Darktrace is very flexible.
I particularly like Antigena and the analytics around the real-time monitoring of our network. I also like its reporting because it has got a seven-day reporting period within the system. Every time you run the reports, it gives you the data about the previous seven days. I like that because it is in real-time. I enjoy reading those reports and getting a very clear and decisive idea of what's happening on my network on a real-time basis. I like the actual real-time monitoring of spoofing and things like that. I also like the user monitoring as well as the network logging capabilities.
The reporting needs to be improved. It is hard to get a domain.
The firewall appliance itself is the most valuable feature.
It has helped us to organize our security. We get a better overview on what is happening on the network, which has helped us get quicker responses to users. If we see malicious activity, then we can quickly take action on it. Previously, we weren't getting an overview as fast as we are now, so we can now provide a quicker response.
The integration with the Cisco portfolio is very helpful.
The security intelligence in the product is the best feature and give us all the information that we need in our network.
One of the main features is that the hardware is extremely reliable.
One of the valuable features of the solution is its flexibility and it performs great.
Edge protection is a valuable feature.
The most valuable features are that it's user-friendly, has interesting features, URL filtering, and threat prevention.
It is quite an intelligent product.
Cisco Sourcefire SNORT is easy to configure and the reporting is great. It's also very user-friendly.
This is a good security product.
The product is at the forefront of auto-remediation networking. It's great.
Advice From The CommunityRead answers to top Intrusion Detection and Prevention Software questions. 474,857 professionals have gotten help from our community of experts.
See more Intrusion Detection and Prevention Software questions »
Rony_SklarCommunity Manager at IT Central Station
There are many cybersecurity tools available, but some aren't doing the job that they should be doing. What are some of the threats that may be associated with using 'fake' cybersecurity tools? What can people do to ensure that they're using a tool that actually does what it says it does?