No more typing reviews! Try our Samantha, our new voice AI agent.

Cisco Sourcefire SNORT vs Claroty Platform comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Sourcefire SNORT
Average Rating
7.8
Reviews Sentiment
6.8
Number of Reviews
20
Ranking in other categories
Intrusion Detection and Prevention Software (IDPS) (14th)
Claroty Platform
Average Rating
8.2
Reviews Sentiment
7.2
Number of Reviews
16
Ranking in other categories
Remote Access (9th), Vulnerability Management (23rd), Operational Technology (OT) Security (2nd), Cyber-Physical Systems Protection (2nd)
 

Mindshare comparison

While both are Network Security Systems solutions, they serve different purposes. Cisco Sourcefire SNORT is designed for Intrusion Detection and Prevention Software (IDPS) and holds a mindshare of 3.1%, up 2.3% compared to last year.
Claroty Platform, on the other hand, focuses on Cyber-Physical Systems Protection, holds 40.0% mindshare, down 42.9% since last year.
Intrusion Detection and Prevention Software (IDPS) Mindshare Distribution
ProductMindshare (%)
Cisco Sourcefire SNORT3.1%
Fortinet FortiGate11.4%
Darktrace10.8%
Other74.7%
Intrusion Detection and Prevention Software (IDPS)
Cyber-Physical Systems Protection Mindshare Distribution
ProductMindshare (%)
Claroty Platform40.0%
Armis36.5%
Verve Security Center9.1%
Other14.400000000000006%
Cyber-Physical Systems Protection
 

Featured Reviews

reviewer2772102 - PeerSpot reviewer
Cloud Architect at a consultancy with 1-10 employees
Logging and customizable rules have helped improve threat monitoring and detection
The logging is mainly what I consider one of the best features with Cisco Sourcefire SNORT. Being able to log and store it in a file allows you to push it to a centralized repository. The logging and reporting help improve incident response. You should always be logging threats, any sort of misconfiguration, and anything that could be an issue. It's important to at least log and monitor it. The basic rules provide a good baseline in assessing Cisco Sourcefire SNORT's ability in providing real-time analytics for threat detection, but as a professional, you should look to constantly modify that baseline. They provide extensive customizability so you can define your own rules. The customizability allows it to be adaptable in protecting against diverse network threats to the constant change.
AP
Senior Consultant at Payatu
Passive scanning excels and support proves invaluable
Regarding the cons of the Claroty Platform, it is not about the deployment, but rather the identification. The Claroty Platform becomes too noisy when it gives numerous CVEs related to vendor match. Sometimes, these CVEs are not actually related to the device in the firmware at the site. The Claroty Platform identifies effectively but sometimes identifies many CVEs which might not be the actual issue in certain scenarios.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Solid intrusion detection and prevention that scales easily in very large environments."
"This solution makes life a lot easier as there are fewer man-hours required and we no longer need too many resources to manage it."
"If you compare it to other vendors, the technical support from Cisco is excellent."
"The solution is rather easy to use."
"Scalability is something that Cisco has always cared about."
"Cisco Sourcefire SNORT is easy to configure and the reporting is great. It's also very user-friendly."
"We primarily use this solution as an intrusion prevention system for external firewalls and deploy the solution on-premises."
"It simplifies the configuration process by offering pre-defined base configurations, including security and connectivity settings."
"The platform ensures security without imposing significant delays."
"I believe the two main aspects where Claroty stands out are their ability to provide a complete platform and their OT-specific focus."
"The solution's most valuable feature is the map, which shows everything that is connected and communicates with each other."
"Claroty provides continuous threat protection and identifies pre-empty stuff and false positives."
"I have had a very good experience with the Claroty Platform."
"The solution offers comprehensive tools that greatly enhance your IT operations if implemented correctly."
"Customer service is number one and the best."
"The platform ensures security without imposing significant delays."
 

Cons

"The solution's approach to managing traffic blocking is confusing and impractical."
"The customization of the rules can be simplified."
"A lot of Cisco equipment is very good, but in judging the model of this solution that we have, I feel that it is the worst."
"I don't think this solution is a time-based control system, because one cannot filter traffic based on time."
"The price of this solution could be improved."
"The utopia is to see everything from one dashboard, but sometimes that's not very possible."
"I want to see a better dashboard for the product. The dashboard can be a bit modified or enhanced."
"If the price is brought down then everybody will be happy."
"There are a few protocols that Claroty doesn't currently support."
"The Claroty Platform becomes too noisy when it gives numerous CVEs related to vendor match. Sometimes, these CVEs are not actually related to the device in the firmware at the site."
"Occasionally, I face a login problem despite entering the correct password."
"We face issues in the alert investigation area because it does not properly give the alert communication patterns."
"Claroty Platform only gives the vulnerabilities based on the make and model of the devices, so it doesn't provide any resolution or any detailed explanation of how one can resolve such issues."
"The product could be improved in terms of user interface design."
"For improvement, I think the training could be more practical. We have external training, but they're mostly theoretical. I want the solution to provide hands-on lab experience to help users learn better."
"I've reported four bugs and three feature requests so far. The main area of focus should be on how attacks are detected. The attack vector information needs to be more detailed. For example, it's not enough to state that an SMB v1 version open can lead to a WannaCry attack. A more detailed explanation should help clients understand the various ways an attack could occur."
 

Pricing and Cost Advice

"We have a three-year license for this solution."
"I don't know the exact amount, but most of the time when I go to a company with a proposition, they will say, "This thing that you are selling is good, but it's expensive. Why don't you propose something like FortiGate, Check Point, or Palo Alto?" Cisco device are expensive compared to other devices."
"Licensing for this solution is paid on a yearly basis."
"If one is an extremely expensive product, and ten is cheap, I rate the tool's price as a five."
"The cost is per port and can be expensive but it does include training and support for three years."
"It's a bit expensive compared to other solutions."
"The tool is quite expensive."
"The licensing for physical devices is cheap, but the software version is expensive. The software version costs around 26-28 dollars. I was surprised and even double-checked. It was shocking."
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
890,088 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
10%
University
9%
Construction Company
9%
Comms Service Provider
8%
Manufacturing Company
15%
Energy/Utilities Company
9%
Computer Software Company
7%
Comms Service Provider
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise8
Large Enterprise7
By reviewers
Company SizeCount
Small Business4
Midsize Enterprise1
Large Enterprise11
 

Questions from the Community

What is your experience regarding pricing and costs for Cisco Sourcefire SNORT?
If one is an extremely expensive product, and ten is cheap, I rate the tool's price as a five. There are some other tools in the market that are more expensive than Cisco. There are no additional c...
What needs improvement with Cisco Sourcefire SNORT?
I have not had much experience with the community-driven rule set while utilizing Cisco Sourcefire SNORT. I don't have experience with recognizing zero-day vulnerabilities, but based on my knowledg...
What is your primary use case for Cisco Sourcefire SNORT?
Endpoint protection is the main use case. The main aspect involves specifying different rules, and when network traffic hits these rules, it will try to block the traffic or at least log the traffi...
What needs improvement with Claroty Platform?
Regarding the cons of the Claroty Platform, it is not about the deployment, but rather the identification. The Claroty Platform becomes too noisy when it gives numerous CVEs related to vendor match...
What is your primary use case for Claroty Platform?
My clients are using the Claroty Platform for asset identification, finding CVEs and threat intel. I am aware of the continuous threat detection feature of the Claroty Platform, and even if it is g...
What advice do you have for others considering Claroty Platform?
I am using the Claroty Platform but not using Armis. They might be able to integrate AI into the Claroty Platform when they are creating attack vectors. I have had a very good experience with the C...
 

Also Known As

Sourcefire SNORT
No data available
 

Overview

 

Sample Customers

CareCore, City of Biel, Dimension Data, LightEdge, Lone Star College System, National Rugby League, Port Aventura, Smart City Networks, Telecom Italia, The Department of Education in Western Australia
Rockwell Automation
Find out what your peers are saying about Fortinet, Darktrace, Check Point Software Technologies and others in Intrusion Detection and Prevention Software (IDPS). Updated: April 2026.
890,088 professionals have used our research since 2012.