Try our new research platform with insights from 80,000+ expert users

Cisco Sourcefire SNORT vs Trend Micro Deep Discovery comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 19, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Sourcefire SNORT
Ranking in Intrusion Detection and Prevention Software (IDPS)
14th
Average Rating
7.8
Reviews Sentiment
6.8
Number of Reviews
20
Ranking in other categories
No ranking in other categories
Trend Micro Deep Discovery
Ranking in Intrusion Detection and Prevention Software (IDPS)
6th
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
28
Ranking in other categories
Advanced Threat Protection (ATP) (17th), Network Detection and Response (NDR) (8th)
 

Mindshare comparison

As of January 2026, in the Intrusion Detection and Prevention Software (IDPS) category, the mindshare of Cisco Sourcefire SNORT is 3.1%, up from 2.1% compared to the previous year. The mindshare of Trend Micro Deep Discovery is 3.5%, down from 4.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Intrusion Detection and Prevention Software (IDPS) Market Share Distribution
ProductMarket Share (%)
Trend Micro Deep Discovery3.5%
Cisco Sourcefire SNORT3.1%
Other93.4%
Intrusion Detection and Prevention Software (IDPS)
 

Featured Reviews

reviewer2772102 - PeerSpot reviewer
Cloud Architect at a consultancy with 1-10 employees
Logging and customizable rules have helped improve threat monitoring and detection
The logging is mainly what I consider one of the best features with Cisco Sourcefire SNORT. Being able to log and store it in a file allows you to push it to a centralized repository. The logging and reporting help improve incident response. You should always be logging threats, any sort of misconfiguration, and anything that could be an issue. It's important to at least log and monitor it. The basic rules provide a good baseline in assessing Cisco Sourcefire SNORT's ability in providing real-time analytics for threat detection, but as a professional, you should look to constantly modify that baseline. They provide extensive customizability so you can define your own rules. The customizability allows it to be adaptable in protecting against diverse network threats to the constant change.
reviewer2266119 - PeerSpot reviewer
Senior IT Security Engineer at a financial services firm with 5,001-10,000 employees
Has improved email security through advanced filtration and timely threat detection
I work with Trend Micro Apex One. I have used the Deep Discovery's Sandbox analysis feature, and we utilize another appliance known as Deep Discovery Analyzer, abbreviated as DDA. This tool makes analysis for URLs and attachments contained in inbound emails, so whenever we receive an email with a URL or attachment, it will be analyzed by Trend Micro Deep Discovery Analyzer. In evaluating Deep Discovery's real-time visibility on network traffic, it is important to note that we applied our Deep Discovery Analyzer for Trend Micro to conduct sandboxing specifically for email channels only, and we do not utilize it for network channels. For network channel sandboxing, we use a solution called FortiAnalyzer, which belongs to another team called network security. I assess Deep Discovery's effectiveness in identifying sophisticated attack patterns by looking at how it handles high traffic loads, and how effectively it can use its instances and images to analyze numerous URLs and attachments simultaneously. Additionally, I evaluate its ability to maintain round-robin or load balancing across different analyses without leaving samples queued for analysis. The performance is critical when the product updates for signatures are up-to-date, as this aids in the detection and classification of URLs and attachments without delay in the analysis process. On a scale of one to ten, I rate Trend Micro Deep Discovery a nine.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The whole solution is very good, and stable."
"The most valuable features of Cisco Sourcefire SNORT are the dashboard for monitoring events."
"The URL filtering is very good and you can create a group for customized URLs."
"In general, the features are all great. However, if I need to take hardware for ASA, because they need to upgrade to Firepower, we want to create rules. For that, most of the time we go to the command line. Right now Firepower is working really hard on the grid. You can apply all those rules to the grid. Even if you want to monitor the logs, for example, the activity will tell you which particular user has been blocked because of that rule. Firepower's monitoring interface is very good, because you can see each and every piece. ASA also had it, but there you needed to type the command and be under the server to see all that stuff. In Firepower you have the possibility to go directly to the firewall. The way the monitoring is displayed is also very nice. The feature I appreciate most in Firepower is actually the grid. The grid has worked very well."
"It is quite an intelligent product."
"The tool's most valuable feature is threat detection, which is important because we have multiple layers not only in Cisco."
"The most valuable feature is the ability to automatically learn the traffic in our environment, and change the merit recommendations based on that."
"Cisco technical support is unbeatable. It offers a premium service every time."
"I like the sales operations testing. and support."
"Trend Micro Deep Discovery is a very specific product for threat intelligence with smart protection."
"Trend Micro Deep Discovery Email Inspector includes its ability to perform mail detection and mail filtration against various email attacks such as phishing and spam, serving as an email gateway for both inbound and outbound traffic."
"The most valuable features are the protection and that it is fast."
"Generally speaking, it just gives us a broad understanding of exactly what kind of threats occur. The submission point, analyzing point, and virtualization are within the environment that it supports. It helped us to improve our security levels and protect our internal network from any threats outside."
"It is a very good solution. It is very light, and it is quite quick to figure out the problem in your network."
"The tool's stability and performance are good."
"The tool's most valuable feature is its collaboration with other products. Integrating with other security products was simple and easy."
 

Cons

"The initial setup is a little difficult compared to other products in the market. It depends on the environment. If we are doing any migration, it might take months in a brown-field environment."
"The customization of the rules can be simplified."
"If the price is brought down then everybody will be happy."
"I don't think this solution is a time-based control system, because one cannot filter traffic based on time."
"The solution's approach to managing traffic blocking is confusing and impractical."
"Integration with other components — even Cisco's own products — can be enhanced to improve administrative experience."
"I did not experience any pain points that required improvement. Maybe a couple of false-positives, but that's about it."
"The cloud can be improved."
"The solution is not scalable as it is an agent product rather than a product designed for scalability."
"The product's scalability feature needs to be improved, as it is an area in the product with certain shortcomings."
"The product's security features need enhancement."
"The solution should support multiple platforms in Windows, Linux, and Mac. Customers can have different software types. The virtual environment should be able to install and analyze them. The tool also gives only a minimum level of extension support. It may not be able to extract files and give details about them. I would also like to see third-party product integration in the tool. The solution's current integration is only with Trend Micro products only."
"The tool's configuration can be made easier."
"I would like to see integration with third-party tools to improve the visibility of the dashboards."
"Trend Micro Deep Discovery is a very expensive solution, making it very hard to sell."
"This solution could be improved with faster technical support and cheaper licensing prices."
 

Pricing and Cost Advice

"If one is an extremely expensive product, and ten is cheap, I rate the tool's price as a five."
"Licensing for this solution is paid on a yearly basis."
"I don't know the exact amount, but most of the time when I go to a company with a proposition, they will say, "This thing that you are selling is good, but it's expensive. Why don't you propose something like FortiGate, Check Point, or Palo Alto?" Cisco device are expensive compared to other devices."
"We have a three-year license for this solution."
"The cost is per port and can be expensive but it does include training and support for three years."
"Compared to its competitors, Trend Micro Deep Discovery is a little expensive."
"Trend Micro Deep Discovery is quite expensive compared to other endpoint security products."
"The tool's licensing costs are yearly. There are no additional costs associated with the product."
"The price of the solution is lower compared to the competition."
"Its price is fine, but Trend Micro can improve the pricing in general. It is a hardware solution. It is based on the number of nodes, and according to the number of nodes, clients decide which box they should acquire. They have to renew their license every year. It is subscription-based."
"The pricing is okay for some, and sometimes, some people find it expensive."
"Overall, Trend Micro Deep Discovery has proven to be a reliable solution that enhances our security posture while minimizing operational disruptions."
"The licensing cost is a bit pricey. We pay a yearly subscription."
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
880,745 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
University
13%
Financial Services Firm
10%
Computer Software Company
8%
Comms Service Provider
8%
Computer Software Company
11%
Financial Services Firm
8%
Healthcare Company
7%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise8
Large Enterprise7
By reviewers
Company SizeCount
Small Business15
Midsize Enterprise6
Large Enterprise9
 

Questions from the Community

What do you like most about Cisco Sourcefire SNORT?
The product is inexpensive compared to leading brands such as Palo Alto or Fortinet.
What is your experience regarding pricing and costs for Cisco Sourcefire SNORT?
If one is an extremely expensive product, and ten is cheap, I rate the tool's price as a five. There are some other tools in the market that are more expensive than Cisco. There are no additional c...
What needs improvement with Cisco Sourcefire SNORT?
I have not had much experience with the community-driven rule set while utilizing Cisco Sourcefire SNORT. I don't have experience with recognizing zero-day vulnerabilities, but based on my knowledg...
What do you like most about Trend Micro Deep Discovery?
The tool's most valuable feature is its collaboration with other products. Integrating with other security products was simple and easy.
What needs improvement with Trend Micro Deep Discovery?
Server Protect is not commonly used. When considering the Sandbox feature, it only inspects small files, and not all types of files are supported. The solution is very expensive. The solution is no...
 

Also Known As

Sourcefire SNORT
Trend Micro Deep Discovery Inspector, Trend Micro Deep Discovery Analyzer
 

Overview

 

Sample Customers

CareCore, City of Biel, Dimension Data, LightEdge, Lone Star College System, National Rugby League, Port Aventura, Smart City Networks, Telecom Italia, The Department of Education in Western Australia
Allied Telesis, Atma Jaya Catholic University of Indonesia, Babou, Blekinge County Council, Delacour, Hiroshima Prefectural Government, Live Nation Entertainment Inc., Mazda Motor Logistics Europe, McGill University Health Centre, Mikuni Corporation, OKWAVE, Sinar Mas Land, SWICA, UTOC Corporation
Find out what your peers are saying about Cisco Sourcefire SNORT vs. Trend Micro Deep Discovery and other solutions. Updated: December 2025.
880,745 professionals have used our research since 2012.