Most Helpful Review
The integration between Nmap, the database and Metasploit saves a lot of time. The initial setup was a bit tricky.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
I like most of Cisco's features, like malware detection and URL filtering.
The most valuable feature of this solution is the filtering.
The solution can be integrated with some network electors like Cisco Stealthwatch, Cisco ISE, and Active Directory to provide the client with authentication certificates.
The whole solution is very good, and stable.
Cisco technical support is unbeatable. It offers a premium service every time.
Solid intrusion detection and prevention that scales easily in very large environments.
The option to generate phishing emails has proven to be very valuable in understanding the behavior of users.
It contains almost all the available exploits and payloads.
It's not possible to do penetration testing without being very proficient in Metasploit.
I don't think this solution is a time-based control system, because one cannot filter traffic based on time.
If the price is brought down then everybody will be happy.
With the next release, I would like to see some PBR, so that you can do the configuration with the features.
The customization of the rules can be simplified.
The pricing needs to be improved. We have lots of low-budget clients around us. Budget constraints are always a deterrent in our market.
Integration with other components — even Cisco's own products — can be enhanced to improve administrative experience.
Metasploit cannot be installed on a machine with an antivirus.
It is necessary to add some training materials and a tutorial for beginners.
The initial setup was a bit "tweaky" for the open-source version.
Pricing and Cost Advice
Licensing for this solution is paid on a yearly basis.
We have a three-year license for this solution.
It is expensive. Our license expired, and our company is not thinking to renew because of our budget.
I use the open-source version of this product. Pricing is not relevant.
out of 45 in Intrusion Detection and Prevention Software
Average Words per Review
out of 33 in Vulnerability Management
Average Words per Review
Compared 17% of the time.
Compared 15% of the time.
Compared 13% of the time.
Compared 62% of the time.
Compared 11% of the time.
Compared 7% of the time.
Also Known As
Snort is an open-source, rule-based, intrusion detection and prevention system. It combines the benefits of signature-, protocol-, and anomaly-based inspection methods to deliver flexible protection from malware attacks. Snort gained notoriety for being able to accurately detect threats at high speeds.
Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilizing an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.
Learn more about Cisco Sourcefire SNORT
Learn more about Rapid7 Metasploit
|CareCore, City of Biel, Dimension Data, LightEdge, Lone Star College System, National Rugby League, Port Aventura, Smart City Networks, Telecom Italia, The Department of Education in Western Australia||City of Corpus Christi, Diebold, Lumenate, Nebraska Public Power District, Prairie North Regional Health, Apptio, Automation Direct, Bob's Stores, Cardinal Innovations Healthcare Solutions, Carnegie Mellon University|
No Data Available
Software R&D Company24%
Comms Service Provider22%
See also Cisco Sourcefire SNORT Reviews, Rapid7 Metasploit Reviews, and our list of Best Intrusion Detection and Prevention Software Companies.