else with an internet presence can use the solution and experience more secure, faster websites and applications.
So far I use free tier and happy with it. You can subscribe to business package if needed.
There are no additional costs beyond the standard licensing fees.
So far I use free tier and happy with it. You can subscribe to business package if needed.
There are no additional costs beyond the standard licensing fees.
Fortinet FortiEDR is a real-time endpoint protection, detection, and automated response solution. Its primary purpose is to detect advanced threats to stop breaches and ransomware damage. It is designed to do so in real time, even on an already compromised device, allowing you to respond and remediate incidents automatically so your data can remain protected.
I know it is tough to get big budget additions up front, but I highly recommend deploying environment wide and adding the forensic service.
There are no issues with the pricing.
I know it is tough to get big budget additions up front, but I highly recommend deploying environment wide and adding the forensic service.
There are no issues with the pricing.
FortiClient is a fabric agent that delivers endpoint protection, endpoint compliance, and secure access in a single, lightweight, lightweight client, providing visibility, information, and control to your endpoints. In addition, it enables secure, remote connectivity to the security fabric. It also integrates network and endpoint with segmentation and automation. FortiClient enables unified endpoint awareness by sharing endpoint telemetry with the security fabric. It is compatible with third-party EDR (endpoint detection and response and anti-malware solutions.
Licensing was free up to ten users and after that, it was pretty reasonable.
Anyone can download this product for free, but you have to have a FortiGate gateway that you are connecting to.
Licensing was free up to ten users and after that, it was pretty reasonable.
Anyone can download this product for free, but you have to have a FortiGate gateway that you are connecting to.
Vulnerability Management, Detection, and Response (VMDR) is a cornerstone product of the Qualys TruRisk Platform and a global leader in the enterprise-grade vulnerability management (VM) vendor space. With VMDR, enterprises are empowered with visibility and insight into cyber risk exposure - making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure their actual risk exposure over time.
Usually every implementation is different and the quote is in function of number of assets.
When you want to cover yourself for scalability, you will be charged for the number you place on the scan itself.
Usually every implementation is different and the quote is in function of number of assets.
When you want to cover yourself for scalability, you will be charged for the number you place on the scan itself.
Trend Micro Deep Security is a comprehensive solution for endpoint security and server protection, which prevents ransomware attacks and unauthorized access attempts. Its valuable features include tracing back attacks, antivirus protection, endpoint detection and response, firewall-based solution, threat detection, predictive machine learning and AI monitoring, VPM, virtualization, and sandboxing.
Purchasing on the AWS Marketplace is like shopping on Amazon Prime.
We have saved a 50% ROI for the on-premise product. It gave us significant improvement overall in productivity, costs, and efficiency.
Purchasing on the AWS Marketplace is like shopping on Amazon Prime.
We have saved a 50% ROI for the on-premise product. It gave us significant improvement overall in productivity, costs, and efficiency.
Palo Alto Networks WildFire is a highly effective cloud-based advanced threat protection (ATP) solution that organizations in a wide variety of fields trust to help them keep safe from digital threats. It is designed to enable businesses to confront even the most evasive threats and resolve them. It combines many techniques to maximize the level of threat protection available to users.
It IS a bit expensive, but I think you get what you pay for. Value is there.
It's not particularly cheap, but it is absolutely worth it.
It IS a bit expensive, but I think you get what you pay for. Value is there.
It's not particularly cheap, but it is absolutely worth it.
Fortinet FortiWeb is a Web Application Firewall (WAF) that protects your web applications and APIs from attacks targeting known as well as unknown vulnerabilities. As the surface of your web applications evolves with each change of existing features and deployment of new features, your APIs are left exposed. Fortinet FortiWeb provides the board protection capabilities required to protect web applications without sacrificing performance or manageability.
Cheaper than others.
FortiWeb can be purchased in VM mode for a lower price and the same features.
Cheaper than others.
FortiWeb can be purchased in VM mode for a lower price and the same features.
The license is based on the concurrent IP addresses that it's investigating. We have 9,800 to 10,000 IP addresses.
There are additional features that can be purchased in addition to the standard licensing fee, such as Cognito Recall and Stream.
The license is based on the concurrent IP addresses that it's investigating. We have 9,800 to 10,000 IP addresses.
There are additional features that can be purchased in addition to the standard licensing fee, such as Cognito Recall and Stream.
Illumio Zero Trust Segmentation is a cloud and data center security solution that helps stop breaches from spreading across hybrid and multi cloud IT environments. The solution is designed to stop ransomware, contain cyber attacks, and reduce risk. With Illumio Zero Trust Segmentation, users can understand relationships and communications to map exposure risk of systems and data, identify the right security posture and secure applications through least-privilege policies, and ensure a Zero Trust security posture.
There is a subscription needed to use Illumio Adaptive Security Platform and we pay every three years. Overall the solution is expensive.
The product's pricing is around 10,000-15,000 USD. The pricing is on a yearly basis.
There is a subscription needed to use Illumio Adaptive Security Platform and we pay every three years. Overall the solution is expensive.
The product's pricing is around 10,000-15,000 USD. The pricing is on a yearly basis.
Akamai Guardicore Segmentation is a software-based microsegmentation solution that provides the simplest, fastest, and most intuitive way to enforce Zero Trust principles. It enables you to prevent malicious lateral movement in your network through precise segmentation policies, visuals of activity within your IT environment, and network security alerts. Akamai Guardicore Segmentation works across your data centers, multicloud environments, and endpoints. It is faster to deploy than infrastructure segmentation approaches and provides you with unparalleled visibility and control of your network.
Compared to the pricing we were seeing from both Illumio and Edgewise, Guardicore was very competitive.
Guardicore Centra provides better value for money than NSX, was the other solution that we looked at, which was too expensive for what it does.
Compared to the pricing we were seeing from both Illumio and Edgewise, Guardicore was very competitive.
Guardicore Centra provides better value for money than NSX, was the other solution that we looked at, which was too expensive for what it does.
Parsing hundreds of trivial alerts. Managing a mountain of data. Manually forwarding info from your endpoints. Forget that. InsightIDR instantly arms you with the insight you need to make better decisions across the incident detection and response lifecycle, faster.
I am sure that there are cheaper products out there, but none that meet so many of our needs whilst maintaining stability and usability.
The team is very willing to work with companies. My suggestion is to call the Rapid7 sales department and see how they can help.
I am sure that there are cheaper products out there, but none that meet so many of our needs whilst maintaining stability and usability.
The team is very willing to work with companies. My suggestion is to call the Rapid7 sales department and see how they can help.
Arbor Networks, the security division of NETSCOUT, is driven to protect the infrastructure and ecosystem of the internet. It is the principle upon which we were founded in 2000; and remains the common thread that runs through all that we do today. Arbor’s approach is rooted in the study of network traffic. Arbor’s suite of visibility, DDoS protection and advanced threat solutions provide customers with a micro view of their network enhanced by a macro view of global internet traffic and emerging threats through our ATLAS infrastructure. Sourced from more than 300 service provider customers, ATLAS delivers intelligence based on insight into approximately 1/3 of global internet traffic. Supported by Arbor’s Security Engineering & Response Team (ASERT), smart workflows and rich user context, Arbor’s network insights help customers see, understand, and solve the most complex and consequential security challenges facing their organizations.
Start with a small license. Measure your bandwidth requirements.
Arbor's products are very expensive. Their competitors are cheap when compared with Arbor.
Start with a small license. Measure your bandwidth requirements.
Arbor's products are very expensive. Their competitors are cheap when compared with Arbor.
Infoblox Advanced DNS Protection (ADP) effectively shields you from the widest range of DNS DDoS attacks, ensuring that you can maintain service uptime for your organization. Minimizing disruptions caused by DDoS and other DNS-based attacks is a key business imperative because DNS provides mission-critical network connectivity. If your DNS is down, your business is down. With ADP you can maintain DNS integrity and stop external and internal DNS DDoS attacks that can take your business offline. ADP eliminates such threats as volumetric attacks, DNS hijacking, cache poisoning and other DNS-specific exploits. A proven solution, it ensures that your customers can always reach your website and other external systems, and it keeps your business up and running 24×7 to maintain customer trust and confidence.
The price of Infoblox Advanced DNS Protection could be reduced, it is expensive.
The solution is expensive.
The price of Infoblox Advanced DNS Protection could be reduced, it is expensive.
The solution is expensive.
FortiSIEM (formerly AccelOps 4) provides an actionable security intelligence platform to monitor security, performance and compliance through a single pane of glass.
Please be cheaper and more simplified.
We bought the perpetual license, so we own the product, but there is a three-year support renewal fee for that.
Please be cheaper and more simplified.
We bought the perpetual license, so we own the product, but there is a three-year support renewal fee for that.
Networks are constantly evolving due to threats, organizational growth, or new regulatory/business requirements. Traditional management products focus on mitigating company-wide threats through firewall policies, firmware updates, and keeping content security current. FortiManager offers the features to contain threats as well as providing flexibility to evolve along with your ever-changing network.
The licensing costs depend on how many devices you want to use.
In comparison with other products, the price of FortiManager is reasonable.
The licensing costs depend on how many devices you want to use.
In comparison with other products, the price of FortiManager is reasonable.
The Claroty Platform is designed to enhance cybersecurity in industrial settings by monitoring and securing control systems and operational technology. It provides deep visibility into OT networks, critical for detecting vulnerabilities and unauthorized activities.
Users benefit from its anomaly detection capabilities, swiftly addressing potential threats. The platform supports regulatory compliance through detailed audits of network activities and changes. Praised for its asset management, Claroty helps maintain an accurate device inventory, fundamental for robust cybersecurity posture management.
Key features include an intuitive interface and robust reporting tools that deliver insights and analytics, driving informed decisions and ensuring compliance. Users report that Claroty has significantly improved operational efficiency and productivity in their organizations.
It's a bit expensive compared to other solutions.
The tool is quite expensive.
It's a bit expensive compared to other solutions.
The tool is quite expensive.
The Skybox Security Suite platform combines firewall and network device data with vulnerability and threat intelligence, prioritizing security issues in the context of your unique environment. Powerful attack vector analytics reduce response times and risks, bringing firewall, vulnerability and threat management processes for complex networks under control.
The pricing is high, and the licensing model needs more flexibility.
The pricing has increased exorbitantly in the last few years, so now it is questionable. Now, it makes me want to review other products.
The pricing is high, and the licensing model needs more flexibility.
The pricing has increased exorbitantly in the last few years, so now it is questionable. Now, it makes me want to review other products.
Gigamon Deep Observability Pipeline is a comprehensive network visibility solution that provides real-time insights into network traffic. It offers SSL inspection and mobile network monitoring for traffic monitoring purposes. The solution optimizes networks, aids in security inspection, and improves firewall performance. It is praised for its performance, power, straightforward integration, stability, and ease of initial setup.
The solution is highly-priced.
The solution's price is reasonable.
The solution is highly-priced.
The solution's price is reasonable.
Palo Alto Networks Advanced Threat Prevention is a cloud-based security service that combines cutting-edge technologies, including machine learning, artificial intelligence, and expert human monitoring, to effectively thwart advanced threats like malware, zero-day attacks, and command-and-control threats. It offers inline protection, scrutinizing all network traffic irrespective of port, protocol, or encryption. An integral component of Palo Alto Networks' security platform, it enjoys widespread adoption across diverse organizations. With its robust security capabilities, it's an ideal choice for entities of all sizes, particularly those in high-risk sectors such as finance, healthcare, and government agencies, seeking to safeguard their networks from a broad spectrum of advanced threats.
It's not too expensive.
If you want to have all of the good features then you have to pay extra for licensing.
It's not too expensive.
If you want to have all of the good features then you have to pay extra for licensing.
Splunk User Behavior Analytics is a behavior-based threat detection is based on machine learning methodologies that require no signatures or human analysis, enabling multi-entity behavior profiling and peer group analytics for users, devices, service accounts and applications. It detects insider threats and external attacks using out-of-the-box purpose-built that helps organizations find known, unknown and hidden threats, but extensible unsupervised machine learning (ML) algorithms, provides context around the threat via ML driven anomaly correlation and visual mapping of stitched anomalies over various phases of the attack lifecycle (Kill-Chain View). It uses a data science driven approach that produces actionable results with risk ratings and supporting evidence that increases SOC efficiency and supports bi-directional integration with Splunk Enterprise for data ingestion and correlation and with Splunk Enterprise Security for incident scoping, workflow management and automated response. The result is automated, accurate threat and anomaly detection.
There are additional costs associated with the integrator.
The licensing costs is around 10,000 dollars.
There are additional costs associated with the integrator.
The licensing costs is around 10,000 dollars.
ExtraHop Reveal(x) is a highly effective network traffic analysis (NTA) solution that leverages a cloud-native architecture to empower organizations to overcome a world filled with increasingly sophisticated threats. It identifies 25% more threats than its competitors. Additionally, organizations that employ Reveal(x) say they resolve issues 77% percent faster than they would if they were using other similar solutions.
I would rate the price a three out of five. It could be less expensive.
The solution is based on an annual subscription model and is expensive.
I would rate the price a three out of five. It could be less expensive.
The solution is based on an annual subscription model and is expensive.
Overall, the price is good.
The price of the solution is lower compared to the competition.
Overall, the price is good.
The price of the solution is lower compared to the competition.
Keep ahead of the latest threats and protect your critical data with ongoing threat prevention and analysis.
TippingPoint is not as expensive as Palo Alto but it's not as cheap as Fortigate.
It's an expensive product.
TippingPoint is not as expensive as Palo Alto but it's not as cheap as Fortigate.
It's an expensive product.
Forcepoint Next Generation Firewall is a versatile and comprehensive solution for perimeter security, offering features such as SD-WAN, IPS, VPN, and cloud or on-premises subscription keys. It is preferred by many clients over Cisco and is used for obligation redundancy, VPN access, and as the main point of security in infrastructure.
The big advantage of this solution is that we can select the right model for our requirements, which is not too expensive.
Forcepoint is very expensive but it's really secure.
The big advantage of this solution is that we can select the right model for our requirements, which is not too expensive.
Forcepoint is very expensive but it's really secure.
Detect the undetectable and stop evasive attacks. Trellix Network Detection and Response (NDR) helps your team focus on real attacks, contain intrusions with speed and intelligence, and eliminate your cybersecurity weak points.
Its price is lower compared to similar solutions.
We're partners with Cisco so we get a reasonable price. It's cheaper than Palo Alto in terms of licensing.
Its price is lower compared to similar solutions.
We're partners with Cisco so we get a reasonable price. It's cheaper than Palo Alto in terms of licensing.
Fortinet FortiSandbox is a behavior-based threat detection solution that prevents and detects malicious code in files transferred within the organization. It is integrated with FortiGate firewalls and FortiMail for threat protection and can be used for monitoring and reporting. The solution inspects files in a virtual environment with different types of virtual machines and can block or quarantine files based on their score.
There are no costs in addition to the standard licensing fees.
The solution is not expensive at all.
There are no costs in addition to the standard licensing fees.
The solution is not expensive at all.
Using a centralized combination of network and endpoint analysis, behavioral analysis, data science techniques and threat intelligence, NetWitness NDR helps analysts detect and resolve known and unknown attacks while automating and orchestrating the incident response lifecycle. With these capabilities on one platform, security teams can collapse disparate tools and data into a powerful, blazingly fast user interface.
They can easily adjust if you have the requirements which are required. If you have a budget cut or a budget constraint, they can bend.
It is highly scalable. It can be bought based on your requirements.
They can easily adjust if you have the requirements which are required. If you have a budget cut or a budget constraint, they can bend.
It is highly scalable. It can be bought based on your requirements.