Our primary uses for this solution are URL filtering and malware filtering.
Network Engineer at a tech services company with 501-1,000 employees
Reliably filter URLs and malware, easy to manage and has good support
Pros and Cons
- "The URL filtering is very good and you can create a group for customized URLs."
- "There are problems setting up VPNs for some regions."
What is our primary use case?
How has it helped my organization?
Sourcefire SNORT has been good for us.
What is most valuable?
The most valuable feature is reliability. This solution is better than Check Point.
The URL filtering is very good and you can create a group for customized URLs.
Cisco SNORT is easy to manage.
What needs improvement?
There are problems setting up VPNs for some regions. There are cases where they are permitted in Sourcefire but blocked in Check Point.
There are some outside ports that are allowed by default but should not be.
It would be helpful if a list of third-party services were listed so that the rules could be easily added. An example of this would be a ticket booking site. It would be in a list of services and selecting it would allow transactions with that site.
Buyer's Guide
Cisco Sourcefire SNORT
January 2025
Learn what your peers think about Cisco Sourcefire SNORT. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,997 professionals have used our research since 2012.
For how long have I used the solution?
I have been working with Sourcefire SNORT for six months.
What do I think about the stability of the solution?
There are some bugs in this solution and troubleshooting them is complicated.
What do I think about the scalability of the solution?
The scalability of this solution is good.
How are customer service and support?
The technical support is good and is better than Check Point.
Which solution did I use previously and why did I switch?
We are also using Check Point but it does not work as well as Sourcefire SNORT, which is why we are switching. For example, customized URLs do not work in Check Point. Check Point is also more complex.
How was the initial setup?
The initial setup is straightforward.
What other advice do I have?
This is a good solution and one that I would recommend to others.
I would rate this solution an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Pre-Sales Engineer at a tech services company with 51-200 employees
User friendly GUI, good filtering capability, and good technical support
Pros and Cons
- "The most valuable feature of this solution is the filtering."
- "If the price is brought down then everybody will be happy."
What is our primary use case?
We are a system integrator and this is one of the solutions that we provide to our customers.
This solution is for inspecting traffic. It works with the firewall, email, etc.
This is for an on-premises deployment.
How has it helped my organization?
This is a solution that we trust for protection.
What is most valuable?
The most valuable feature of this solution is the filtering.
It does well for eliminating email spam.
The GUI is user-friendly.
What needs improvement?
The price of this solution could be improved. If the price is brought down then everybody will be happy.
I would like to see a cloud-based version of this solution.
For how long have I used the solution?
I have been familiar with this solution for five years.
What do I think about the stability of the solution?
This is a stable solution.
What do I think about the scalability of the solution?
Scalability is something that Cisco has always cared about. There is no problem with it. For example, if you have one branch and you want to expand to two or three then it will work without any problems.
How are customer service and technical support?
The technical support is very good. I deal with several Cisco departments, and they have a good team. The team around the world is large and their support is very good.
We had a customer who had a problem with their server, and Cisco sent an entirely new one as a replacement.
How was the initial setup?
The initial setup of this solution is a little bit complex compared to other solutions.
The average deployment takes approximately half a day. It depends on the environment. If we are connecting braches versus only connecting the head office, the length of time to deploy can change.
What's my experience with pricing, setup cost, and licensing?
Licensing for this solution is paid on a yearly basis.
What other advice do I have?
This solution has improved a lot in the past few years.
I would rate this solution an eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Cisco Sourcefire SNORT
January 2025
Learn what your peers think about Cisco Sourcefire SNORT. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,997 professionals have used our research since 2012.
Senior Engineer at a tech services company with 51-200 employees
User-friendly and provides important insights into SSL traffic
Pros and Cons
- "The solution can be integrated with some network electors like Cisco Stealthwatch, Cisco ISE, and Active Directory to provide the client with authentication certificates."
- "With the next release, I would like to see some PBR, so that you can do the configuration with the features."
What is our primary use case?
The main features of the Cisco Sourcefire are that it's a next-generation firewall with new features. It has application security, advanced malware protection, URL filterings, encryption, and decryption.
It is also used for email filtration and web application cyber protection.
The deployment model we used was on-premises.
How has it helped my organization?
This solution has improved our security level for our organization. It's a more intellectual system with many features that can help us with decryption.
At this time, we have more than eighty-six percent of the traffic is SSL. We must decrypt this, and these devices provide us with tools for encrypted traffic inspection.
What is most valuable?
It's user-friendly for engineers and works well for configuration and debugging.
The solution can be integrated with some network electors like Cisco Stealthwatch, Cisco ISE, and Active Directory to provide the client with authentication certificates.
What needs improvement?
This is a good solution, but some others may have some advantages. For example, Palo Alto has more useful and suitable application abilities. This solution has a better Firepower but the functionalities are not as good.
With the next release, I would like to see some PBR, so that you can do the configuration with the features.
For how long have I used the solution?
I have been using this solution for six years.
What do I think about the stability of the solution?
This solution is stable if we talk about boxes, and usually, it is a strong system, but with some software versions, we have had some trouble. I think that it depends on the manufacturers.
What do I think about the scalability of the solution?
This solution is scalable and reliable.
You can use it in a cluster for one PC or a cluster for two different data centers.
How are customer service and technical support?
The support is good.
For customers, there are many features and we try to resolve as many issues as we can, but we only have access to some of the core elements. They can only be resolved by contacting technical support.
How was the initial setup?
The initial setup and configuration are easy.
You can create panels with deeper functionalities, but you need a bit more experience with the technology.
What other advice do I have?
Providing videos and materials are useful, but really what you need is the experience in analyzing logs. Without that, you wouldn't be able to problem-solve on your own, even with the assistance of videos.
I would recommend this solution. It's reliable and scalable, with easy installation and integration.
I would rate this solution an eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Cisco Sourcefire SNORT Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2025
Product Categories
Intrusion Detection and Prevention Software (IDPS)Popular Comparisons
Darktrace
Vectra AI
KerioControl
Palo Alto Networks Advanced Threat Prevention
Trend Micro Deep Discovery
Splunk User Behavior Analytics
Trend Micro TippingPoint Threat Protection System
Check Point IPS
ExtremeCloud IQ
Fortinet FortiGate IPS
Palo Alto Networks URL Filtering with PAN-DB
Cisco Secure IPS (NGIPS)
Trellix Intrusion Prevention System
Fortra's Tripwire Enterprise
Zscaler Cloud IPS
Buyer's Guide
Download our free Cisco Sourcefire SNORT Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- When evaluating Intrusion Detection, what aspect do you think is the most important to look for?
- What is your recommended cost-effective solution to detect and prevent APT attacks?
- What product do you recommend for a Campus IPS appliance implementation?
- How do you use the MITRE ATT&CK framework for improving enterprise security?
- What are the pros and cons of Darktrace vs CrowdStrike Falcon vs alternative EPP solutions?
- Which alternative solutions (other than Darktrace) do you recommend for an SMB?
- Which is the best intrusion detection and prevention solution?
- What is the best IDPS security tool and why?
- What is Cognitive Cybersecurity and what is it used for?