Compare Cisco Cognitive Threat Analytics vs. Kerio Control

Cisco Cognitive Threat Analytics is ranked 35th in Intrusion Detection and Prevention Software while Kerio Control is ranked 2nd in Intrusion Detection and Prevention Software with 11 reviews. Cisco Cognitive Threat Analytics is rated 0, while Kerio Control is rated 8.2. On the other hand, the top reviewer of Kerio Control writes "Provides users with the ability to log in to the portal page, keep track of their data usage and perform bandwidth management". Cisco Cognitive Threat Analytics is most compared with Cisco Stealthwatch, whereas Kerio Control is most compared with pfSense, Fortinet FortiGate and Sophos UTM.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Use Cisco Cognitive Threat Analytics? Share your opinion.
Find out what your peers are saying about Cisco, GFI, Darktrace and others in Intrusion Detection and Prevention Software. Updated: October 2019.
370,827 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
Information Not Available
My advice is to use your own hardware, and do not use theirs.There is a yearly upkeep fee.The pricing is in-line with our expectations in terms of the quality that we get for it.It's very affordable.The price is inexpensive.Pricing is good, but the licensing took a lot of time.Search and compare.

Read more »

report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software solutions are best for your needs.
370,827 professionals have used our research since 2012.
Ranking
Views
56
Comparisons
47
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
Views
12,521
Comparisons
8,960
Reviews
11
Average Words per Review
384
Avg. Rating
8.3
Top Comparisons
Compared 40% of the time.
Compared 15% of the time.
Compared 12% of the time.
Also Known As
Cognitive Threat Analytics, CTA
Learn
Cisco
GFI
Overview

Cognitive Threat Analytics (CTA) enhances web security with breach detection and analytics to stop threats in the network. Online threats have become increasingly sophisticated, targeted attacks are on the rise, and cybercriminals launch their campaigns through a variety of vectors. They can serve up malvertising and deploy exploit kits that install rootkits. They can establish a botnet presence within your infrastructure. Once cybercriminals establish a foothold, more than 90 percent of their threats use the web. There, they can establish channels for command-and-control communications and exfiltrate sensitive information. Analyzing more than 10 billion web requests daily, Cisco Cognitive Threat Analytics finds malicious activity that has bypassed security controls, or entered through unmonitored channels (including removable media), and is operating inside an organization’s environment. Cognitive Threat Analytics is a cloud-based product that uses machine learning and statistical modeling of networks. It creates a baseline of the traffic in your network and identifies anomalies. It analyzes user and device behavior, and web traffic, to discover command-and-control communications, data exfiltration, and potentially unwanted applications operating in your infrastructure.

Kerio Control brings together next-generation firewall capabilities -- including a network firewall and router, intrusion detection and prevention (IPS), gateway anti-virus, VPN, and web content and application filtering. These comprehensive capabilities and unmatched deployment flexibility make Kerio Control the ideal choice for small and mid-sized businesses.

Offer
Learn more about Cisco Cognitive Threat Analytics
Learn more about Kerio Control
Sample Customers
TransplaceTriton Technical, McDonald's
Top Industries
No Data Available
VISITORS READING REVIEWS
Comms Service Provider26%
Healthcare Company16%
Software R&D Company14%
Media Company10%
Find out what your peers are saying about Cisco, GFI, Darktrace and others in Intrusion Detection and Prevention Software. Updated: October 2019.
370,827 professionals have used our research since 2012.
We monitor all Intrusion Detection and Prevention Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Sign Up with Email