Check Point IPS vs Cisco Sourcefire SNORT comparison

Cancel
You must select at least 2 products to compare!
Check Point Software Technologies Logo
5,477 views|3,840 comparisons
100% willing to recommend
Cisco Logo
1,964 views|1,456 comparisons
94% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point IPS and Cisco Sourcefire SNORT based on real PeerSpot user reviews.

Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Check Point IPS vs. Cisco Sourcefire SNORT Report (Updated: May 2024).
787,033 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It is easy to configure.""The notifications are the most valuable feature of the solution.""There's an automatic update after every 2 hours which makes sure that the database is up to date and providing zero-day vulnerability protection.""Protection in real-time is very good. It helps us detect things on time and make decisions to improve perimeter security.""We are able to define our own rules for detection.""The number of the IPS protections is amazing - after the latest update I see more than 11000 in the SmartConsole.""This is a very stable product.""The Check Point IPS feature I find the most valuable is the firewall. It is great and easy to work with."

More Check Point IPS Pros →

"The solution can be integrated with some network electors like Cisco Stealthwatch, Cisco ISE, and Active Directory to provide the client with authentication certificates.""It is quite an intelligent product.""Solid intrusion detection and prevention that scales easily in very large environments.""The most valuable feature is the ability to automatically learn the traffic in our environment, and change the merit recommendations based on that.""The whole solution is very good, and stable.""The most valuable features of Cisco Sourcefire SNORT are the dashboard for monitoring events.""The most valuable feature is the visibility that we have across the virtual environment.""The solution is stable."

More Cisco Sourcefire SNORT Pros →

Cons
"Check Point IPS' main problem is it is mostly software based. The performance is dependent on the CPU power, and the limited number of patterns.""Setting up Check Point IPS isn't easy, but it's not too complex, either. I rate it seven out of 10 for ease of setup. Generally, customers cannot do it themselves. They need an integrator.""The dashboard reports can be easier to generate and customize.""I observed on our management that sometimes IPS does not connect to the threat cloud, we have to check and improve it. Otherwise, all of the features are good.""The service that we want to see in the future is a capacity to segment the IPS services by equipment.""The hardware-based version of Check Point IPS could be more scalable. Right now, it's not scalable.""There is an issue with precision.""Sometimes protections are 'aggregated' into a single threat name when you look at the logs. I would prefer to see all protections named individually (for example, right now, 'web enforcement' is a category that contains several signatures)."

More Check Point IPS Cons →

"The customization of the rules can be simplified.""I would like to have analytics included in the suite.""The initial setup is a little difficult compared to other products in the market. It depends on the environment. If we are doing any migration, it might take months in a brown-field environment.""If the price is brought down then everybody will be happy.""With the next release, I would like to see some PBR, so that you can do the configuration with the features.""Performance needs improvement.""To be frank, the product is not really stable, although they're working on that. Whenever I go to the technical community with an issue, they will usually say that it is not there yet, but the technical team are working on it. The issues are not insolvable. I think they should just keep working on the product to make sure that the product can become very stable. The technical support is great. I appreciate that. We have a lot of communities supporting Firepower now, so you can find help for whatever issue you have.""The pricing needs to be improved. We have lots of low-budget clients around us. Budget constraints are always a deterrent in our market."

More Cisco Sourcefire SNORT Cons →

Pricing and Cost Advice
  • "I think that the price of support is around $40,000 USD or $50,000 USD per year."
  • "The price of this product should be reduced."
  • "Enabling IPS does not require any additional license purchase from OEM, as it comes by default with the NGFW bundle."
  • "The pricing for Check Point IPS is competitive and brings good value for the money."
  • "The module has a considerable cost but you can save by purchasing a package with several modules instead of making a single purchase."
  • "Pricing for this solution is negotiable and I'm happy with our pricing."
  • "There is a license needed to use the Check Point IPS which is not expensive. However, the Check Point IPS device is expensive."
  • "You can pay for Check Point IPS yearly, or you can go with a three-year license. There's no extra cost apart from the standard licensing fee."
  • More Check Point IPS Pricing and Cost Advice →

  • "We have a three-year license for this solution."
  • "Licensing for this solution is paid on a yearly basis."
  • "I don't know the exact amount, but most of the time when I go to a company with a proposition, they will say, "This thing that you are selling is good, but it's expensive. Why don't you propose something like FortiGate, Check Point, or Palo Alto?" Cisco device are expensive compared to other devices."
  • "The cost is per port and can be expensive but it does include training and support for three years."
  • More Cisco Sourcefire SNORT Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
    787,033 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable feature of the solution is called tunneling. Tunneling is one of the major security features that hackers cannot penetrate through.
    Top Answer:I rate the product price an eight on a scale of one to ten, where one means it is very cheap and ten means it is very expensive. The product is expensive.
    Top Answer:The area with certain shortcomings where improvements are required consist of support availability. The tool's complete operating system architecture is being designed in such a way that it looks a… more »
    Top Answer:The product is inexpensive compared to leading brands such as Palo Alto or Fortinet.
    Top Answer:The product is inexpensive compared to leading brands such as Palo Alto or Fortinet. It is cheaper than Palo Alto and comparable to Fortinet. It also depends on Cisco’s discount. Sometimes it's… more »
    Top Answer:The solution has some stability issues. Also, it's complicated compared to other products like FortiGate.
    Ranking
    Views
    5,477
    Comparisons
    3,840
    Reviews
    27
    Average Words per Review
    432
    Rating
    8.4
    Views
    1,964
    Comparisons
    1,456
    Reviews
    6
    Average Words per Review
    472
    Rating
    8.0
    Comparisons
    Also Known As
    Check Point Intrusion Prevention System
    Sourcefire SNORT
    Learn More
    Overview

    Check Point IPS is an intrusion prevention system that aims to detect and prevent attempts to exploit weaknesses in vulnerable systems or applications. The solution provides complete, integrated, next-generation firewall intrusion prevention capabilities at multi-gigabit speeds with a low false positive rate and high security. It helps organizations secure their enterprise network, and protect servers and critical data against known and unknown automated malware, blended threats, and other threats.

    Check Point IPS Features

    Check Point IPS has many valuable key features. Some of the most useful ones include:

    • Real-time protections: IPS is constantly updated with new defenses against emerging threats. Because the solution’s IPS protections are pre-emptive, it provides organizations with defenses before exploits are created or vulnerabilities are even discovered.
    • Virtual patching: The solution combines robust IPS functionality with a concerted patching strategy, allowing network administrators to secure networks between upgrades and patches.
    • Flexible deployment: Check Point IPS was designed to be deployed easily and efficiently.
    • 360 visibility and reporting: To help users achieve an unmatched level of visibility that detects and prevents threats, Check Point IPS integrates with SmartEvent, enabling security operations center (SOC) staff to respond to high-priority events first.

    Check Point IPS Benefits

    There are many benefits to implementing Check Point IPS. Some of the biggest advantages the solution offers include:

    • Efficient: Check Point IPS includes acceleration technologies that let you safely enable IPS. Additionally, its low false positive rate can save a lot of time.
    • Secure: The solution delivers thousands of signature and behavioral preemptive protections, making it a very secure tool.
    • Unified: With Check Point IPS, users can Enable IPS on any Check Point security gateway, thereby reducing Total Cost of Ownership (TCO).

    Reviews from Real Users

    Check Point IPS is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it has granularity capabilities for rule creation, quick updates of signatures, and a helpful mechanism that allows users to turn IPS signatures to a different mode automatically.

    A System and Network Administrator at Auriga mentions, “The Check Point IPS module allows me granularity in creating rules. I can specify which definition to apply and to which scope or network.” The reviewer also adds, “I can create multiple profiles, which is helpful.”

    “The quick updates of the signatures when a new threat is identified are great. For instance, when Microsoft releases patches, we usually see new signatures for those issues that have to be patched in a day. This gives us time to test/deploy the patches while already being protected from the threats. Also, it's very good with reporting. I can generate reports for management automatically based on the threats of the last day/week/whatever is needed,” says a Systems en networks engineer at CB.

    Another PeerSpot user, a Network Engineer at VSP Vision Care, writes, “The mechanism where you can let the system automatically turn the IPS signature to a different mode (prevent / monitor / inactive) is a nice feature that allows us to easily adjust the balance between security protection and the risk of business impact.”

    Snort is an open-source, rule-based, intrusion detection and prevention system. It combines the benefits of signature-, protocol-, and anomaly-based inspection methods to deliver flexible protection from malware attacks. Snort gained notoriety for being able to accurately detect threats at high speeds.

    Sample Customers
    Morton Salt, Medical Advocacy and Outreach, BH Telecom, Lightbeam Health Solutions, X by Orange, Cadence, Nihondentsu, Datastream Connexion, Good Sam, Omnyway, FIASA, Pacific Life, Banco del Pacifico, Control Southern, Xero, Centrify
    CareCore, City of Biel, Dimension Data, LightEdge, Lone Star College System, National Rugby League, Port Aventura, Smart City Networks, Telecom Italia, The Department of Education in Western Australia
    Top Industries
    REVIEWERS
    Security Firm20%
    Computer Software Company15%
    Financial Services Firm12%
    Government10%
    VISITORS READING REVIEWS
    Computer Software Company16%
    Financial Services Firm8%
    Comms Service Provider8%
    Government7%
    REVIEWERS
    Computer Software Company27%
    Financial Services Firm18%
    Comms Service Provider18%
    Government9%
    VISITORS READING REVIEWS
    Computer Software Company20%
    Government9%
    Financial Services Firm8%
    Comms Service Provider7%
    Company Size
    REVIEWERS
    Small Business43%
    Midsize Enterprise25%
    Large Enterprise33%
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise19%
    Large Enterprise54%
    REVIEWERS
    Small Business22%
    Midsize Enterprise39%
    Large Enterprise39%
    VISITORS READING REVIEWS
    Small Business26%
    Midsize Enterprise13%
    Large Enterprise62%
    Buyer's Guide
    Check Point IPS vs. Cisco Sourcefire SNORT
    May 2024
    Find out what your peers are saying about Check Point IPS vs. Cisco Sourcefire SNORT and other solutions. Updated: May 2024.
    787,033 professionals have used our research since 2012.

    Check Point IPS is ranked 3rd in Intrusion Detection and Prevention Software (IDPS) with 46 reviews while Cisco Sourcefire SNORT is ranked 11th in Intrusion Detection and Prevention Software (IDPS) with 18 reviews. Check Point IPS is rated 8.6, while Cisco Sourcefire SNORT is rated 7.6. The top reviewer of Check Point IPS writes "Great for detection and access with the capabilities of defining specific rules". On the other hand, the top reviewer of Cisco Sourcefire SNORT writes "An IPS solution for security and protection but lacks stability". Check Point IPS is most compared with Darktrace, Palo Alto Networks URL Filtering with PAN-DB, Palo Alto Networks Advanced Threat Prevention, Trend Micro TippingPoint Threat Protection System and Vectra AI, whereas Cisco Sourcefire SNORT is most compared with Fortinet FortiGate IPS, Cisco NGIPS, Palo Alto Networks Advanced Threat Prevention, Darktrace and Vectra AI. See our Check Point IPS vs. Cisco Sourcefire SNORT report.

    See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.

    We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.