We performed a comparison between Cisco IOS Security and Cisco Secure Cloud Analytics based on real PeerSpot user reviews.
Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature of Cisco IOS Security is posturing."
"The VPN is the most valuable feature."
"The solution is very user-friendly and easy to deal with."
"The most valuable feature is endpoint protection."
"One of the main features is that the hardware is extremely reliable."
"The VPN was valuable for us because more people are working from home. It has a lot of reporting and easy-to-use management tools."
"We are able to filter a lot of traffic especially when a lot of the traffic is in layer 7."
"The product is easy to use."
"The product helps me to see malware."
"The logs in Cisco Stealthwatch Cloud are very good when doing the API integration in the team. It is able to give you important information for the correlations."
"It tells you if there is any communication going to command and control servers, or if there is any traffic that violates your internal policy, or if any data hoarding is happening where data is being dumped from your machine to outside of the environment. It provides all such meaningful reports to help you understand what's happening."
"Cisco Stealthwatch Cloud is scalable because it is on the cloud."
"When it comes to scalability, there's no size limit. It varies based on licenses and requirements."
"The tool's best feature is its ability to monitor network traffic. It will also inform users whether the traffic generated by a network is legitimate. The tool helps to capture and analyze the network traffic."
"Monitoring the traffic, making sure you have the visibility."
"Cisco is a scalable product, but it is expensive compared to other vendors."
"The graphical user interface or the GUI could be better. Beginners can use some devices with the GUI, but some security devices are configured using CLI. It would also be better if it had its own Intrusion Protection Service and Intrusion Detection Service on the server."
"It takes too much time to deploy a policy to FMC. It takes around eight minutes. You can't afford any downtime when you're changing policies."
"The company needs to make its solution more affordable to make it more accessible to larger markets. Otherwise, it's seen as an enterprise-level solution that small or medium-sized organizations can't afford and therefore they won't even look at it."
"Cisco is an expensive firewall, so the pricing can be improved."
"I would love it if it has a link-by-link feature, integration with Unified Threat Management (UTM), and load balancers. They haven't got any link-by-link feature right now, which can be a very attractive option. This link-by-link feature can also be made available for Cisco's UTM firewalls. The link-by-link feature is available in some of the other firewalls. Currently, integration with UTM is missing. Cisco IOS Security also doesn't have the load balancers and a few things that need to be done to get a good UTM firewall. Normally, other firewalls have UTM. As a next-generation firewall, it's good, but as a UTM, it has to do some work."
"With respect to user-friendliness, it is a command-line interface and those with such experience will get along just fine, whereas others may struggle."
"Cisco IOS Security could improve by having more compatibility with other Cisco solutions."
"Cisco Stealthwatch Cloud could improve the graphical user interface. It could be a more user-friendly graphical user interface. so that. Not everybody's a cyber security professional, most of the customers that I deal with are not very skilled. The terms that they use in the solution are quite understandable for a normal CIO."
"The product needs to improve its user-friendliness. It is very tricky and you need to study it before using the standard functionalities."
"The initial setup is a bit complex in terms of deployment and configuration"
"If we migrate these things to an event or send us an email if there is any critical event, I would like to configure these things on the initial launch. Because if a system is compromised, there will be a lot of data movement from one post to another post to the outside. Then, we should also get an alert on email as well. We have since we have integrated these things. But a direct email for critical alerts should be there. So, I would like to enhance the critical event configuration."
"When I used to work on it, I just didn't see anything new happening for about a year and a half. Providing newer data and newer reports constantly would help. There should be more classifications and more interesting data."
"The initial setup of Cisco Stealthwatch Cloud is complex."
"The product's price is high."
Cisco IOS Security is ranked 10th in Intrusion Detection and Prevention Software (IDPS) with 47 reviews while Cisco Secure Cloud Analytics is ranked 16th in Intrusion Detection and Prevention Software (IDPS) with 7 reviews. Cisco IOS Security is rated 8.0, while Cisco Secure Cloud Analytics is rated 8.6. The top reviewer of Cisco IOS Security writes "User-friendly and excels in documentation, making it easier to resolve issues". On the other hand, the top reviewer of Cisco Secure Cloud Analytics writes " Efficiently generates alerts for suspicious activities and scales easily ". Cisco IOS Security is most compared with Cisco Secure Firewall, Fortinet FortiGate, Meraki MX, Fortinet FortiOS and Netgate pfSense, whereas Cisco Secure Cloud Analytics is most compared with Cisco Secure Network Analytics, Cortex XDR by Palo Alto Networks, Microsoft Defender for Endpoint, CrowdStrike Falcon and Darktrace. See our Cisco IOS Security vs. Cisco Secure Cloud Analytics report.
See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.