No more typing reviews! Try our Samantha, our new voice AI agent.

Cisco Secure IPS (NGIPS) vs Cisco Sourcefire SNORT comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 19, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure IPS (NGIPS)
Ranking in Intrusion Detection and Prevention Software (IDPS)
6th
Average Rating
8.0
Reviews Sentiment
6.7
Number of Reviews
69
Ranking in other categories
No ranking in other categories
Cisco Sourcefire SNORT
Ranking in Intrusion Detection and Prevention Software (IDPS)
14th
Average Rating
7.8
Reviews Sentiment
6.8
Number of Reviews
20
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Intrusion Detection and Prevention Software (IDPS) category, the mindshare of Cisco Secure IPS (NGIPS) is 3.3%, up from 3.1% compared to the previous year. The mindshare of Cisco Sourcefire SNORT is 3.1%, up from 2.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Intrusion Detection and Prevention Software (IDPS) Mindshare Distribution
ProductMindshare (%)
Cisco Secure IPS (NGIPS)3.3%
Cisco Sourcefire SNORT3.1%
Other93.6%
Intrusion Detection and Prevention Software (IDPS)
 

Featured Reviews

reviewer373227 - PeerSpot reviewer
System Engineer at a tech services company with 11-50 employees
Marketing strengths shine but regaining user trust needs significant effort
There are numerous things that could be improved about Cisco Secure IPS (NGIPS) to get it back on track. Sollution for small branches: when we have to connect a lot very small branches (or sometimes only an ATM) we need something small, with LTE and with reasonable price. Cisco response is SDWAN but it is not always the case. Recently Cisco released some small firewalls but I have not tried them yet. Central management with FMC is a very good idea, but sometimes local management or monitoring is helpfull. With Cisco You have to decide: central or local. You cannot have both. Regarding usability, when you commit configuration on Cisco, it sometimes takes very long. Commits also take some time for the competition, but Cisco is definitely lagging behind the rest in this respect. Last but not least, for me as a professional is lack of CLI. With CLI, I can configure every firewall on the market except Cisco. CLI is very important in professional working, and IMHO it was an unwise decision by Cisco to remove it. Graphical interfaces are very nice, but when you've got thousands of objects in a big installation and have to configure many things, CLI is a much faster way to do it.
reviewer2772102 - PeerSpot reviewer
Cloud Architect at a consultancy with 1-10 employees
Logging and customizable rules have helped improve threat monitoring and detection
The logging is mainly what I consider one of the best features with Cisco Sourcefire SNORT. Being able to log and store it in a file allows you to push it to a centralized repository. The logging and reporting help improve incident response. You should always be logging threats, any sort of misconfiguration, and anything that could be an issue. It's important to at least log and monitor it. The basic rules provide a good baseline in assessing Cisco Sourcefire SNORT's ability in providing real-time analytics for threat detection, but as a professional, you should look to constantly modify that baseline. They provide extensive customizability so you can define your own rules. The customizability allows it to be adaptable in protecting against diverse network threats to the constant change.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I have found the filter and the antivirus to be most valuable."
"The initial setup wasn't complex or complicated."
"I would say it's a good product if you look at the primary functionality, which is intrusion prevention."
"This is a stable solution."
"I like the way the tool pushes the packets from the node level."
"The thing about this solution that I like the most is that it's intuitive."
"Cisco NGIPS dropped network Troyans and web application attac almost every day."
"The most valuable feature of this solution is the support."
"The most valuable feature is the ability to automatically learn the traffic in our environment, and change the merit recommendations based on that."
"It is quite an intelligent product."
"Cisco technical support is unbeatable. It offers a premium service every time."
"The whole solution is very good, and stable."
"The product is inexpensive compared to leading brands such as Palo Alto or Fortinet."
"We primarily use this solution as an intrusion prevention system for external firewalls and deploy the solution on-premises."
"In general, the features are all great. However, if I need to take hardware for ASA, because they need to upgrade to Firepower, we want to create rules. For that, most of the time we go to the command line. Right now Firepower is working really hard on the grid. You can apply all those rules to the grid. Even if you want to monitor the logs, for example, the activity will tell you which particular user has been blocked because of that rule. Firepower's monitoring interface is very good, because you can see each and every piece. ASA also had it, but there you needed to type the command and be under the server to see all that stuff. In Firepower you have the possibility to go directly to the firewall. The way the monitoring is displayed is also very nice. The feature I appreciate most in Firepower is actually the grid. The grid has worked very well."
"The solution is stable."
 

Cons

"It is no longer scalable because it has gone end of life."
"I have had a lot of problems with false positives and it would be helpful if this were improved."
"Our customers are still facing many bugs on the system. It has matured noticeably, but we are still facing multiple stability issues on Firepower."
"The onboarding process could be made a little bit better."
"Cisco NGIPS' performance could be better."
"I'd like to see some cloud management."
"The file trajectory, the trace in contamination files, could be improved."
"I would like to see a more user-friendly interface."
"Integration with other components — even Cisco's own products — can be enhanced to improve administrative experience."
"Performance needs improvement."
"The implementation could be a bit easier."
"There are problems setting up VPNs for some regions."
"To be frank, the product is not really stable, although they're working on that. Whenever I go to the technical community with an issue, they will usually say that it is not there yet, but the technical team are working on it. The issues are not insolvable. I think they should just keep working on the product to make sure that the product can become very stable. The technical support is great. I appreciate that. We have a lot of communities supporting Firepower now, so you can find help for whatever issue you have."
"Performance needs improvement."
"The initial setup is a little difficult compared to other products in the market. It depends on the environment. If we are doing any migration, it might take months in a brown-field environment."
"The solution's approach to managing traffic blocking is confusing and impractical."
 

Pricing and Cost Advice

"Licenses for this product are available for either one, or three year terms."
"We pay for the IPS license to use this solution."
"Pricing depends on negotiation with the vendor, although I can say that it is moderate."
"There is a license required to use Cisco NGIPS and it can be a one or three-year license."
"The solution is pricey, but worth it."
"They are very expensive in some places and not reasonable at times for many customers. I have had customers choose another solution because of the high price."
"The licensing can be billed annually or in multi-year contracts such as three, four, or five years."
"The price of Cisco NGIPS could be reduced. It is more expensive than other solutions."
"We have a three-year license for this solution."
"If one is an extremely expensive product, and ten is cheap, I rate the tool's price as a five."
"The cost is per port and can be expensive but it does include training and support for three years."
"Licensing for this solution is paid on a yearly basis."
"I don't know the exact amount, but most of the time when I go to a company with a proposition, they will say, "This thing that you are selling is good, but it's expensive. Why don't you propose something like FortiGate, Check Point, or Palo Alto?" Cisco device are expensive compared to other devices."
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
894,830 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Construction Company
9%
Comms Service Provider
8%
Marketing Services Firm
8%
Comms Service Provider
9%
University
9%
Construction Company
9%
Financial Services Firm
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business28
Midsize Enterprise16
Large Enterprise27
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise8
Large Enterprise7
 

Questions from the Community

What is your experience regarding pricing and costs for Cisco NGIPS?
I would rate the price for Cisco Secure IPS (NGIPS) as high.
What needs improvement with Cisco NGIPS?
I am aware that we are not measuring some metrics or tracking access through Cisco Secure IPS (NGIPS). In my opinion, Cisco could improve the Web GUI for Cisco Secure IPS (NGIPS).
What is your primary use case for Cisco NGIPS?
Our main use case for Cisco Secure IPS (NGIPS) is in-line traffic control, and we are using IPS in an in-line mode.
What is your experience regarding pricing and costs for Cisco Sourcefire SNORT?
If one is an extremely expensive product, and ten is cheap, I rate the tool's price as a five. There are some other tools in the market that are more expensive than Cisco. There are no additional c...
What needs improvement with Cisco Sourcefire SNORT?
I have not had much experience with the community-driven rule set while utilizing Cisco Sourcefire SNORT. I don't have experience with recognizing zero-day vulnerabilities, but based on my knowledg...
What is your primary use case for Cisco Sourcefire SNORT?
Endpoint protection is the main use case. The main aspect involves specifying different rules, and when network traffic hits these rules, it will try to block the traffic or at least log the traffi...
 

Also Known As

Sourcefire NGIPS, Firepower NGIPS
Sourcefire SNORT
 

Overview

 

Sample Customers

American Electric Power, Huntington Bank, Keycorp, Nationwide, Transunion, Marriott, Inova Health, Ford, Thomson Reuters, Dow Chemical, Equifax, Chevron, Walmart, Coca Cola
CareCore, City of Biel, Dimension Data, LightEdge, Lone Star College System, National Rugby League, Port Aventura, Smart City Networks, Telecom Italia, The Department of Education in Western Australia
Find out what your peers are saying about Cisco Secure IPS (NGIPS) vs. Cisco Sourcefire SNORT and other solutions. Updated: April 2026.
894,830 professionals have used our research since 2012.