Find out what your peers are saying about Darktrace, Check Point Software Technologies, Fortinet and others in Intrusion Detection and Prevention Software (IDPS).
Cisco Secure IPS (NGIPS) provides intrusion prevention, malware detection, and DDoS protection with modularity, third-party integration, and cloud capabilities, focusing on flexibility, automation, and real-time threat detection, while offering centralized management and ease of upgrading.
Cisco Secure IPS (NGIPS) is designed to support network security through an open platform, delivering features such as anomaly detection and security intelligence. Users benefit from robust technical support, making it a reliable choice for enterprises seeking to protect their network infrastructures. However, improvements are needed in user-friendliness, interface complexity, and integration with third-party tools. There is a demand for better reporting, sandboxing capabilities, and enhanced AI-driven threat detection and response times, especially for zero-day attacks. Pricing remains a concern due to high costs and licensing complexity.
What are the key features of Cisco Secure IPS?Businesses deploy Cisco Secure IPS (NGIPS) in both on-premises and cloud environments, addressing needs like compliance audits and integration with platforms such as Cisco Talos and Umbrella. Its implementation strengthens perimeter security, enhances cybersecurity in enterprise and banking sectors, and ensures effective threat management for network defense.
Our unique technology detects the most advanced threats, made with the most crafted exploitation methods (polymorphism, obfuscation, encoding, ROPchain…) and the threats based on all types of malicious files (ransomware, cryptolocker…).
Trackwatch® can be deployed from two types of devices: GCAP and GCENTER.
GCAP ensures the collection of network traffic flows and a portion of the anlyses. A GCAP is connected to a switch with a mirror port or to a TAP that copies the network traffic. One or more GCAPs can be deployed within an infrastructure, either locally or at remote sites. The GCAP(s) are connected to a GCENTER management device.
The GCENTER nalyses the information sent back by the GCAP, stores it, provides configuration and reporting interfaces, and exports the information to a security information and event management (SIEM).
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.