Compare Cisco Cognitive Threat Analytics vs. Cisco Sourcefire SNORT

Cisco Cognitive Threat Analytics is ranked 35th in Intrusion Detection and Prevention Software while Cisco Sourcefire SNORT is ranked 10th in Intrusion Detection and Prevention Software with 5 reviews. Cisco Cognitive Threat Analytics is rated 0, while Cisco Sourcefire SNORT is rated 8.4. On the other hand, the top reviewer of Cisco Sourcefire SNORT writes "Enables us to prevent and detect intrusion in our network and actually decrease our SLA". Cisco Cognitive Threat Analytics is most compared with Cisco Stealthwatch, whereas Cisco Sourcefire SNORT is most compared with Cisco Stealthwatch, Fortinet FortiWeb and Darktrace.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Use Cisco Cognitive Threat Analytics? Share your opinion.
Find out what your peers are saying about Cisco, GFI, Darktrace and others in Intrusion Detection and Prevention Software. Updated: October 2019.
371,062 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
Information Not Available
Licensing for this solution is paid on a yearly basis.We have a three-year license for this solution.

Read more »

report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software solutions are best for your needs.
371,062 professionals have used our research since 2012.
Ranking
Views
56
Comparisons
47
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
Views
2,097
Comparisons
1,814
Reviews
3
Average Words per Review
416
Avg. Rating
8.7
Top Comparisons
Compared 13% of the time.
Also Known As
Cognitive Threat Analytics, CTASourcefire SNORT
Learn
Cisco
Cisco
Overview

Cognitive Threat Analytics (CTA) enhances web security with breach detection and analytics to stop threats in the network. Online threats have become increasingly sophisticated, targeted attacks are on the rise, and cybercriminals launch their campaigns through a variety of vectors. They can serve up malvertising and deploy exploit kits that install rootkits. They can establish a botnet presence within your infrastructure. Once cybercriminals establish a foothold, more than 90 percent of their threats use the web. There, they can establish channels for command-and-control communications and exfiltrate sensitive information. Analyzing more than 10 billion web requests daily, Cisco Cognitive Threat Analytics finds malicious activity that has bypassed security controls, or entered through unmonitored channels (including removable media), and is operating inside an organization’s environment. Cognitive Threat Analytics is a cloud-based product that uses machine learning and statistical modeling of networks. It creates a baseline of the traffic in your network and identifies anomalies. It analyzes user and device behavior, and web traffic, to discover command-and-control communications, data exfiltration, and potentially unwanted applications operating in your infrastructure.

Snort is an open-source, rule-based, intrusion detection and prevention system. It combines the benefits of signature-, protocol-, and anomaly-based inspection methods to deliver flexible protection from malware attacks. Snort gained notoriety for being able to accurately detect threats at high speeds.

Offer
Learn more about Cisco Cognitive Threat Analytics
Learn more about Cisco Sourcefire SNORT
Sample Customers
TransplaceCareCore, City of Biel, Dimension Data, LightEdge, Lone Star College System, National Rugby League, Port Aventura, Smart City Networks, Telecom Italia, The Department of Education in Western Australia
Find out what your peers are saying about Cisco, GFI, Darktrace and others in Intrusion Detection and Prevention Software. Updated: October 2019.
371,062 professionals have used our research since 2012.
We monitor all Intrusion Detection and Prevention Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Sign Up with Email