Vectra AI surpasses its competitors by offering cutting-edge threat detection and response solutions powered by advanced machine learning and behavior analytics, providing unparalleled visibility and real-time insight across entire network ecosystems.
It is not cheap.
Pricing and licensing is quite expensive. But for the value the product provides, it seems at par in the market.
It is not cheap.
Pricing and licensing is quite expensive. But for the value the product provides, it seems at par in the market.
Vulnerability Management, Detection, and Response (VMDR) is a cornerstone product of the Qualys TruRisk Platform and a global leader in the enterprise-grade vulnerability management (VM) vendor space. With VMDR, enterprises are empowered with visibility and insight into cyber risk exposure - making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure their actual risk exposure over time.
Usually every implementation is different and the quote is in function of number of assets.
When you want to cover yourself for scalability, you will be charged for the number you place on the scan itself.
Usually every implementation is different and the quote is in function of number of assets.
When you want to cover yourself for scalability, you will be charged for the number you place on the scan itself.
Sophos UTM is a unified threat management platform designed to protect your businesses from known and emerging malware including viruses, rootkits and spyware. The solution provides a complete network security package with everything your organization needs in a single modular appliance.
The licensing model is very straightforward, it's a bit pricey, but for what you get, it's well worth it.
If you can afford it, go for a small Check Point, as it is easier to manage.
The licensing model is very straightforward, it's a bit pricey, but for what you get, it's well worth it.
If you can afford it, go for a small Check Point, as it is easier to manage.
Cato Networks is a leading SASE (Secure Access Service Edge) platform, combining SD-WAN and network security to obtain a cloud-native service. Cato Networks optimizes and secures application access for users and identities. The platform delivers a next-generation secure networking architecture that minimizes legacy IT infrastructures’ complexity, costs, and risks. The goal of Cato Suite is to connect any user to any application securely and optimally.
The price is not an issue for us, as it is priced more competitively than some other vendors.
If you compare with VeloCloud, the price is the same or even cheaper.
The price is not an issue for us, as it is priced more competitively than some other vendors.
If you compare with VeloCloud, the price is the same or even cheaper.
Illumio Zero Trust Segmentation is a cloud and data center security solution that helps stop breaches from spreading across hybrid and multi cloud IT environments. The solution is designed to stop ransomware, contain cyber attacks, and reduce risk. With Illumio Zero Trust Segmentation, users can understand relationships and communications to map exposure risk of systems and data, identify the right security posture and secure applications through least-privilege policies, and ensure a Zero Trust security posture.
There is a subscription needed to use Illumio Adaptive Security Platform and we pay every three years. Overall the solution is expensive.
The product's pricing is around 10,000-15,000 USD. The pricing is on a yearly basis.
There is a subscription needed to use Illumio Adaptive Security Platform and we pay every three years. Overall the solution is expensive.
The product's pricing is around 10,000-15,000 USD. The pricing is on a yearly basis.
Akamai Guardicore Segmentation is a software-based microsegmentation solution that provides the simplest, fastest, and most intuitive way to enforce Zero Trust principles. It enables you to prevent malicious lateral movement in your network through precise segmentation policies, visuals of activity within your IT environment, and network security alerts. Akamai Guardicore Segmentation works across your data centers, multicloud environments, and endpoints. It is faster to deploy than infrastructure segmentation approaches and provides you with unparalleled visibility and control of your network.
Compared to the pricing we were seeing from both Illumio and Edgewise, Guardicore was very competitive.
Guardicore Centra provides better value for money than NSX, was the other solution that we looked at, which was too expensive for what it does.
Compared to the pricing we were seeing from both Illumio and Edgewise, Guardicore was very competitive.
Guardicore Centra provides better value for money than NSX, was the other solution that we looked at, which was too expensive for what it does.
Infoblox Advanced DNS Protection (ADP) effectively shields you from the widest range of DNS DDoS attacks, ensuring that you can maintain service uptime for your organization. Minimizing disruptions caused by DDoS and other DNS-based attacks is a key business imperative because DNS provides mission-critical network connectivity. If your DNS is down, your business is down. With ADP you can maintain DNS integrity and stop external and internal DNS DDoS attacks that can take your business offline. ADP eliminates such threats as volumetric attacks, DNS hijacking, cache poisoning and other DNS-specific exploits. A proven solution, it ensures that your customers can always reach your website and other external systems, and it keeps your business up and running 24×7 to maintain customer trust and confidence.
The price of Infoblox Advanced DNS Protection could be reduced, it is expensive.
The solution is expensive.
The price of Infoblox Advanced DNS Protection could be reduced, it is expensive.
The solution is expensive.
Fortinet FortiOS is a comprehensive security operating system that powers Fortinet's network security solutions. It provides advanced threat protection, network visibility, and centralized management for organizations of all sizes. With its robust features and intuitive interface, FortiOS enables businesses to secure their networks, applications, and data from cyber threats.
Be sure to choose a licensing plan that leaves a little headroom so performance is not an issue.
The program is expensive.
Be sure to choose a licensing plan that leaves a little headroom so performance is not an issue.
The program is expensive.
Palo Alto Networks Advanced Threat Prevention is a cloud-based security service that combines cutting-edge technologies, including machine learning, artificial intelligence, and expert human monitoring, to effectively thwart advanced threats like malware, zero-day attacks, and command-and-control threats. It offers inline protection, scrutinizing all network traffic irrespective of port, protocol, or encryption. An integral component of Palo Alto Networks' security platform, it enjoys widespread adoption across diverse organizations. With its robust security capabilities, it's an ideal choice for entities of all sizes, particularly those in high-risk sectors such as finance, healthcare, and government agencies, seeking to safeguard their networks from a broad spectrum of advanced threats.
It's not too expensive.
If you want to have all of the good features then you have to pay extra for licensing.
It's not too expensive.
If you want to have all of the good features then you have to pay extra for licensing.
Splunk User Behavior Analytics is a behavior-based threat detection is based on machine learning methodologies that require no signatures or human analysis, enabling multi-entity behavior profiling and peer group analytics for users, devices, service accounts and applications. It detects insider threats and external attacks using out-of-the-box purpose-built that helps organizations find known, unknown and hidden threats, but extensible unsupervised machine learning (ML) algorithms, provides context around the threat via ML driven anomaly correlation and visual mapping of stitched anomalies over various phases of the attack lifecycle (Kill-Chain View). It uses a data science driven approach that produces actionable results with risk ratings and supporting evidence that increases SOC efficiency and supports bi-directional integration with Splunk Enterprise for data ingestion and correlation and with Splunk Enterprise Security for incident scoping, workflow management and automated response. The result is automated, accurate threat and anomaly detection.
There are additional costs associated with the integrator.
The licensing costs is around 10,000 dollars.
There are additional costs associated with the integrator.
The licensing costs is around 10,000 dollars.
ExtraHop Reveal(x) is a highly effective network traffic analysis (NTA) solution that leverages a cloud-native architecture to empower organizations to overcome a world filled with increasingly sophisticated threats. It identifies 25% more threats than its competitors. Additionally, organizations that employ Reveal(x) say they resolve issues 77% percent faster than they would if they were using other similar solutions.
I would rate the price a three out of five. It could be less expensive.
The solution is based on an annual subscription model and is expensive.
I would rate the price a three out of five. It could be less expensive.
The solution is based on an annual subscription model and is expensive.
Check Point IPS is an intrusion prevention system that aims to detect and prevent attempts to exploit weaknesses in vulnerable systems or applications. The solution provides complete, integrated, next-generation firewall intrusion prevention capabilities at multi-gigabit speeds with a low false positive rate and high security. It helps organizations secure their enterprise network, and protect servers and critical data against known and unknown automated malware, blended threats, and other threats.
I think that the price of support is around $40,000 USD or $50,000 USD per year.
The price of this product should be reduced.
I think that the price of support is around $40,000 USD or $50,000 USD per year.
The price of this product should be reduced.
Keep ahead of the latest threats and protect your critical data with ongoing threat prevention and analysis.
TippingPoint is not as expensive as Palo Alto but it's not as cheap as Fortigate.
It's an expensive product.
TippingPoint is not as expensive as Palo Alto but it's not as cheap as Fortigate.
It's an expensive product.
Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilizing an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.
I use the open-source version of this product. Pricing is not relevant.
It is expensive. Our license expired, and our company is not thinking to renew because of our budget.
I use the open-source version of this product. Pricing is not relevant.
It is expensive. Our license expired, and our company is not thinking to renew because of our budget.
For our environment, we pay approximately $25,000 USD yearly.
The licensing for this solution is based on the number of nodes.
For our environment, we pay approximately $25,000 USD yearly.
The licensing for this solution is based on the number of nodes.
Fortinet FortiGate IPS is a highly effective intrusion detection and prevention solution. It is designed to secure a user’s system from end to end and ensure that users are equipped to handle even the most sophisticated threats. Organizations across a wide variety of industries trust IPS to help them prevent unwanted intrusions from harming their networks.
The pricing for FortiGate IPS is competitive with other products in the category.
We are currently evaluating a Palo Alto solution, and the pricing could be a reason for going for Palo Alto.
The pricing for FortiGate IPS is competitive with other products in the category.
We are currently evaluating a Palo Alto solution, and the pricing could be a reason for going for Palo Alto.
We provide industrial asset identification, threat detection, and response to help organizations stay ahead of adversaries. The Dragos platform delivers codified industrial cybersecurity expertise that enables security teams to detect and respond faster to industrial cybersecurity threats, reducing dwell time and down time. We enhance ICS defenders’ efficiency and effectiveness via the Dragos platform, Dragos WorldView intelligence reports, and the Dragos Threat Operations Center.
Palo Alto Networks URL Filtering with PAN-DB is an advanced URL filtering solution that provides a way to control web access, as well as how users interact with online content. With this solution, your organization can prevent credential phishing theft by assuming strict control over which sites users can enter their corporate credentials into. Palo Alto Networks Advanced URL Filtering with PAN-DB provides web protection by using URL database capabilities to help you automatically detect and prevent new malicious and targeted web-based threats instantly.
It is more expensive than ASA but is far cheaper than Checkpoint. So, pricing wise, it is right in the middle.
Expensive, but that's because it provides everything.
It is more expensive than ASA but is far cheaper than Checkpoint. So, pricing wise, it is right in the middle.
Expensive, but that's because it provides everything.
LiveAction develops IT visibility solutions designed to simplify network management. Initially developed to aid the US Department of Defense in the operation of its networks, LiveNX (Network Experience) features an innovative visual display, real-time big data analytics and deep control of routers and switches for unparalleled network administration. LiveNX accelerates troubleshooting with its QoS control, application-aware, and WAN functionality developed through engineering partnerships with Cisco Systems.
It's very expensive.
The solution is fairly expensive compared to other products.
It's very expensive.
The solution is fairly expensive compared to other products.
We buy the licensing on a yearly basis, when we renew our contract. It is around $14,000.
The price for additional throughput is the highest in the industry.
We buy the licensing on a yearly basis, when we renew our contract. It is around $14,000.
The price for additional throughput is the highest in the industry.
Snort is an open-source, rule-based, intrusion detection and prevention system. It combines the benefits of signature-, protocol-, and anomaly-based inspection methods to deliver flexible protection from malware attacks. Snort gained notoriety for being able to accurately detect threats at high speeds.
We have a three-year license for this solution.
Licensing for this solution is paid on a yearly basis.
We have a three-year license for this solution.
Licensing for this solution is paid on a yearly basis.
It’s a single license platform.
It’s a single license platform.
Alert Logic specializes in log management, security configuration, SIEM, SaaS monitoring, network protection, and MDR services. It is suitable for sectors such as utilities, financial services, and government.
It scales pretty well, except in matters of price.
While the pricing and licensing through the AWS Marketplace is straightforward, scaling it out for larger environments has become an issue.
It scales pretty well, except in matters of price.
While the pricing and licensing through the AWS Marketplace is straightforward, scaling it out for larger environments has become an issue.
Block More Intrusions
Stop new and unknown attacks with signature-based and signature-less intrusion prevention systems. Signature-less intrusion detection finds malicious network traffic and stops attacks where no signatures exist.
I rate the product’s pricing an eight out of ten.
The tool is competitively priced.
I rate the product’s pricing an eight out of ten.
The tool is competitively priced.
The Scrutinizer incident response system leverages network traffic analytics to provide active monitoring, visualization, and reporting of network and security incidents. The system quickly delivers the rich forensic data needed by IT professionals to support fast and efficient incident response.
Compared to some of the other tools we have, it's incredibly reasonably priced.
Our entire solution, amortized over five years, is in the vicinity of $40,000 to $50,000 a year.
Compared to some of the other tools we have, it's incredibly reasonably priced.
Our entire solution, amortized over five years, is in the vicinity of $40,000 to $50,000 a year.
Corvil has reduced the time it takes us to isolate root causes.
The pricing is very expensive. Corvil could work on the pricing.
Corvil has reduced the time it takes us to isolate root causes.
The pricing is very expensive. Corvil could work on the pricing.
Zscaler Cloud IPS enables you to have all threat and alert data in one place. Full user, file and app context is available. Streaming to a SIEM allows further integration into the SOC ecosystem.
The software has become more expensive at present.
The product is not affordable for small and medium enterprises.
The software has become more expensive at present.
The product is not affordable for small and medium enterprises.
Aruba IntroSpect is a User Behavior Analytics (UEBA) tool that uses supervised and unsupervised machine learning to automatically baseline user and device behavior while actively looking for anomalous activity that may indicate a threat. The solution detects compromised users’ systems by identifying changes in typical IT access and usage. By accelerating alert prioritization, incident investigation, and threat-hunting efforts, Aruba IntroSpect can automate the detection of attacks and risky behaviors. In addition, the solution allows security teams to stay ahead of malicious activity and also insecure or negligent users, so they can manage threats before they become damaging. Aruba IntroSpect is suitable for IT organizations of every size and enables businesses to easily and rapidly scale machine-learned behavior detection from small projects to full enterprise deployments.
The license is based on the number of users. The evaluation license is free, you can download it from the website and try it out first.
The license is based on the number of users. The evaluation license is free, you can download it from the website and try it out first.
Proofpoint Identity Threat Defense is a comprehensive solution designed to protect organizations from identity-based cyber threats. Its primary use case is to detect and prevent attacks that exploit compromised user credentials. By analyzing user behavior and assessing the risk associated with each identity, it identifies and stops threats like account takeover, business email compromise, and insider threats.