Answer:
-They need to be constantly updated
-They are complicated to get optimal settings
-If they don't have a suitable configuration, you can have many false positives.
-The hacker needs to leave a trace
-It's like an antivirus
-They are a complement of a NIDS.
I would choose the NID System because it offers me a widder protection by it self.