We performed a comparison between Check Point CloudGuard CNAPP, Cisco Secure Cloud Analytics, and Cisco Secure Network Analytics based on real PeerSpot user reviews.
Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management."The two most valuable features for us are the central firewall administrator and the real-time cloud compliance monitoring."
"It offers advanced detection of threats that can harm data from the cloud database."
"The new scanning function is a valuable feature that wasn't available until recently."
"It is able to bring visibility into that cloudy space where the security departments do not really see what is happening on the DevOps side. It brings visibility, security control, and standardization."
"Helps identify and correct misconfigurations in cloud environments, ensuring that infrastructure and applications are secure and optimized."
"The solution has intelligence that integrates with a range of threat intelligence feeds, including Check Point's ThreatCloud, to provide real-time intelligence on emerging threats."
"This product provides a really nice visualization of the infrastructure, including network topology, firewalls, etc."
"Its monitoring and alerts are triggered by a failure or non-compliance with policies. It helps us to be able to act effectively and quickly."
"The logs in Cisco Stealthwatch Cloud are very good when doing the API integration in the team. It is able to give you important information for the correlations."
"The product helps me to see malware."
"It tells you if there is any communication going to command and control servers, or if there is any traffic that violates your internal policy, or if any data hoarding is happening where data is being dumped from your machine to outside of the environment. It provides all such meaningful reports to help you understand what's happening."
"The tool's best feature is its ability to monitor network traffic. It will also inform users whether the traffic generated by a network is legitimate. The tool helps to capture and analyze the network traffic."
"Monitoring the traffic, making sure you have the visibility."
"When it comes to scalability, there's no size limit. It varies based on licenses and requirements."
"Cisco Stealthwatch Cloud is scalable because it is on the cloud."
"The most valuable feature is integration."
"The most valuable feature of Cisco Secure Network Analytics is the Threat Intelligence integration."
"It has definitely helped us improve our mean time to resolution on network issues."
"The most valuable feature is NetFlow. The beginning of any security investigation starts with NetFlow data."
"It has been pretty stable since we deployed it, and everything seems to be working fine."
"The most valuable features of this solution are the logging, keeping threats under control, and keeping our data and environment secure."
"Most valuable features are the network maps and server and network response time."
"Overall, the implementation is very good."
"The rules are not well-tuned, and many of them generate false positives or nonsensical results."
"Streamlining the user interface would greatly improve the user experience."
"The entire system is complicated, and the setup process may not cater to the company's demands."
"No improvements are needed."
"Addressing the large amount of compliance information and benchmarks we need to observe, the tools are becoming our goto dashboards."
"Almost all features are good, however, they still require improvements to the code security portion on which integration with the major source code repository is required."
"I would like to see tighter integration with other compliance tools, like Chef Compliance, in addition to Inspector."
"Down the road, we would like to see automation. That is probably a feature that most people want. If they can automate patching a vulnerability, it will be much easier."
"Cisco Stealthwatch Cloud could improve the graphical user interface. It could be a more user-friendly graphical user interface. so that. Not everybody's a cyber security professional, most of the customers that I deal with are not very skilled. The terms that they use in the solution are quite understandable for a normal CIO."
"The product's price is high."
"If we migrate these things to an event or send us an email if there is any critical event, I would like to configure these things on the initial launch. Because if a system is compromised, there will be a lot of data movement from one post to another post to the outside. Then, we should also get an alert on email as well. We have since we have integrated these things. But a direct email for critical alerts should be there. So, I would like to enhance the critical event configuration."
"The product needs to improve its user-friendliness. It is very tricky and you need to study it before using the standard functionalities."
"The initial setup of Cisco Stealthwatch Cloud is complex."
"The initial setup is a bit complex in terms of deployment and configuration"
"When I used to work on it, I just didn't see anything new happening for about a year and a half. Providing newer data and newer reports constantly would help. There should be more classifications and more interesting data."
"The configuration of the solution was quite complex."
"It would be better to let people know, up front, that is doesn't give you nice, clear information, as seen in the demos, without Cisco ISE installed."
"The version with the Dell server had iDRAC problems. Often, it reported iDRAC failure."
"One thing I would like to see improved is if it could automatically be tied through ISE, instead of you having to manually get notifications and disable it yourself."
"I would like Cisco to make it easier for the administrators to use it."
"I would like to see it better organized when I'm looking at it."
"The usability of this solution needs to be improved."
"One update that I would like to see is an agent-based client. Currently, Stealthwatch is network-based. A local agent could help manage endpoints."
More Cisco Secure Network Analytics Pricing and Cost Advice →