Try our new research platform with insights from 80,000+ expert users

Arista NDR vs ManageEngine NetFlow Analyzer comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Arista NDR
Ranking in Network Traffic Analysis (NTA)
7th
Average Rating
9.0
Reviews Sentiment
7.6
Number of Reviews
14
Ranking in other categories
Network Detection and Response (NDR) (11th)
ManageEngine NetFlow Analyzer
Ranking in Network Traffic Analysis (NTA)
9th
Average Rating
9.6
Reviews Sentiment
3.9
Number of Reviews
2
Ranking in other categories
Network Troubleshooting (8th)
 

Mindshare comparison

As of July 2025, in the Network Traffic Analysis (NTA) category, the mindshare of Arista NDR is 6.7%, down from 7.9% compared to the previous year. The mindshare of ManageEngine NetFlow Analyzer is 1.3%, down from 2.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Network Traffic Analysis (NTA)
 

Featured Reviews

reviewer1719513 - PeerSpot reviewer
it's much easier to create your own queries and hunt for threats
We take in IOCs from my SOC and from AlienVault, and then we focus on traffic that hits IOCs and alerts us to it. The one thing that the Awake platform lacks is the ability to automate the ingestion of IOCs rather than having to import CSV files or JSON files manually. Awake didn't support the manual importation of CSV and JSON in version 3.0, but they added it in version 4.0. It's helpful, but it still has to be a specific CSV format. Automated IOCs are on the roadmap. Hopefully, they will be able to automate the ingestion of IOCs by Q1 next year. I'm currently leveraging Mind Meld, an open-source tool by Palo Alto, to ingest IOCs from external parties. I aggregate those lists and spit them out as a massive list of domains, hashes, file names, IPS. Then we aggregate those into their own specific categories, like a URL category. Awake ingests that just like the Palo Alto firewall does, and then it alerts me if traffic attempts to go into it. Some of that is already on the Palo Alto firewall, which blocks it, but that doesn't mean that there is no attempted communication. I want to know if there's a communication attempt because there might be an indicator on that specific device trying to reach an IOC. Yes, my Palo Alto blocked it, but there's still something odd sitting there, and what if it can reach a different IOC that I don't have information about? I want to focus on it. I could do that by leveraging Awake if it could ingest the IOCs automatically. That's something I leverage Awake for today. I still have to manually import it, which is cumbersome because I have to manipulate the files that I get from the different IOC providers into a specific format that it understands. Once they add the ability to automate that, it'll be more useful.
Aneesh Mangla - PeerSpot reviewer
High cost-effectiveness and reliable alerting ensure proactive network management
Sometimes customers are unaware about their own network. For example, we need SMTP credentials for Layer 2 switches to do automatic discovery of network devices. Sometimes the network management teams are unaware of their SMTP credentials because the teams have been shuffled since the network was deployed. Or sometimes, when we support our government and defense customers, they don't have clearance to share these credentials with us. Some of the features, such as auto discoverability, get hampered if the customer is not aware of their own network or somehow can't share privileges and credentials with our tool for them to work properly. Not in ManageEngine NetFlow Analyzer in particular, but there are other features of the OpManager suite that could afford to be updated. There is something called a CLI, command-line interface, that allows us to configure network devices such as switches. This is old technology. This product suite has CLI-based configurations, but as of last year, most network devices come with Zero Touch Provisioning (ZTP). OpManager does not support this functionality, and we don't really have a timeline on when ZTP functionality will be available. In ManageEngine NetFlow Analyzer, we have to set custom thresholds to get alerted if there is a problem in network connectivity. It would be helpful if we could automate the tool such that we don't have to set thresholds manually, and the tool automatically alerts us when it detects issues. When experts deploy this tool, we already know what thresholds should be normal. But customers in general may not have this skill set. For newer customers who need to adopt this product, an automated method of alerting would definitely be beneficial.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We appreciate the value of the AML (structured query language). We receive security intel feeds for a specific type of malware or ransomware. AML queries looking for the activity is applied in almost real-time. Ultimately, this determines if the activity was not observed on the network."
"This solution help us monitor devices used on our network by insiders, contractors, partners, or suppliers. Its correlation and identification of specific endpoints is very good, especially since we have a large, virtualized environment. It discerns this fairly well. Some of the issues that we have had with other tools is we sometimes are not able to tell the difference between users on some of those virtualized instances."
"The most valuable portion is that they offer a threat-hunting service. Using their platform, and all of the data that they're collecting, they actually help us be proactive by having really expert folks that have insight, not just into our accounts, but into other accounts as well. They can be proactive and say, 'Well, we saw this incident at some other customer. We ran that same kind of analysis for you and we didn't see that type of activity in your network.'"
"Other solutions will say, "Hey, this device is doing something weird." But they don't aggregate that data point with other data points. With Awake you have what's called a "fact pattern." For example, if there's a smart toaster on the third floor that is beaconing out to an IP address in North Korea, sure that's bizarre. But if that toaster was made in North Korea it's not bizarre. Taking those two data points together, and automating something using machine-learning is something that no other solution is doing right now."
"It gives us something that is almost like an auditing tool for all of our network controls, to see how they are performing. This is related to compliance so that we can see how we are doing with what we have already implemented. There are things that we implemented, but we really didn't know if they were working or not. We have that visibility now."
"Arista NDR's scalability is very good, making it easy to add more hardware components. You can order additional hardware and integrate it by stacking it with the existing setup. This feature cannot be seen in other NDR tools."
"The query language makes it easy to query the records on the network, to do searches for the various threat activities that we're looking for. The dashboard, the Security Knowledge Graph, displays information meaningfully and easily. I am able to find the information that I want to find pretty quickly."
"The interface itself is clean and easy to use, yet customizable. I like that I can create my own dashboards fairly easily so that I can see what is important to me. Also, the query language is pretty easy to use. I haven't needed to use it a ton, but as I need to go in and do different queries based on their requests, it has been fairly simple to use."
"I give this solution a rating of 10 out of 10 and absolutely recommend it based on our experience."
"ManageEngine NetFlow Analyzer has detection capabilities for flow, event, and service flow."
 

Cons

"I would like to see a bit more in terms of encrypted traffic. With the advent of programs that live off the land, a smart attacker is going to leverage encryption to execute their operation. So I would like to see improvements there, where possible. Currently, we're not going to be decrypting encrypted traffic. What other approaches could be used?"
"When I looked at the competitors, such as Darktrace, they all have prettier interfaces. If Awake could make it a little more user-friendly, that would go a long way."
"I would like to see the capability to import what's known as STIX/TAXII in an IOC format. It currently doesn't offer this."
"There's room for improvement with some of the definitions, because I don't have time and I'm not a Tier 4 analyst. I believe that is something they're working towards."
"One concern I do have with Awake is that, ideally, it should be able identify high-risk users and devices and entities. However, we don't have confidence in their entity resolution, and we've provided this feedback to Awake. My understanding is that this is where some of the AI/ML is, and it hasn't been reliable in correctly identifying which device an activity is associated with. We have also encountered issues where it has merged two devices into one entity profile when they shouldn't be merged. The entity resolution is the weakest point of Awake so far."
"I enjoy the query language, but it could be a bit more user-friendly, especially for new users who come across it... They should push it more into a natural language style as opposed to a query language."
"Awake Security needs to move to a 24/7 support model in the MNDR space. Once they do that, it will make them even better."
"Arista NDR needs to open legal offices to be closer to customers and partners. It needs more visibility in the NDR market in the Middle East. While they are doing well, they lack sufficient engineers. They need to hire more engineers to meet the demand and expand their presence. The current team is good but not enough to fully capture the market."
"In ManageEngine NetFlow Analyzer, we have to set custom thresholds to get alerted if there is a problem in network connectivity. It would be helpful if we could automate the tool such that we don't have to set thresholds manually, and the tool automatically alerts us when it detects issues."
 

Pricing and Cost Advice

"Awake's pricing was very competitive. It's not a cheap option though. It's an investment to utilize it, but it's one that we decided was worth the cost, with the managed services. At our scale, it was a much better option to utilize their software and their managed services to handle this, rather than hiring another person to be an analyst. It was quite cost-effective for us."
"The solution is very good and the pricing is also better than others..."
"The pricing seems pretty reasonable for what we get out of it. We also found it to be more competitive than some other vendors that we've looked at."
"We switched to Awake Security because they were able to offer a model that was significantly less expensive and the value that we get out of it is higher."
"Because I represent a hedge fund, I have some leverage. I told them that they had to meet my conditions if they wanted me as a client. It was the same way with Awake. They wanted an initial four-year agreement. Initially, we signed on for a one-year contract, but they wanted the four-year deal when it came time for the renewal. I told them that I was not doing that. I said that they either had to do it on my terms, or I'd go somewhere else."
"Awake Security was the least expensive among their competitors. Everyone was within $15,000 of each other. The other solutions were not providing the MNDR service, which is standard with Awake Security's pricing/licensing model."
"The solution has saved thousands of dollars within the first day. Our ROI has to be in the tens of thousands of dollars since October last year."
Information not available
report
Use our free recommendation engine to learn which Network Traffic Analysis (NTA) solutions are best for your needs.
862,289 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Financial Services Firm
12%
Government
8%
Comms Service Provider
6%
Financial Services Firm
18%
Energy/Utilities Company
15%
Educational Organization
12%
Construction Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Arista NDR?
Arista NDR's scalability is very good, making it easy to add more hardware components. You can order additional hardware and integrate it by stacking it with the existing setup. This feature cannot...
What is your experience regarding pricing and costs for Arista NDR?
The tool's pricing is expensive but it is competitive.
What needs improvement with Arista NDR?
Arista NDR needs to open legal offices to be closer to customers and partners. It needs more visibility in the NDR market in the Middle East. While they are doing well, they lack sufficient enginee...
What is your experience regarding pricing and costs for ManageEngine NetFlow Analyzer?
The cost varies from industry to industry as the cost of a malicious or security incident varies largely among customers. ManageEngine NetFlow Analyzer is definitely among the most cost-effective t...
What needs improvement with ManageEngine NetFlow Analyzer?
Sometimes customers are unaware about their own network. For example, we need SMTP credentials for Layer 2 switches to do automatic discovery of network devices. Sometimes the network management te...
What is your primary use case for ManageEngine NetFlow Analyzer?
ManageEngine NetFlow Analyzer is an essential piece for anyone who wants to monitor their network because network monitoring is a general term that could mean several things. If you want to measure...
 

Also Known As

Awake Security Platform
No data available
 

Overview

 

Sample Customers

- Dolby Laboratories- Seattle Genetics- ARM Energy- Ooma- Prophix- Yapstone
Metro Rail, Micron21, Lotus F1 Team, Elizabeth Board of Education, Queen’s University Belfast, DHL, Praxair, Adventist Health, Wipro Infotech, Tropical Shipping USA
Find out what your peers are saying about Darktrace, Auvik, SolarWinds and others in Network Traffic Analysis (NTA). Updated: July 2025.
862,289 professionals have used our research since 2012.