Try our new research platform with insights from 80,000+ expert users

Cisco Sourcefire SNORT vs Palo Alto Networks Advanced Threat Prevention comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 19, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Sourcefire SNORT
Ranking in Intrusion Detection and Prevention Software (IDPS)
14th
Average Rating
7.8
Reviews Sentiment
6.8
Number of Reviews
20
Ranking in other categories
No ranking in other categories
Palo Alto Networks Advanced...
Ranking in Intrusion Detection and Prevention Software (IDPS)
7th
Average Rating
8.4
Reviews Sentiment
6.6
Number of Reviews
29
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2026, in the Intrusion Detection and Prevention Software (IDPS) category, the mindshare of Cisco Sourcefire SNORT is 3.1%, up from 2.2% compared to the previous year. The mindshare of Palo Alto Networks Advanced Threat Prevention is 5.1%, down from 5.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Intrusion Detection and Prevention Software (IDPS) Mindshare Distribution
ProductMindshare (%)
Palo Alto Networks Advanced Threat Prevention5.1%
Cisco Sourcefire SNORT3.1%
Other91.8%
Intrusion Detection and Prevention Software (IDPS)
 

Featured Reviews

reviewer2772102 - PeerSpot reviewer
Cloud Architect at a consultancy with 1-10 employees
Logging and customizable rules have helped improve threat monitoring and detection
The logging is mainly what I consider one of the best features with Cisco Sourcefire SNORT. Being able to log and store it in a file allows you to push it to a centralized repository. The logging and reporting help improve incident response. You should always be logging threats, any sort of misconfiguration, and anything that could be an issue. It's important to at least log and monitor it. The basic rules provide a good baseline in assessing Cisco Sourcefire SNORT's ability in providing real-time analytics for threat detection, but as a professional, you should look to constantly modify that baseline. They provide extensive customizability so you can define your own rules. The customizability allows it to be adaptable in protecting against diverse network threats to the constant change.
Partha Dash - PeerSpot reviewer
Global Network Tech Lead at a tech vendor with 10,001+ employees
Advanced protection enables us to confidently secure against evolving threats
Palo Alto Networks can improve Advanced Threat Prevention by catering to the growing adoption of AI and agentic tooling. The Threat Protection modules should have the necessary intelligence to protect against those types of threats, as AI will be there to do a human job; this is an evolving area. From an Advanced Threat Protection perspective, the technology associated with Palo Alto Networks, such as their sandboxing environment, is quite good. However, Palo Alto needs to focus on how to bring that technology to end users and how easy it is to use, especially in a hybrid environment where users work from various locations. While Palo Alto excels in certain setups, they need to improve the user experience in distributed working conditions.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"In general, the features are all great. However, if I need to take hardware for ASA, because they need to upgrade to Firepower, we want to create rules. For that, most of the time we go to the command line. Right now Firepower is working really hard on the grid. You can apply all those rules to the grid. Even if you want to monitor the logs, for example, the activity will tell you which particular user has been blocked because of that rule. Firepower's monitoring interface is very good, because you can see each and every piece. ASA also had it, but there you needed to type the command and be under the server to see all that stuff. In Firepower you have the possibility to go directly to the firewall. The way the monitoring is displayed is also very nice. The feature I appreciate most in Firepower is actually the grid. The grid has worked very well."
"The solution is stable."
"The whole solution is very good, and stable."
"With Cisco Sourcefire SNORT, we've been able to prevent and detect intrusion in our network and actually decrease our SLA (Service Level Agreement)."
"The product is inexpensive compared to leading brands such as Palo Alto or Fortinet."
"Solid intrusion detection and prevention that scales easily in very large environments."
"The solution can be integrated with some network electors like Cisco Stealthwatch, Cisco ISE, and Active Directory to provide the client with authentication certificates."
"The most valuable features of Cisco Sourcefire SNORT are the dashboard for monitoring events."
"Palo Alto Networks Advanced Threat Prevention provides protections against both known and unknown threats quickly, and they have great Cyber Threat Alliance integration, which allows anything that is even unknown to get to our systems quickly in terms of being patched."
"Edge protection is a valuable feature."
"We are currently using the URL filtering feature, which is the most popular."
"What is nice about Palo Alto is that even if you don't understand how to use it, you can just click on upload and upload everything that needs to be blocked."
"It is a stable product."
"For those who want a next-gen firewall that's easy to configure and easy to operate, I think you should go for Palo Alto."
"They're cutting edge."
"The stability of Palo Alto Networks Threat Prevention is good."
 

Cons

"The cloud can be improved."
"There are problems setting up VPNs for some regions."
"Integration with other components — even Cisco's own products — can be enhanced to improve administrative experience."
"I want to see a better dashboard for the product. The dashboard can be a bit modified or enhanced."
"I don't think this solution is a time-based control system, because one cannot filter traffic based on time."
"While the alerts they offer are good, it could improve it in the sense that they should be more detailed to make the alerts more useful to us in general. Sometimes the solution will offer up false positives. Due to the fact that the alerts aren't detailed, we have to go dig around to see why is it being blocked. The solution would be infinitely better if there was just a bit more detail in the alert information and logging we receive."
"The customization of the rules can be simplified."
"The implementation could be a bit easier."
"The initial setup was very complex as the solution does not have these APIs to facilitate the configuration."
"Sometimes when you want to group a set of ports, and communicate with Palo Alto, you cannot group TCP and UDP ports together. This needs to be adjusted."
"The behavioral detection capabilities could be expanded to address all threats at the perimeter, reducing the reliance on endpoint detection and response systems."
"The organization mail security solutions could be improved. There is no mail security solution available."
"We are attempting to improve the use of URL filtering beyond threat protection."
"There is a potential drawback with the lack of support for the ICAP protocol."
"The solution needs to improve its local technical support services. There is no premium support offered in our market."
"The cost involves the price of the hardware, which is expensive. However, most of the Palo Alto solutions are expensive."
 

Pricing and Cost Advice

"The cost is per port and can be expensive but it does include training and support for three years."
"If one is an extremely expensive product, and ten is cheap, I rate the tool's price as a five."
"I don't know the exact amount, but most of the time when I go to a company with a proposition, they will say, "This thing that you are selling is good, but it's expensive. Why don't you propose something like FortiGate, Check Point, or Palo Alto?" Cisco device are expensive compared to other devices."
"Licensing for this solution is paid on a yearly basis."
"We have a three-year license for this solution."
"The price of the solution is higher than others on the market. A price reduction would be beneficial if it does not impact their database quality."
"It's not too expensive."
"Palo Alto Networks Threat Prevention could improve by having consistent pricing at system levels."
"There is an initial, expensive investment but the return is good."
"The pricing has improved with the newer generation of their Firewalls, but the price could always be lower."
"The cost involves the price of the hardware, which is expensive. However, most of the Palo Alto solutions are expensive."
"The pricing and the licensing are pretty competitive at this stage. As a reseller, I would like to see the price come down a little bit so I can compete better against other firewalls because we do that all the time."
"The product’s pricing is expensive for small companies."
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
885,264 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
University
11%
Comms Service Provider
9%
Financial Services Firm
8%
Computer Software Company
7%
Financial Services Firm
10%
Computer Software Company
8%
Performing Arts
8%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise8
Large Enterprise7
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise4
Large Enterprise14
 

Questions from the Community

What do you like most about Cisco Sourcefire SNORT?
The product is inexpensive compared to leading brands such as Palo Alto or Fortinet.
What is your experience regarding pricing and costs for Cisco Sourcefire SNORT?
If one is an extremely expensive product, and ten is cheap, I rate the tool's price as a five. There are some other tools in the market that are more expensive than Cisco. There are no additional c...
What needs improvement with Cisco Sourcefire SNORT?
I have not had much experience with the community-driven rule set while utilizing Cisco Sourcefire SNORT. I don't have experience with recognizing zero-day vulnerabilities, but based on my knowledg...
Which is the best DDoS protection solution for a big ISP for monitoring and mitigating?
Arbor would be the best bid, apart from Arbor, Palo Alto and Fortinet have good solutions. As this is an ISP, I would prefer Arbor.
What is your experience regarding pricing and costs for Palo Alto Networks Threat Prevention?
Palo Alto Networks Advanced Threat Prevention requires an add-on license and is considered expensive compared to competitors like Cisco AMP and FortiGate ( /products/fortinet-fortigate-reviews ) fi...
What needs improvement with Palo Alto Networks Threat Prevention?
Palo Alto Networks can improve Advanced Threat Prevention by catering to the growing adoption of AI and agentic tooling. The Threat Protection modules should have the necessary intelligence to prot...
 

Also Known As

Sourcefire SNORT
No data available
 

Overview

 

Sample Customers

CareCore, City of Biel, Dimension Data, LightEdge, Lone Star College System, National Rugby League, Port Aventura, Smart City Networks, Telecom Italia, The Department of Education in Western Australia
University of Arkansas, JBG SMITH, SkiStar AB, TRI-AD, Temple University, Telkom Indonesia
Find out what your peers are saying about Cisco Sourcefire SNORT vs. Palo Alto Networks Advanced Threat Prevention and other solutions. Updated: March 2026.
885,264 professionals have used our research since 2012.