We just raised a $30M Series A: Read our story

Cisco NGIPS OverviewUNIXBusinessApplication

Cisco NGIPS is #5 ranked solution in top Intrusion Detection and Prevention Software. IT Central Station users give Cisco NGIPS an average rating of 8 out of 10. Cisco NGIPS is most commonly compared to Trend Micro TippingPoint Threat Protection System: Cisco NGIPS vs Trend Micro TippingPoint Threat Protection System. The top industry researching this solution is Comms Service Provider, accounting for 31% of all views.
What is Cisco NGIPS?

Cisco Firepower NGIPS provides network visibility, threat intelligence, automation and industry leading threat effectiveness. Gartner has ranked Firepower NGIPS as a Magic Quadrant Leader for seven years running, and the independent NSS Labs testing organization consistently rates it as a “Recommended” IPS solution for eight years.

Cisco NGIPS is also known as Sourcefire NGIPS, Firepower NGIPS.

Cisco NGIPS Buyer's Guide

Download the Cisco NGIPS Buyer's Guide including reviews and more. Updated: October 2021

Cisco NGIPS Customers

American Electric Power, Huntington Bank, Keycorp, Nationwide, Transunion, Marriott, Inova Health, Ford, Thomson Reuters, Dow Chemical, Equifax, Chevron, Walmart, Coca Cola

Cisco NGIPS Video

Archived Cisco NGIPS Reviews (more than two years old)

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
AS
Network Administrator
Real User
Good for filtering and very stable with the ability to scale easily

What is our primary use case?

We use it on the perimeter, for our infrastructure between our network and our bank's network.

What is most valuable?

The solution is very powerful coupled with Firepower. It's great for filtering.

What needs improvement?

The pricing is very expensive. They should make their equipment more affordable. Cisco should offer better integration capabilities and offer an easier integration process.

For how long have I used the solution?

We bought the solution a year ago, and finished setup a month ago.

What do I think about the stability of the solution?

This current solution is stable. Last time, we worked with Cisco ASA 6500. That solution sometimes froze and we had to reboot the system. This one, as I mentioned, seems fine. We don't have this…

What is our primary use case?

We use it on the perimeter, for our infrastructure between our network and our bank's network.

What is most valuable?

The solution is very powerful coupled with Firepower. It's great for filtering.

What needs improvement?

The pricing is very expensive. They should make their equipment more affordable.

Cisco should offer better integration capabilities and offer an easier integration process.

For how long have I used the solution?

We bought the solution a year ago, and finished setup a month ago.

What do I think about the stability of the solution?

This current solution is stable. Last time, we worked with Cisco ASA 6500. That solution sometimes froze and we had to reboot the system. This one, as I mentioned, seems fine. We don't have this problem.

What do I think about the scalability of the solution?

The solution is very scalable, but the main issue surrounds the cost to do so. Scaling can be very expensive. Our network isn't too big. We have around 60 users.

How are customer service and technical support?

Cisco offers very good technical support. I have no complaints about that. 

How was the initial setup?

We attended the Cisco training, as we always do. When we buy equipment from Cisco, they also give us learning credits. With those learning credits, it makes it easy to attend training. In terms of the knowledge they share surrounding the equipment, it's very good. We don't have a doubt about what to do.

The initial setup of NGIPS was fine. Firepower took the most time. We took about three months to deploy the solution. 

You only need two people for deployment and maintenance. 

What about the implementation team?

We implemented the solution by ourselves. Last time, we worked with a company that deployed for us, but it turned out not to be necessary. We realized we can deploy by ourselves, and attend the training and support by ourselves. 

What other advice do I have?

The advice I would give to others thinking about implementing the solution is to make sure you have a solid knowledge of the network. 

I would rate this solution eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller.
JP
System Engineer at a tech services company with 11-50 employees
Real User
A solution with a lot of complexity but with excellent customer service

Pros and Cons

  • "Technical support is quite good. With firewalls, the last cases I had with Cisco were professionally handled quite quickly and it was great."
  • "Overall, it lacks user-friendliness. It could be easier to manage. I can train any customer using FortiGate or Palo Alto in a few days, but with Cisco, it takes much more time because the systems aren't easy to use."

What is our primary use case?

We use the solution to secure our client's networks.

What needs improvement?

Overall, it lacks user-friendliness. It could be easier to manage. I can train any customer using FortiGate or Palo Alto in a few days, but with Cisco, it takes much more time because the systems aren't easy to use.

It would be very nice to get rid of FlexConfig. It's a very unhelpful element of the solution.

One feature that is lacking is full interoperability with CLI.

You can configure Palo Alto and FortiGate with a graphical interface, and you can configure it with the command line. This is not so in Cisco. For professionals, this is important because the command line allows us to configure a lot of things and copy configurations and it's much easier.

For how long have I used the solution?

I've been using the solution for 10 to 15 years.

How are customer service and technical support?

Technical support is quite good. With firewalls, the last cases I had with Cisco were professionally handled quite quickly and it was great. I can compare with some other manufacturers. FortiGate is awful, for example. I'm generally pleased with Cisco.

How was the initial setup?

The solution has a moderate amount of difficulty. You need to go over and use the documentation.

Cisco has a device manager now but this device manager is not like all device managers from ASA. It lacks a lot of features, and some of these features are very important. It makes it a challenge to configure because of the graphical interface. You have to install the management center and that itself takes time and it's not so simple.

What other advice do I have?

We use the on-premises deployment model.

Ten years ago, when you sold Cisco to clients, customers complained about the price but they knew they were buying the best product in the market. It is totally different now. If they want to buy the best product in the market, they buy Palo Alto or Check Point. Cisco is trying to catch up to the competition.

When we talk about just the IPS manufacturers, I would rate the solution around six or seven out of ten. If we're talking about Cisco as a whole, I would rate them eight out of ten.  

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
Learn what your peers think about Cisco NGIPS. Get advice and tips from experienced pros sharing their opinions. Updated: October 2021.
543,424 professionals have used our research since 2012.
YL
System Engineer at Sho
Real User
A stable firewall solution that I would recommend

Pros and Cons

  • "This is a stable solution."
  • "I would like to see integration with monitoring tools such as Nagios or BMC."

What is our primary use case?

We use this solution as part of our firewall.

What is most valuable?

This is a great firewall.

What needs improvement?

I have had a lot of problems with false positives and it would be helpful if this were improved.

I would like to see integration with monitoring tools such as Nagios or BMC.

An improved dashboard would be great.

For how long have I used the solution?

I have been using this solution for almost two years.

What do I think about the stability of the solution?

This is a stable solution.

How are customer service and technical support?

I have not had contact with technical support.

Which solution did I use previously and why did I switch?

Prior to this solution, I used the Sophos XG 430.

How was the initial setup?

The initial setup for this solution is complex.

The deployment took four months.

What about the implementation team?

We had a reseller assist with our deployment.

What's my experience with pricing, setup cost, and licensing?

Cisco products are always expensive, but if you can afford the price then it's a great solution. When I compare to Sophos, for example, Sophos is cheaper.

What other advice do I have?

This is a great product. My advice for anybody who is considering this solution is that I would recommend it to anyone who can afford the price of the license.

I would rate this solution an eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
SH
IT Operations Officer at Kiran International
Real User
A stable system with good technical support

Pros and Cons

  • "We primarily use this solution as an application filter and for IPS."
  • "The inclusion of bandwidth management features would improve this product."

What is our primary use case?

We primarily use this solution as an application filter and for IPS. We have an on-premises deployment.

What is most valuable?

The most valuable feature of this solution is the support.

What needs improvement?

I would like to see the total performance for the users improved.

We have a need for security, so we would like to see more protection against virus attacks and ransomware attacks.

The inclusion of bandwidth management features would improve this product.

I would like to have an API for application development.

For how long have I used the solution?

We have been using this solution for about ten years, with our most recent upgrade three years ago.

What do I think about the stability of the solution?

This solution is one hundred percent stable.

How are customer service and technical support?

We are very satisfied with the technical support for this solution.

How was the initial setup?

The initial setup of this solution is straightforward.

What's my experience with pricing, setup cost, and licensing?

Licensing fees for this solution are $3,500 USD, and there are no additional costs.

What other advice do I have?

This is a good solution that I recommend, but there is room for more features to be included.

I would rate this solution a nine out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
TariqueAshraf
Chief Technology Officer at a tech services company
Real User
A modular and easily managed solution, but throughput capacity is expensive and requires upgrading of hardware

Pros and Cons

  • "The most valuable feature of this solution is its modularity, so whenever you need to upgrade or add another service, you don't need to buy another box."
  • "If there was a software-based solution for scaling up then it would be much better."

What is our primary use case?

We are a system integrator, and we resell this solution to our customers.

This solution is for intrusion prevention, and the majority of deployments are on-premises.

What is most valuable?

The most valuable feature of this solution is its modularity, so whenever you need to upgrade or add another service, you don't need to buy another box. You can activate these services on the same box, which saves a lot in terms of cost because you don't need additional hardware. Moreover, it makes manageability easier because you don't have to use several different devices.

Cisco operates on an open operating system platform so it gives you the flexibility to add other things. Cisco itself is using different manufacturers, or OEM vendors to integrate with their product. For example, Radware is providing a DDoS solution for the NGIPS box.

What needs improvement?

We would like to see support for DDoS protection.

The cost of adding additional throughput is very high and is an area of concern. Competing products such as FortiGate and TippingPoint have a much larger throughput at a smaller cost.

The devices have certain limitations and to go beyond them, I need to change the hardware. For example, if I exceed the throughput on the 2000 series then I have to switch to the 4000 series. This one then has a limitation of perhaps fifty gigabytes, and if I exceed that, then I need to move to the 9000 series. By comparison, TippingPoint and FortiGate have no limit. If there was a software-based solution for scaling up then it would be much better.

For how long have I used the solution?

I have been using this solution for between two and three years.

What do I think about the stability of the solution?

This is a very stable solution. We have not heard any complaints from customers, and we have not experienced any trouble ourselves.

What do I think about the scalability of the solution?

When it comes to scalability, there is a limitation that is set by the hardware. If you're looking for higher throughput then you have to change boxes. The 2000 series is pretty small when it comes to bandwidth, so scalability is a concern.

How are customer service and technical support?

Technical support from Cisco is perfectly fine, and they are doing a great job.

Which solution did I use previously and why did I switch?

Prior to this solution, we used TippingPoint. Although it is a very good solution, there was a problem with the product having too many acquisitions. Every time there was a new acquisition, support was a concern. For example, at one point it was taken over by HP, and then, again, HP disowned it. Support was hampered by this, and if you're not getting support on a critical security appliance then you need to look for other options. This is what led us to adopt Cisco.

How was the initial setup?

The initial setup of this solution is not complex. They have a graphical user interface for managing all of these things, which helps make it easy to deploy.

What's my experience with pricing, setup cost, and licensing?

The price for additional throughput is the highest in the industry.

What other advice do I have?

This is a solution that I recommend for IPS.

I would rate this solution a seven out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PO
Senior Manager, Network Infrastructure at a financial services firm with 5,001-10,000 employees
Real User
The features align to our strategic needs but the maturity cycle takes too long

Pros and Cons

  • "It has aligned the features in accordance to our strategic needs"
  • "The aspect of private party integration solutions could be improved."

What is our primary use case?

I use it for perimeter security for malware prevention.

What is most valuable?

From a cybersecurity past perspective, it has aligned the features in accordance with our strategic needs. 

What needs improvement?

The aspect of private party integration solutions could be improved. I would like to see a sandboxing feature. And the options that people buy in modules, they need to packaged better as a baseline.

For how long have I used the solution?

I've been using the solutions for the last 10 years.

What do I think about the stability of the solution?

Initially, the solution was not stable. 

What do I think about the scalability of the solution?

The system is a bit rigid. We have more than 1,000 people using the solution.

How are customer service and technical support?

Technical support is good but it can be much better.

Which solution did I use previously and why did I switch?

We didn't previously use a different solution.

How was the initial setup?

The initial setup was a bit complex. One had to read so many areas to understand the navigation feature. It took about three years to reach maturity. For deployment, we required about eight people, but for maintenance, we only require four to six.

What about the implementation team?

I had an integrator help implement; they were very professional.

What's my experience with pricing, setup cost, and licensing?

The solution has a high cost. In my opinion, the cost of renewal is a bit too high.

Which other solutions did I evaluate?

We looked at several: Imperva, Check Point, Juniper, Sophos, and SourceNET.

What other advice do I have?

We're using it continuously. We plan to increase usage.

During setup, I would advise that you must spend more time on planning. If you do, the transition is easier.

I would rate this solution 6 out of 10. The time it takes for the product to mature, the maturity journey, the product maturity cycle, takes too long.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
EK
IT Engineer at a tech services company with 11-50 employees
Real User
A scalable solution with good support and a straightforward setup

Pros and Cons

  • "The initial setup wasn't complex or complicated."
  • "More flexibility with the dashboards is needed because some of them are not fully developed."

What is our primary use case?

We use this solution for integration, installing, and supporting.

How has it helped my organization?

Cisco NGIPS dropped network Troyans and web application attac almost every day. That helps up to feel more secure.

What is most valuable?

I find the IPS feature the most valuable.

What needs improvement?

The main problem with Firepower is the time between deployment and configuration. Now, it's approximately six minutes, so If I configure something during deployment, I understand that maybe if I write up a small mistake, I need to wait twelve minutes before I can fix the configuration. So I think the main problem is the time of deployment.

The solution could add DLT, but it's already full enough of features.

The interface could be simpler and more user-friendly. More flexibility with the dashboards is needed because some of them are not fully developed. We could use more flexible base boards.

For how long have I used the solution?

I've been using this solution for one year.

What do I think about the stability of the solution?

For the years we've been using Firepower we have only one or two cases of instability. There were only one or two unpredictable things.

One case was fasten with Active/standby switchover. After switchover some networks has been lost. After rebooting the standby FP next switchover was without problem.

Another case was associated with setting up of NAT. It was a FirePower nuance. Only the second TAC engineer helped us with it.

What do I think about the scalability of the solution?

I find the solution really scalable.

How are customer service and technical support?

I'd give technical support a five out of five. When things need to get solved, they get solved.

Which solution did I use previously and why did I switch?

We used to have ASA 5520. But in time we needed more security features to secure our services and users.

How was the initial setup?

The initial setup wasn't complex or complicated. Everything was clear. The initial configuration took a day, but the company that we support has a very complicated topology. During the deployment, they had a different idea about how the configuration should be. Because the customer didn't know what they wanted, the files and the deployment took approximately three or four months. 

For deployment, it depends on the company. It depends on the company's complicated topology. If it's too complicated, then maybe you need two engineers to support Firepower. For employees, you need only one, with a second as a standby in case something goes wrong with the primary engineer, so I'd say you need two engineers to maintain the solution.

What about the implementation team?

I handled the implementation myself.

Which other solutions did I evaluate?

The company is Cisco oriented and Cisco is a leader in security Gartner Quadrant for Enterprise Network Firewalls.

What other advice do I have?

My advice for anybody implementing this solution is to follow the instructions carefully.

I would rate this solution an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller.
AymenBoumaiza
Senior Consultant at Wevioo
Consultant
Offers valuable web filtering and JPS features and their technical support responds quickly

Pros and Cons

  • "The solution is stable. This is one of the good things in Firepower. Especially if we use ESE with it."
  • "There are some features not found in Firepower, like data loss prevention, and SSO, to have a connection between Cisco and Active Directory which was introduced on other products."

What is most valuable?

I've found the web filter and JPS the most valuable features.

What needs improvement?

There are some features not found in Firepower, like data loss prevention, and SSO, to have a connection between Cisco and Active Directory, which was introduced on other products.

In the future, I'd like the same solution in other UTM solutions. I know it has an application filter, but it's not really improving. Also, DLP needs to prevent data loss. Those two features are really important now for firewalls and for the security. The data loss prevention really is the most asked for feature from the customer. Often they ask about how we can prevent loss of emails, of data, files. It's really important.

For how long have I used the solution?

I've been using the solution since 2014.

What do I think about the stability of the solution?

The solution is stable. This is one of the good things about Firepower. Especially if we use ESE with it. That would make it the complete solution for Cisco for security. If it is the complete solution, it's stable and there are no issues with the product. If the user isn't connected all the time, for example, if we look at some sites or some users, sometimes the connection for the user gets disconnected with each session. Sometimes the filter doesn't work. 

What do I think about the scalability of the solution?

The solution is good to scale.

How are customer service and technical support?

The technical support is really good. Not only for this solution. The support of Cisco is always good. From the first call, the response is quick and there is no problem with the support.

How was the initial setup?

The initial setup is not complex. There is a wizard so it's not complex. There is a difference in the complexity of the deployment. Depending on customers and infrastructure, sometimes it takes one day or two days if we're talking about a little infrastructure. Sometimes it can take eight days or more to couple the firewall with ASA, and to do some more complex architecture. If we have a complex architecture, we need 2 people to implement, but if we have an implementation that is not so complex, one person can do it.

What about the implementation team?

I do the implementation myself.

What was our ROI?

Most of the time the ROI good. The customer, most of the time, is happy and is convinced of the usefulness of the solution.

What other advice do I have?

If someone wants to use Cisco Firepower, the solution is easy. The complete solution is the best for having the full security of a Cisco infrastructure. If I could advise someone with the deployment, I would advise taking the complete solution, in order to have a really scalable and stable solution. Or, if you can't take the complete solution, I'd advise taking a cluster of Firepower to have the scalability and stability.

I would rate this solution a 7 or 8 out of 10. If they could add a few of the mentioned features or do something more with the application filter it would be a 9 or a 10 out of 10.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
AH
Network Infrastructure Program Manager at a non-profit with 1,001-5,000 employees
Real User
Top 20Leaderboard
Offers valuable SSL decryption, URL filtering, and ITSM inspection features

Pros and Cons

  • "Cisco is number one in the technical support. It's good technical support and this is actually a problem when we do the recruitment for some other products. Other products you are on hold forever and the support might be not the best compared to Cisco."
  • "The file trajectory, the trace in contamination files, could be improved."

What is most valuable?

In the previous version, some features were not enabled. For example, you could not access the VPN. So that was one of the downsides of the product. In this latest version, after enabling these features in the previous version and using them, it's been good. Inspection, application, and inspection in the cloud, the detail in the cloud for an indication of compromise and the malicious activity re-hashing are all valuable features. It's more of the cloud and the malicious activities aspects that define this application.

What needs improvement?

The file trajectory could be improved.

We still have a web proxy but I think at some point we should not have two products. We should have only one product. Most of the features of the web proxy already exist in the UTM appliances. We have a debate as to whether it's the Cisco Firepower and UTM Appliance of next-generation firewall. But I consider both of them the same. So I would say if we have the caching and the other features which are unique features to the Web Proxy, I think Cisco will be number one if they are able to include such features in the future.

For how long have I used the solution?

I have been using the solution for three years.

What do I think about the stability of the solution?

It's a really good product but I have had a really good experience with Palo Alto UTM Appliances. Which I would give a higher mark than the Firepower. It's just a little bit more expensive than the Cisco Firepower.

What do I think about the scalability of the solution?

Scalability I would say, it has some limitations in the large deployment. I think Cisco is working to improve it.

How are customer service and technical support?

The technical support is the most valuable part of the solution. Cisco is number one in technical support. It's good technical support and this is actually a problem when we do the recruitment for some other products. Other products you are on hold forever and the support is not as good compared to Cisco. 

Which solution did I use previously and why did I switch?

I started with Juniper and the Palo Alto UTM Appliances, and many other vendors. But we do have a policy to use multiple vendors.

How was the initial setup?

Three years ago the setup was very complex. We had two different cables or software. It's like two appliances and one appliance. We had to set up ASA first and then set up Firepower and do the redirect from the old HTTP traffic, from the ASA for a detailed inspection by Firepower. Initially, it was complex. That was a few years back, but now with the newer version, it's just a piece of cake. Deployment took about 40 minutes. I also handle the maintenance myself.

What about the implementation team?

I do the implementation myself but in certain situations, because we have a risk assessment, it's a sort of risk transfer, so we have a contract with a certain integrator. We do have a contract, but I personally do the setup.

What was our ROI?

We have definitely experienced ROI. Because we have had many incidents where Cisco Firepower has caught malicious activities and triggered an alarm, a true positive alarm. Which is really good in our case.

What other advice do I have?

The solution is extensively used. We have a policy, from a permission security perspective, that you need to have diversity in the vendors and diversity in the products. We have some areas which are using these products and other areas which is using different products.

It's a really good product, but you need to give it some time to form a sort of baseline, before enabling all the features. You need to study the product well because the product will decrease to around 35-40% of the actual product when you start to enable features. Like the application and inspection, the SSL decryption, the URL filtering, and the ITSM inspection. If you enable more features, you will decrease a little bit of the property. Whoever selects the device initially needs to plan which features they are going to use and they might have to shift the sizing of the product. They might need a high-end appliance or a smaller low-end appliance based on the features they are going to use.

I would give the solution 9 out of 10. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
EP
Cyber Engineer at a aerospace/defense firm with 10,001+ employees
Real User
This solution has helped improve productivity and detect attacks before they happen

Pros and Cons

  • "This solution has helped improve productivity and detect attacks before they happen."
  • "I would like to see better integration with SIEMs."

What is our primary use case?

It detects attacks from malicious intrusions and malicious activity before they happen.

How has it helped my organization?

This solution has helped improve productivity and detect attacks before they happen.

What is most valuable?

Signature rules from the Snort community around the world.

What needs improvement?

  • I would like to see better integration with SIEMs. 
  • Better rule building using other tools, like LuaH and Python.
  • Better performance.
  • Better intelligence gathering in domains, the main URLs, and endpoint solutions.

What do I think about the stability of the solution?

It's very reliable. We really like the product and will be staying with the product a while.

What do I think about the scalability of the solution?

At this point in time, it's making it a little bit difficult to scale due to the company, as the vendor is making some changes. We are waiting to see if the product is scalable or not. 

How are customer service and technical support?

Rating the technical support from one to five (where five is high), I would rate them as a two. I find them to be very bad.

Which solution did I use previously and why did I switch?

This was originally a Snort product, which was open source. So, there is a community for it worldwide.

We used ISS from IBM in the past, but it was causing many issues and was dropping packets. It was not an ideal solution, so we moved to Sourcefire FirePower NGIPS.

How was the initial setup?

The initial setup is easy because I am very familiar with the product.

What's my experience with pricing, setup cost, and licensing?

We buy the licensing on a yearly basis, when we renew our contract. It is around $14,000.

Which other solutions did I evaluate?

McAfee and Palo Alto were on our shortlist.

What other advice do I have?

The product is a ten because it is the only product in the market like this.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PH
Security at a government with 1,001-5,000 employees
Real User
Does a great job of detecting and stopping threats

Pros and Cons

  • "It has good intelligence. It does a great job at stopping threats."
  • "In the next release I would like to see better reporting. I also find it's hard to act on the data it gives you."

What is our primary use case?

We use it for threat prevention.

How has it helped my organization?

It has increased our security posture and has contributed substantially to our security maturity by stopping threats.

What is most valuable?

  • It has good intelligence.
  • It does a great job at stopping threats.

What needs improvement?

In the next release I would like to see better reporting. I also find it's hard to act on the data it gives you.

What do I think about the stability of the solution?

The stability is excellent.

What do I think about the scalability of the solution?

The scalability is excellent.

How are customer service and technical support?

Technical support has been excellent.

How was the initial setup?

The initial setup is complex. That's just the nature of that product. It's a really advanced product so it takes a lot of technical knowledge to implement it.

What about the implementation team?

We used a reseller. 

What was our ROI?

We have definitely seen ROI, but I can't quantify it.

What other advice do I have?

Get a good demo to test it out or do a proof of concept to see if it it's what you're looking for.

I rate it an eight out of ten. Eight because it's good at detecting and stopping threats. Those other two points that would make it a ten are better usability and reporting.

Disclosure: I am a real user, and this review is based on my own experience and opinions.