Check Point IPS vs Cisco Sourcefire SNORT comparison

Cancel
You must select at least 2 products to compare!
Check Point Software Technologies Logo
5,638 views|3,950 comparisons
100% willing to recommend
Cisco Logo
2,043 views|1,518 comparisons
94% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point IPS and Cisco Sourcefire SNORT based on real PeerSpot user reviews.

Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Check Point IPS vs. Cisco Sourcefire SNORT Report (Updated: May 2024).
771,170 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The reports are useful in helping to verify the threats where we can see the level of severity in order to be able to take action.""Protection in real-time is very good. It helps us detect things on time and make decisions to improve perimeter security.""Its event analysis and centralization features are very important for any organization.""User-friendly and easy to implement.""What I like best about Check Point IPS is that it can prevent attacks. I also like that it has a log feature.""Real-time protection has blocked most threats that could affect system operations.""The tool's most valuable feature is its detection panel. Managing and updating policies within Check Point IPS is easy and without issues. It provides a secure network.""We are able to define our own rules for detection."

More Check Point IPS Pros →

"I like most of Cisco's features, like malware detection and URL filtering.""Solid intrusion detection and prevention that scales easily in very large environments.""The most valuable feature is the visibility that we have across the virtual environment.""It is quite an intelligent product.""In general, the features are all great. However, if I need to take hardware for ASA, because they need to upgrade to Firepower, we want to create rules. For that, most of the time we go to the command line. Right now Firepower is working really hard on the grid. You can apply all those rules to the grid. Even if you want to monitor the logs, for example, the activity will tell you which particular user has been blocked because of that rule. Firepower's monitoring interface is very good, because you can see each and every piece. ASA also had it, but there you needed to type the command and be under the server to see all that stuff. In Firepower you have the possibility to go directly to the firewall. The way the monitoring is displayed is also very nice. The feature I appreciate most in Firepower is actually the grid. The grid has worked very well.""The solution is stable.""It simplifies the configuration process by offering pre-defined base configurations, including security and connectivity settings.""The most valuable feature of this solution is the filtering."

More Cisco Sourcefire SNORT Pros →

Cons
"Sometimes protections are 'aggregated' into a single threat name when you look at the logs. I would prefer to see all protections named individually (for example, right now, 'web enforcement' is a category that contains several signatures).""The solution’s deployment could be easier.""After the R80 release, there are almost all feature sets available under IPS Configuration. However, further to this, adding a direct vulnerability scan based on ports and protocol for every zone (LAN, DMZ, or Outside) will make Check Point very different compared to other vendors on the market.""The hardware-based version of Check Point IPS could be more scalable. Right now, it's not scalable.""Check Point IPS' main problem is it is mostly software based. The performance is dependent on the CPU power, and the limited number of patterns.""Having additional reports available would be helpful.""The cost is a bit high but it is worth it.""The cost is high."

More Check Point IPS Cons →

"Integration with other components — even Cisco's own products — can be enhanced to improve administrative experience.""I did not experience any pain points that required improvement. Maybe a couple of false-positives, but that's about it.""The customization of the rules can be simplified.""I don't think this solution is a time-based control system, because one cannot filter traffic based on time.""The main dashboard of Cisco Sourcefire SNORT could improve.""We are unhappy with technical support for this solution, and it is not as professional as what we typically expect from Cisco.""Performance needs improvement.""The implementation could be a bit easier."

More Cisco Sourcefire SNORT Cons →

Pricing and Cost Advice
  • "I think that the price of support is around $40,000 USD or $50,000 USD per year."
  • "The price of this product should be reduced."
  • "Enabling IPS does not require any additional license purchase from OEM, as it comes by default with the NGFW bundle."
  • "The pricing for Check Point IPS is competitive and brings good value for the money."
  • "The module has a considerable cost but you can save by purchasing a package with several modules instead of making a single purchase."
  • "Pricing for this solution is negotiable and I'm happy with our pricing."
  • "There is a license needed to use the Check Point IPS which is not expensive. However, the Check Point IPS device is expensive."
  • "You can pay for Check Point IPS yearly, or you can go with a three-year license. There's no extra cost apart from the standard licensing fee."
  • More Check Point IPS Pricing and Cost Advice →

  • "We have a three-year license for this solution."
  • "Licensing for this solution is paid on a yearly basis."
  • "I don't know the exact amount, but most of the time when I go to a company with a proposition, they will say, "This thing that you are selling is good, but it's expensive. Why don't you propose something like FortiGate, Check Point, or Palo Alto?" Cisco device are expensive compared to other devices."
  • "The cost is per port and can be expensive but it does include training and support for three years."
  • More Cisco Sourcefire SNORT Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
    771,170 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The tool's most valuable feature is its detection panel. Managing and updating policies within Check Point IPS is easy and without issues. It provides a secure network.
    Top Answer:The tool's licensing model is good. The licensing costs are yearly. I rate it an eight out of ten.
    Top Answer:The product is inexpensive compared to leading brands such as Palo Alto or Fortinet.
    Top Answer:The product is inexpensive compared to leading brands such as Palo Alto or Fortinet. It is cheaper than Palo Alto and comparable to Fortinet. It also depends on Cisco’s discount. Sometimes it's… more »
    Top Answer:The solution has some stability issues. Also, it's complicated compared to other products like FortiGate.
    Ranking
    Views
    5,638
    Comparisons
    3,950
    Reviews
    28
    Average Words per Review
    426
    Rating
    8.5
    Views
    2,043
    Comparisons
    1,518
    Reviews
    6
    Average Words per Review
    472
    Rating
    8.0
    Comparisons
    Also Known As
    Check Point Intrusion Prevention System
    Sourcefire SNORT
    Learn More
    Overview

    Check Point IPS is an intrusion prevention system that aims to detect and prevent attempts to exploit weaknesses in vulnerable systems or applications. The solution provides complete, integrated, next-generation firewall intrusion prevention capabilities at multi-gigabit speeds with a low false positive rate and high security. It helps organizations secure their enterprise network, and protect servers and critical data against known and unknown automated malware, blended threats, and other threats.

    Check Point IPS Features

    Check Point IPS has many valuable key features. Some of the most useful ones include:

    • Real-time protections: IPS is constantly updated with new defenses against emerging threats. Because the solution’s IPS protections are pre-emptive, it provides organizations with defenses before exploits are created or vulnerabilities are even discovered.
    • Virtual patching: The solution combines robust IPS functionality with a concerted patching strategy, allowing network administrators to secure networks between upgrades and patches.
    • Flexible deployment: Check Point IPS was designed to be deployed easily and efficiently.
    • 360 visibility and reporting: To help users achieve an unmatched level of visibility that detects and prevents threats, Check Point IPS integrates with SmartEvent, enabling security operations center (SOC) staff to respond to high-priority events first.

    Check Point IPS Benefits

    There are many benefits to implementing Check Point IPS. Some of the biggest advantages the solution offers include:

    • Efficient: Check Point IPS includes acceleration technologies that let you safely enable IPS. Additionally, its low false positive rate can save a lot of time.
    • Secure: The solution delivers thousands of signature and behavioral preemptive protections, making it a very secure tool.
    • Unified: With Check Point IPS, users can Enable IPS on any Check Point security gateway, thereby reducing Total Cost of Ownership (TCO).

    Reviews from Real Users

    Check Point IPS is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it has granularity capabilities for rule creation, quick updates of signatures, and a helpful mechanism that allows users to turn IPS signatures to a different mode automatically.

    A System and Network Administrator at Auriga mentions, “The Check Point IPS module allows me granularity in creating rules. I can specify which definition to apply and to which scope or network.” The reviewer also adds, “I can create multiple profiles, which is helpful.”

    “The quick updates of the signatures when a new threat is identified are great. For instance, when Microsoft releases patches, we usually see new signatures for those issues that have to be patched in a day. This gives us time to test/deploy the patches while already being protected from the threats. Also, it's very good with reporting. I can generate reports for management automatically based on the threats of the last day/week/whatever is needed,” says a Systems en networks engineer at CB.

    Another PeerSpot user, a Network Engineer at VSP Vision Care, writes, “The mechanism where you can let the system automatically turn the IPS signature to a different mode (prevent / monitor / inactive) is a nice feature that allows us to easily adjust the balance between security protection and the risk of business impact.”

    Snort is an open-source, rule-based, intrusion detection and prevention system. It combines the benefits of signature-, protocol-, and anomaly-based inspection methods to deliver flexible protection from malware attacks. Snort gained notoriety for being able to accurately detect threats at high speeds.

    Sample Customers
    Morton Salt, Medical Advocacy and Outreach, BH Telecom, Lightbeam Health Solutions, X by Orange, Cadence, Nihondentsu, Datastream Connexion, Good Sam, Omnyway, FIASA, Pacific Life, Banco del Pacifico, Control Southern, Xero, Centrify
    CareCore, City of Biel, Dimension Data, LightEdge, Lone Star College System, National Rugby League, Port Aventura, Smart City Networks, Telecom Italia, The Department of Education in Western Australia
    Top Industries
    REVIEWERS
    Security Firm21%
    Computer Software Company15%
    Financial Services Firm13%
    Government10%
    VISITORS READING REVIEWS
    Computer Software Company16%
    Comms Service Provider9%
    Financial Services Firm8%
    Security Firm7%
    REVIEWERS
    Computer Software Company27%
    Financial Services Firm18%
    Comms Service Provider18%
    Government9%
    VISITORS READING REVIEWS
    Computer Software Company19%
    Government9%
    Financial Services Firm8%
    Comms Service Provider7%
    Company Size
    REVIEWERS
    Small Business43%
    Midsize Enterprise25%
    Large Enterprise32%
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise18%
    Large Enterprise54%
    REVIEWERS
    Small Business22%
    Midsize Enterprise39%
    Large Enterprise39%
    VISITORS READING REVIEWS
    Small Business25%
    Midsize Enterprise13%
    Large Enterprise62%
    Buyer's Guide
    Check Point IPS vs. Cisco Sourcefire SNORT
    May 2024
    Find out what your peers are saying about Check Point IPS vs. Cisco Sourcefire SNORT and other solutions. Updated: May 2024.
    771,170 professionals have used our research since 2012.

    Check Point IPS is ranked 3rd in Intrusion Detection and Prevention Software (IDPS) with 46 reviews while Cisco Sourcefire SNORT is ranked 12th in Intrusion Detection and Prevention Software (IDPS) with 18 reviews. Check Point IPS is rated 8.6, while Cisco Sourcefire SNORT is rated 7.6. The top reviewer of Check Point IPS writes "Great for detection and access with the capabilities of defining specific rules". On the other hand, the top reviewer of Cisco Sourcefire SNORT writes "An IPS solution for security and protection but lacks stability". Check Point IPS is most compared with Darktrace, Palo Alto Networks URL Filtering with PAN-DB, Palo Alto Networks Advanced Threat Prevention, Trend Micro TippingPoint Threat Protection System and Vectra AI, whereas Cisco Sourcefire SNORT is most compared with Fortinet FortiGate IPS, Cisco NGIPS, Palo Alto Networks Advanced Threat Prevention, Darktrace and Vectra AI. See our Check Point IPS vs. Cisco Sourcefire SNORT report.

    See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.

    We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.