We performed a comparison between Cisco Sourcefire SNORT and Trend Micro Deep Discovery based on real PeerSpot user reviews.
Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature is the visibility that we have across the virtual environment."
"The solution can be integrated with some network electors like Cisco Stealthwatch, Cisco ISE, and Active Directory to provide the client with authentication certificates."
"Solid intrusion detection and prevention that scales easily in very large environments."
"The most valuable features of Cisco Sourcefire SNORT are the dashboard for monitoring events."
"Cisco Sourcefire SNORT is easy to configure and the reporting is great. It's also very user-friendly."
"In general, the features are all great. However, if I need to take hardware for ASA, because they need to upgrade to Firepower, we want to create rules. For that, most of the time we go to the command line. Right now Firepower is working really hard on the grid. You can apply all those rules to the grid. Even if you want to monitor the logs, for example, the activity will tell you which particular user has been blocked because of that rule. Firepower's monitoring interface is very good, because you can see each and every piece. ASA also had it, but there you needed to type the command and be under the server to see all that stuff. In Firepower you have the possibility to go directly to the firewall. The way the monitoring is displayed is also very nice. The feature I appreciate most in Firepower is actually the grid. The grid has worked very well."
"The most valuable feature of this solution is the filtering."
"Cisco technical support is unbeatable. It offers a premium service every time."
"The most valuable feature of Trend Micro Deep Discovery is its complete end-to-end visibility of threats."
"The most valuable feature is that the user can customize images of virtual machines in the sandbox functionality. The other vendors only use images that were created by the vendor but not the customer, end-user or partner. This helps to detect advanced threats and attacks."
"Trend Micro Deep Discovery is a very specific product for threat intelligence with smart protection."
"The product is very easy to install."
"The product's initial setup phase was not difficult."
"Generally speaking, it just gives us a broad understanding of exactly what kind of threats occur. The submission point, analyzing point, and virtualization are within the environment that it supports. It helped us to improve our security levels and protect our internal network from any threats outside."
"The HTML file sandboxing is very good."
"One of the most valuable features is the performance, since, so far, we have not faced any issues with Deep Discovery."
"Performance needs improvement."
"With the next release, I would like to see some PBR, so that you can do the configuration with the features."
"The initial setup is a little difficult compared to other products in the market. It depends on the environment. If we are doing any migration, it might take months in a brown-field environment."
"The implementation could be a bit easier."
"To be frank, the product is not really stable, although they're working on that. Whenever I go to the technical community with an issue, they will usually say that it is not there yet, but the technical team are working on it. The issues are not insolvable. I think they should just keep working on the product to make sure that the product can become very stable. The technical support is great. I appreciate that. We have a lot of communities supporting Firepower now, so you can find help for whatever issue you have."
"I would like to have analytics included in the suite."
"I don't think this solution is a time-based control system, because one cannot filter traffic based on time."
"If the price is brought down then everybody will be happy."
"I would like to see them create a rule where It could integrate with the network and start mitigating with auto-detection."
"This solution could be improved with faster technical support and cheaper licensing prices."
"Trend Micro can improve the pricing in general. There is nothing else they can add or improve in the solution."
"There are certain aspects of flexibility in the policies that should be added to Deep Discovery."
"The scalability is sometimes limited."
"I would like the ability to analyze all files in our internal network, at the same time on different operating systems. Not just three of them, but as many as possible."
"Trend Micro Deep Discovery's technical support could be improved, and it could be made more active."
"I would like to see integration with third-party tools to improve the visibility of the dashboards."
Cisco Sourcefire SNORT is ranked 15th in Intrusion Detection and Prevention Software (IDPS) with 17 reviews while Trend Micro Deep Discovery is ranked 9th in Intrusion Detection and Prevention Software (IDPS) with 21 reviews. Cisco Sourcefire SNORT is rated 7.6, while Trend Micro Deep Discovery is rated 8.4. The top reviewer of Cisco Sourcefire SNORT writes "The solution provides visibility across virtual environments, protects internal networks, and is scalable to meet organizational needs". On the other hand, the top reviewer of Trend Micro Deep Discovery writes "A physical or virtual network appliance designed to quickly detect advanced malware". Cisco Sourcefire SNORT is most compared with Fortinet FortiGate IPS, Cisco NGIPS, Check Point IPS, Palo Alto Networks Advanced Threat Prevention and Darktrace, whereas Trend Micro Deep Discovery is most compared with Darktrace, Trend Micro TippingPoint Threat Protection System, Arista NDR, Vectra AI and Palo Alto Networks Advanced Threat Prevention. See our Cisco Sourcefire SNORT vs. Trend Micro Deep Discovery report.
See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.