Change Tracker Gen7 R2 vs Cisco Secure Cloud Analytics comparison

Cancel
You must select at least 2 products to compare!
NNT Logo
141 views|96 comparisons
66% willing to recommend
Cisco Logo
352 views|289 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Change Tracker Gen7 R2 and Cisco Secure Cloud Analytics based on real PeerSpot user reviews.

Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Change Tracker Gen7 R2 vs. Cisco Secure Cloud Analytics Report (Updated: May 2024).
770,924 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Whitelisting services are the most valuable feature of Change Tracker Gen7 R2.""I have contacted the support once and the experience was good, I was satisfied."

More Change Tracker Gen7 R2 Pros →

"When it comes to scalability, there's no size limit. It varies based on licenses and requirements.""Cisco Stealthwatch Cloud is scalable because it is on the cloud.""The tool's best feature is its ability to monitor network traffic. It will also inform users whether the traffic generated by a network is legitimate. The tool helps to capture and analyze the network traffic.""The logs in Cisco Stealthwatch Cloud are very good when doing the API integration in the team. It is able to give you important information for the correlations.""It tells you if there is any communication going to command and control servers, or if there is any traffic that violates your internal policy, or if any data hoarding is happening where data is being dumped from your machine to outside of the environment. It provides all such meaningful reports to help you understand what's happening.""The product helps me to see malware.""Monitoring the traffic, making sure you have the visibility."

More Cisco Secure Cloud Analytics Pros →

Cons
"The solution could include more integrations.""The solution could improve by being more secure and have better integration."

More Change Tracker Gen7 R2 Cons →

"The product's price is high.""The product needs to improve its user-friendliness. It is very tricky and you need to study it before using the standard functionalities.""When I used to work on it, I just didn't see anything new happening for about a year and a half. Providing newer data and newer reports constantly would help. There should be more classifications and more interesting data.""Cisco Stealthwatch Cloud could improve the graphical user interface. It could be a more user-friendly graphical user interface. so that. Not everybody's a cyber security professional, most of the customers that I deal with are not very skilled. The terms that they use in the solution are quite understandable for a normal CIO.""The initial setup is a bit complex in terms of deployment and configuration""If we migrate these things to an event or send us an email if there is any critical event, I would like to configure these things on the initial launch. Because if a system is compromised, there will be a lot of data movement from one post to another post to the outside. Then, we should also get an alert on email as well. We have since we have integrated these things. But a direct email for critical alerts should be there. So, I would like to enhance the critical event configuration.""The initial setup of Cisco Stealthwatch Cloud is complex."

More Cisco Secure Cloud Analytics Cons →

Pricing and Cost Advice
  • "There is a license required for this solution."
  • More Change Tracker Gen7 R2 Pricing and Cost Advice →

  • "Cisco Stealthwatch Cloud is an expensive enterprise solution."
  • "The price of Cisco Stealthwatch Cloud is expensive."
  • "The solution is quite expensive."
  • More Cisco Secure Cloud Analytics Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
    770,924 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Whitelisting services are the most valuable feature of Change Tracker Gen7 R2.
    Top Answer:The solution could include more integrations.
    Top Answer:We use Change Tracker Gen7 R2 for secure configuration management and file integrity monitoring.
    Top Answer:When it comes to scalability, there's no size limit. It varies based on licenses and requirements.
    Top Answer:There are two areas of improvement. Firstly, extend the log retrieval limit to at least three months. For example, there is a limit on the number of log messages that can be received. So, I would like… more »
    Top Answer:We are using Cisco Secure Cloud Analytics, also known as Cisco's WatchCloud, to monitor user activity in the cloud. Specifically, we are looking for users who are uploading or downloading data beyond… more »
    Ranking
    Views
    141
    Comparisons
    96
    Reviews
    1
    Average Words per Review
    160
    Rating
    10.0
    Views
    352
    Comparisons
    289
    Reviews
    5
    Average Words per Review
    468
    Rating
    8.8
    Comparisons
    Also Known As
    NNT Change Tracker Enterprise
    Cisco Stealthwatch Cloud, Observable Networks
    Learn More
    Cisco
    Video Not Available
    Overview

    Change Tracker Gen7R2 solves IT Security and the problems that plague all organizations – the overwhelming noise of change control and ensuring the integrity of IT systems. Completely redesigned with both security and IT operations in mind, Change Tracker Gen7 R2 is the only solution designed to reduce change noise and the complexity of integrity monitoring and policy management all while allowing for unprecedented scalability and management that meets the most demanding enterprise environments.

    Gen7R2 enables organizations to:

    - Define the systems that need protection

    - Ensure those systems are secured, compliant and fit for purpose at all times

    - Provide intelligent change control to ensure systems remain in a ‘known secure and compliant state’

    - Enable organizations to move projects securely from Development to Operations

    Gen7 R2 integrates with leading Service desks and Change Management solutions to reconcile the changes that are actually occurring within your environment with those that were expected and part of an approved Request for Change. Security and IT Service Management (ITSM) have traditionally observed and managed change in two very different ways. By linking the changes approved and expected within the ITSM world with those that are actually happening from a security perspective, SecureOps is delivered and underpins effective, ongoing security and operational availability.

    With Gen7R2 you have the ability to reduce change noise by more than 90%, leaving only changes that are unknown, unwanted, unexpected or potentially malicious in nature for further investigation.

    Cisco Secure Cloud Analytics is a cloud-based security solution that provides visibility and threat detection for cloud environments. It offers software mapping and automation for incident response, forensic analysis, and segmentation of IT architecture. The solution can be used on-premise or on the cloud and is used in various sectors such as insurance and government. 

    The logs in Cisco Secure Cloud Analytics are valuable for API integration in a team as they provide important information for correlations. The solution also offers automated incident response and integration with next-generation firewalls and antivirus solutions."

    Sample Customers
    US Army, Xerox, Hewlett Packard, LiveTV, Universal Studios, Guadalupe Valley Electric Cooperative, ACAS, Chanel, Live Nation, Union Bank, Ohio Valley Electric Corporation, Bank of China, Cornell University, Jetblue, Royal Albert Hall, Chaparral Energy, RyanAir
    Options, Schneider Electric, Washington University in St Louis, Gotcha, Kraft Kennedy, PartnerRe, Sumologic, Veterans United, AFGE, Agraform, Artesys, Dynamic Ideas Financials, Department of Agriculture and Commerce
    Top Industries
    No Data Available
    VISITORS READING REVIEWS
    Computer Software Company41%
    Financial Services Firm8%
    Government7%
    Manufacturing Company5%
    Company Size
    No Data Available
    REVIEWERS
    Small Business11%
    Midsize Enterprise22%
    Large Enterprise67%
    VISITORS READING REVIEWS
    Small Business17%
    Midsize Enterprise11%
    Large Enterprise72%
    Buyer's Guide
    Change Tracker Gen7 R2 vs. Cisco Secure Cloud Analytics
    May 2024
    Find out what your peers are saying about Change Tracker Gen7 R2 vs. Cisco Secure Cloud Analytics and other solutions. Updated: May 2024.
    770,924 professionals have used our research since 2012.

    Change Tracker Gen7 R2 is ranked 21st in Intrusion Detection and Prevention Software (IDPS) with 2 reviews while Cisco Secure Cloud Analytics is ranked 16th in Intrusion Detection and Prevention Software (IDPS) with 7 reviews. Change Tracker Gen7 R2 is rated 9.0, while Cisco Secure Cloud Analytics is rated 8.6. The top reviewer of Change Tracker Gen7 R2 writes "A stable solution that can be used for secure configuration management and file integrity monitoring". On the other hand, the top reviewer of Cisco Secure Cloud Analytics writes " Efficiently generates alerts for suspicious activities and scales easily ". Change Tracker Gen7 R2 is most compared with Fortra's Tripwire Enterprise, whereas Cisco Secure Cloud Analytics is most compared with Cisco Secure Network Analytics, Cortex XDR by Palo Alto Networks, Microsoft Defender for Endpoint, CrowdStrike Falcon and Darktrace. See our Change Tracker Gen7 R2 vs. Cisco Secure Cloud Analytics report.

    See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.

    We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.