We performed a comparison between Appgate SDP and Cisco Sourcefire SNORT based on real PeerSpot user reviews.
Find out what your peers are saying about Zscaler, Palo Alto Networks, Cisco and others in ZTNA as a Service."The interface is really friendly. It's simple to understand."
"It is pretty stable."
"The simplicity of the SDP platform is a standout feature; instead of navigating through intricate details, users can seamlessly connect to the company's network or switch to the internet with minimal effort."
"One of the most important features is stopping lateral movement across our network."
"The flexibility of the tool is valuable. It is very robust. It has a very robust configuration capability."
"It is a scalable solution...The support answers your questions very fast."
"It has a huge rate of protection. It's has a low level of positives and a huge rate of threat protection. It's easy to deploy and easy to implement. It has an incredible price rate compared to similar solutions."
"It is quite an intelligent product."
"Solid intrusion detection and prevention that scales easily in very large environments."
"The solution is stable."
"The URL filtering is very good and you can create a group for customized URLs."
"The most valuable features of Cisco Sourcefire SNORT are the dashboard for monitoring events."
"The most valuable feature of this solution is the filtering."
"I like most of Cisco's features, like malware detection and URL filtering."
"One limitation is that it's harder to provide access to multiple applications in the company with Appgate, but that's probably because of poor management."
"They could provide a single-box solution to manage tools for 4000 users. Additionally, they could add extra features to enhance remote micro connection."
"One thing that kind of sticks out to me is the ability to do a proper non-split tunnel. VPN tunnel-wise, it is not really a true unsplit tunnel, but I think that's just because of the way it's designed. A split VPN basically allows your system to talk to other systems without being forced down the tunnel. A VPN running in a non-split tunnel mode forces all the traffic down the tunnel to wherever you're VPNing to. It forces the traffic down so that the traffic is subject to the firewall and rules that you have in your corporate environment and such. It helps to prevent remote malicious folks that may be talking directly to that box from piggybacking into the corporate environment through it. They do it partially, but it would be nice to see more of an enterprise-level solution there."
"The user interface should be improved as it is not very easy to work with the updates."
"It would be better to connect to an application portal from any device. Documentation and support could be better."
"On the cloud, when you make some changes, it may be difficult."
"The cloud can be improved."
"The initial setup is a little difficult compared to other products in the market. It depends on the environment. If we are doing any migration, it might take months in a brown-field environment."
"If the price is brought down then everybody will be happy."
"The solution's approach to managing traffic blocking is confusing and impractical."
"The implementation could be a bit easier."
"I would like to have analytics included in the suite."
"While the alerts they offer are good, it could improve it in the sense that they should be more detailed to make the alerts more useful to us in general. Sometimes the solution will offer up false positives. Due to the fact that the alerts aren't detailed, we have to go dig around to see why is it being blocked. The solution would be infinitely better if there was just a bit more detail in the alert information and logging we receive."
"To be frank, the product is not really stable, although they're working on that. Whenever I go to the technical community with an issue, they will usually say that it is not there yet, but the technical team are working on it. The issues are not insolvable. I think they should just keep working on the product to make sure that the product can become very stable. The technical support is great. I appreciate that. We have a lot of communities supporting Firepower now, so you can find help for whatever issue you have."
Appgate SDP is ranked 11th in ZTNA as a Service with 6 reviews while Cisco Sourcefire SNORT is ranked 13th in Intrusion Detection and Prevention Software (IDPS) with 18 reviews. Appgate SDP is rated 8.8, while Cisco Sourcefire SNORT is rated 7.6. The top reviewer of Appgate SDP writes "Helps us manage traffic-related issues and streamlines access management for the network ". On the other hand, the top reviewer of Cisco Sourcefire SNORT writes "An IPS solution for security and protection but lacks stability". Appgate SDP is most compared with Prisma Access by Palo Alto Networks, Zscaler Internet Access, Zscaler Zero Trust Exchange, Waverley Labs Open Source Software Defined Perimeter and Netskope Private Access, whereas Cisco Sourcefire SNORT is most compared with Fortinet FortiGate IPS, Cisco NGIPS, Check Point IPS, Palo Alto Networks Advanced Threat Prevention and Darktrace.
See our list of best ZTNA as a Service vendors.
We monitor all ZTNA as a Service reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.