Snort logo

Snort

An open-source security software product that looks at network traffic in real time and logs packets to perform detailed analysis
2
0
+ 1
0

What is Snort?

It is an open-source, free and lightweight network intrusion detection system (NIDS) software for Linux and Windows to detect emerging threats.
Snort is a tool in the Security category of a tech stack.
Snort is an open source tool with 733 GitHub stars and 230 GitHub forks. Here’s a link to Snort's open source repository on GitHub

Who uses Snort?

Companies

Developers

Why developers like Snort?

Here’s a list of reasons why companies and developers use Snort
Top Reasons
Be the first to leave a pro

Snort's Features

  • Intrusion Agent
  • IPSx
  • IPS
  • NGIPS
  • IPS detection and blocking

Snort Alternatives & Comparisons

What are some alternatives to Snort?
Ossec
It is a free, open-source host-based intrusion detection system. It performs log analysis, integrity checking, registry monitoring, rootkit detection, time-based alerting, and active response.
OpenSSL
It is a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It is also a general-purpose cryptography library.
Let's Encrypt
Let’s Encrypt is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).
Ensighten
The leading cybersecurity solution providing client-side protection against data loss, journey hijacking and intrusion while enhancing website performance. Assess and monitor privacy risk to protect against malicious JavaScript attacks.
Sqreen
Sqreen is a security platform that helps engineering team protect their web applications, API and micro-services in real-time. The solution installs with a simple application library and doesn't require engineering resources to operate. Security anomalies triggered are reported with technical context to help engineers fix the code. Ops team can assess the impact of attacks and monitor suspicious user accounts involved.
See all alternatives