We performed a comparison between Cisco Sourcefire SNORT and Splunk User Behavior Analytics based on real PeerSpot user reviews.
Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."I like most of Cisco's features, like malware detection and URL filtering."
"It is quite an intelligent product."
"The solution can be integrated with some network electors like Cisco Stealthwatch, Cisco ISE, and Active Directory to provide the client with authentication certificates."
"It has a huge rate of protection. It's has a low level of positives and a huge rate of threat protection. It's easy to deploy and easy to implement. It has an incredible price rate compared to similar solutions."
"In general, the features are all great. However, if I need to take hardware for ASA, because they need to upgrade to Firepower, we want to create rules. For that, most of the time we go to the command line. Right now Firepower is working really hard on the grid. You can apply all those rules to the grid. Even if you want to monitor the logs, for example, the activity will tell you which particular user has been blocked because of that rule. Firepower's monitoring interface is very good, because you can see each and every piece. ASA also had it, but there you needed to type the command and be under the server to see all that stuff. In Firepower you have the possibility to go directly to the firewall. The way the monitoring is displayed is also very nice. The feature I appreciate most in Firepower is actually the grid. The grid has worked very well."
"The most valuable feature of this solution is the filtering."
"Cisco Sourcefire SNORT is easy to configure and the reporting is great. It's also very user-friendly."
"Cisco technical support is unbeatable. It offers a premium service every time."
"The most valuable feature is the ability to search through a large amount of data."
"Because of some of the visualizations that we utilize, we are able to understand strange, unusual traffic on our networks."
"Splunk is more user-friendly than some competing solutions we tried."
"The most valuable features are the indexing and powerful search features."
"The solution is extremely scalable. Our customers are regularly scaling up after installing Splunk."
"The most valuable features are its data aggregation and the ability to automatically identify a number of threats, then suggest recommended actions upon them."
"The solution is fast, flexible, and easy to use."
"The most valuable feature is being able to take data and put it into other systems so that we could see the output, and to see where we need to apply our focus."
"I would like to have analytics included in the suite."
"With the next release, I would like to see some PBR, so that you can do the configuration with the features."
"The pricing needs to be improved. We have lots of low-budget clients around us. Budget constraints are always a deterrent in our market."
"The solution's approach to managing traffic blocking is confusing and impractical."
"The implementation could be a bit easier."
"The customization of the rules can be simplified."
"While the alerts they offer are good, it could improve it in the sense that they should be more detailed to make the alerts more useful to us in general. Sometimes the solution will offer up false positives. Due to the fact that the alerts aren't detailed, we have to go dig around to see why is it being blocked. The solution would be infinitely better if there was just a bit more detail in the alert information and logging we receive."
"I did not experience any pain points that required improvement. Maybe a couple of false-positives, but that's about it."
"I would like improved downward integration with other tools such as McAfee and other GCP solutions."
"They should work to add more built-in correlation searches and more use cases based on worldwide customer experiences. They need more ready-made use cases."
"The ability to do more complicated data investigation would be a welcome addition for pros, though the functionality now gives most people what they need."
"It would be good if the solution had an analytics tool that allowed us to analyze the data without writing specific queries."
"In the future I would like to see simplified statistics and analytical threats."
"It could be easier to scale the solution if you are using it on-premise, not in the cloud."
"The price of Splunk UBA is too high."
"I'm not aware of any lacking features."
More Splunk User Behavior Analytics Pricing and Cost Advice →
Cisco Sourcefire SNORT is ranked 12th in Intrusion Detection and Prevention Software (IDPS) with 18 reviews while Splunk User Behavior Analytics is ranked 13th in Intrusion Detection and Prevention Software (IDPS) with 18 reviews. Cisco Sourcefire SNORT is rated 7.6, while Splunk User Behavior Analytics is rated 8.2. The top reviewer of Cisco Sourcefire SNORT writes "An IPS solution for security and protection but lacks stability". On the other hand, the top reviewer of Splunk User Behavior Analytics writes "Easy to configure and easy to use solution that integrates with many applications and scripts ". Cisco Sourcefire SNORT is most compared with Fortinet FortiGate IPS, Cisco NGIPS, Check Point IPS, Palo Alto Networks Advanced Threat Prevention and Fortinet FortiWeb, whereas Splunk User Behavior Analytics is most compared with Darktrace, Microsoft Defender for Identity, IBM Security QRadar, Cynet and Exabeam Fusion SIEM. See our Cisco Sourcefire SNORT vs. Splunk User Behavior Analytics report.
See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.