We performed a comparison between Check Point CloudGuard CNAPP, Cisco Secure Cloud Analytics, and Darktrace based on real PeerSpot user reviews.
Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management."The most valuable feature is posture management, which gives you complete visibility of all your assets in the cloud and allows you to do governance and compliance."
"The rulesets and the findings are valuable. The actual core functionality of it and the efficacy of events are great."
"It helps us to analyze vulnerabilities way before they get installed in production and the web. It gives us more security in the production environment."
"The comprehensive security for IaaS and PaaS cloud assets provides efficient security awareness to all the teams."
"Helps identify and correct misconfigurations in cloud environments, ensuring that infrastructure and applications are secure and optimized."
"The most valuable feature is the single dashboard that enables us to manage the entire cloud environment from one place."
"The most valuable features of CloudGuard CNAPP are its compliance engine and auto-remediation features."
"The ability to integrate it with Microsoft Azure Sentinel allows us to validate the logs in an even more complex and meaningful way."
"Cisco Stealthwatch Cloud is scalable because it is on the cloud."
"The tool's best feature is its ability to monitor network traffic. It will also inform users whether the traffic generated by a network is legitimate. The tool helps to capture and analyze the network traffic."
"Monitoring the traffic, making sure you have the visibility."
"The product helps me to see malware."
"The logs in Cisco Stealthwatch Cloud are very good when doing the API integration in the team. It is able to give you important information for the correlations."
"When it comes to scalability, there's no size limit. It varies based on licenses and requirements."
"It tells you if there is any communication going to command and control servers, or if there is any traffic that violates your internal policy, or if any data hoarding is happening where data is being dumped from your machine to outside of the environment. It provides all such meaningful reports to help you understand what's happening."
"It's a very stable product."
"Its most valuable feature is its ability to identify malicious connected IPs from outside and the attacks that get through to the inside."
"The most valuable feature of Darktrace and the most valuable feature is the artificial intelligence module because that is the tool that determines automatically if there is any risk or not in the network."
"The active threat dashboard is the most valuable feature of this solution."
"It is very easy to work with Darktrace once you know how it works and the type of permissions that you need to get related to the security over a network. The interface is awesome. I'm sure that you have seen Ironman, and you know Jarvis, the computer of Tony Stark. The interface of Darktrace is very similar, and you can see in 3D, like a hologram, the whole network, traffic, and all the traces inside the network. The interface is awesome, and it provides a lot of information. At least for us, it is very easy to handle this interface, get the reports, and do the interpretation of those reports. Darktrace also provides mobile monitoring. With an app on your mobile phone, you can view the information live, which is very useful for area directors and field engineers. Darktrace can be also correlated with any type of big data solution, such as Splunk."
"The ability to detect activity on the network is very useful to us. Even if it's not necessarily an illegal activity, if it is abnormal activity, it is able to detect it and notify us."
"In terms of features, the data or information they collect and unsupervised machine learning are very valuable. Its unsupervised machine learning has reduced our team's effort. Both Darktrace and Vectra work on unsupervised machine learning that learns the behavior or develops a profile on its own, which allows our security team to do some other tasks rather than spending time on Darktrace or Vectra. Because of unsupervised machine learning, its detection capability is quite good. Along with that, if we utilize the integration feature properly, the automated incident response capability of Darktrace is quite useful."
"I find it very good in the way that they show the past events, including the attack history."
"The costs are really high if you want the entire capabilities of the platform."
"I would like an interface more adapted to cell phones or tablets."
"The support must be more effective."
"Almost all features are good, however, they still require improvements to the code security portion on which integration with the major source code repository is required."
"The entire system is complicated, and the setup process may not cater to the company's demands."
"The guidelines to implement or to link with the clouds are not complete."
"Reporting should have more options."
"No improvements are needed."
"The product's price is high."
"When I used to work on it, I just didn't see anything new happening for about a year and a half. Providing newer data and newer reports constantly would help. There should be more classifications and more interesting data."
"The product needs to improve its user-friendliness. It is very tricky and you need to study it before using the standard functionalities."
"If we migrate these things to an event or send us an email if there is any critical event, I would like to configure these things on the initial launch. Because if a system is compromised, there will be a lot of data movement from one post to another post to the outside. Then, we should also get an alert on email as well. We have since we have integrated these things. But a direct email for critical alerts should be there. So, I would like to enhance the critical event configuration."
"The initial setup is a bit complex in terms of deployment and configuration"
"Cisco Stealthwatch Cloud could improve the graphical user interface. It could be a more user-friendly graphical user interface. so that. Not everybody's a cyber security professional, most of the customers that I deal with are not very skilled. The terms that they use in the solution are quite understandable for a normal CIO."
"The initial setup of Cisco Stealthwatch Cloud is complex."
"We'd like threat hunting, and we'd like to see a global solution that can automate vulnerability scans. I know it is something they are working on."
"A reporting portal could be a great addition to help customize reports."
"Getting logs from different sources can be a challenge."
"The solution would benefit from automation. Currently, you have to know what you are searching for."
"Upper management wasn't sold on the value proposition."
"The interface is too mathematical and it should be simplified."
"Darkforce could be improved in the range of the interface; how to interact with the actions it's taking or not taking."
"Darktrace could improve by being more user-friendly."