Try our new research platform with insights from 80,000+ expert users

Cisco Secure Cloud Analytics [EOL] vs Palo Alto Networks Advanced Threat Prevention comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Cloud Analytic...
Average Rating
8.6
Number of Reviews
7
Ranking in other categories
No ranking in other categories
Palo Alto Networks Advanced...
Average Rating
8.4
Reviews Sentiment
6.6
Number of Reviews
29
Ranking in other categories
Intrusion Detection and Prevention Software (IDPS) (7th)
 

Featured Reviews

SP
Security Analyst at Orange España
Efficiently generates alerts for suspicious activities and scales easily
There are two areas of improvement. Firstly, extend the log retrieval limit to at least three months. For example, there is a limit on the number of log messages that can be received. So, I would like to expand the log retrieval limit. And another thing, if we migrate these things to an event or send us an email if there is any critical event, I would like to configure these things on the initial launch. Because if a system is compromised, there will be a lot of data movement from one post to another post to the outside. Then, we should also get an alert on email as well. We have since we have integrated these things. But a direct email for critical alerts should be there. So, I would like to enhance the critical event configuration. If a new user wants to learn how it should work, how policies work, and where we can configure policies, there should be some learning material for this product.
Partha Dash - PeerSpot reviewer
Global Network Tech Lead at a tech vendor with 10,001+ employees
Advanced protection enables us to confidently secure against evolving threats
Palo Alto Networks can improve Advanced Threat Prevention by catering to the growing adoption of AI and agentic tooling. The Threat Protection modules should have the necessary intelligence to protect against those types of threats, as AI will be there to do a human job; this is an evolving area. From an Advanced Threat Protection perspective, the technology associated with Palo Alto Networks, such as their sandboxing environment, is quite good. However, Palo Alto needs to focus on how to bring that technology to end users and how easy it is to use, especially in a hybrid environment where users work from various locations. While Palo Alto excels in certain setups, they need to improve the user experience in distributed working conditions.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I would recommend Cisco Stealthwatch Cloud 100 percent."
"The logs in Cisco Stealthwatch Cloud are very good when doing the API integration in the team. It is able to give you important information for the correlations."
"The product helps me to see malware."
"Cisco Stealthwatch Cloud is scalable because it is on the cloud."
"It tells you if there is any communication going to command and control servers, or if there is any traffic that violates your internal policy, or if any data hoarding is happening where data is being dumped from your machine to outside of the environment. It provides all such meaningful reports to help you understand what's happening."
"When it comes to scalability, there's no size limit. It varies based on licenses and requirements."
"We were able to prevent an electric fraud of almost $200,000."
"The tool's best feature is its ability to monitor network traffic. It will also inform users whether the traffic generated by a network is legitimate. The tool helps to capture and analyze the network traffic."
"So far, there have been no security issues and we are absolutely happy with Palo Alto Networks."
"We are currently using the URL filtering feature, which is the most popular."
"The most valuable features are the simplicity, transparency, and overall ease of management."
"A strong point of Palo Alto Networks Advanced Threat Prevention is their product called GlobalProtect VPN, where if you enable this service, there is no other firewall available for this security profile because when you go outside of the computer network, you must connect to the Palo Alto VPN before accessing the internet, which means there will be complete security visibility."
"After the proper implementation of that product, we've not had one hack attempt."
"The application control and vulnerability protection are the most valuable features."
"Overall, Palo Alto Threat Prevention doesn't need much more; from a general point of view, you get everything."
"The most valuable feature of Palo Alto Threat Prevention for our company is the next generation firewall."
 

Cons

"The product's price is high."
"The initial setup of Cisco Stealthwatch Cloud is complex."
"If we migrate these things to an event or send us an email if there is any critical event, I would like to configure these things on the initial launch. Because if a system is compromised, there will be a lot of data movement from one post to another post to the outside. Then, we should also get an alert on email as well. We have since we have integrated these things. But a direct email for critical alerts should be there. So, I would like to enhance the critical event configuration."
"When I used to work on it, I just didn't see anything new happening for about a year and a half. Providing newer data and newer reports constantly would help. There should be more classifications and more interesting data."
"The initial setup of Cisco Stealthwatch Cloud is complex."
"Cisco Stealthwatch Cloud could improve the graphical user interface. It could be a more user-friendly graphical user interface. so that. Not everybody's a cyber security professional, most of the customers that I deal with are not very skilled. The terms that they use in the solution are quite understandable for a normal CIO."
"The product needs to improve its user-friendliness. It is very tricky and you need to study it before using the standard functionalities."
"Cisco Stealthwatch Cloud could improve the graphical user interface. It could be a more user-friendly graphical user interface."
"The price of licenses should be lowered to make it less costly to scale our solution."
"It's not so easy to set up a test environment, because it's not so easy to get the test license. The vendor only gives you 90 days for a test license; it's a tough license to get."
"The technology firewall anomaly network could stand improvement."
"The organization mail security solutions could be improved. There is no mail security solution available."
"The installation was complicated."
"Generally, to deploy it will take some downtime, about a day."
"The initial setup is complex."
"In terms of what needs improvement, the only thing I don't like is the support."
 

Pricing and Cost Advice

"The solution is quite expensive."
"Cisco Stealthwatch Cloud is an expensive enterprise solution."
"The price of Cisco Stealthwatch Cloud is expensive."
"The price of the solution is higher than others on the market. A price reduction would be beneficial if it does not impact their database quality."
"It is an expensive solution and I would like to see a drop in price."
"The pricing could be lower."
"If you want to have all of the good features then you have to pay extra for licensing."
"Palo Alto Networks Advanced Threat Prevention is quite competitive, offering extensive threat detection and prevention capabilities, though it is priced higher than some alternatives."
"From one to ten, with one being the most expensive, I would rate the pricing of Palo Alto Networks Threat Prevention a one out of ten. It is my understanding that Palo Alto Networks Threat Prevention is the most expensive one."
"The pricing has improved with the newer generation of their Firewalls, but the price could always be lower."
"The pricing and the licensing are pretty competitive at this stage. As a reseller, I would like to see the price come down a little bit so I can compete better against other firewalls because we do that all the time."
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
885,264 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
13%
University
10%
Computer Software Company
10%
Performing Arts
10%
Financial Services Firm
10%
Performing Arts
8%
Manufacturing Company
7%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business1
Midsize Enterprise2
Large Enterprise6
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise4
Large Enterprise14
 

Questions from the Community

Ask a question
Earn 20 points
Which is the best DDoS protection solution for a big ISP for monitoring and mitigating?
Arbor would be the best bid, apart from Arbor, Palo Alto and Fortinet have good solutions. As this is an ISP, I would prefer Arbor.
What is your experience regarding pricing and costs for Palo Alto Networks Threat Prevention?
Palo Alto Networks Advanced Threat Prevention requires an add-on license and is considered expensive compared to competitors like Cisco AMP and FortiGate ( /products/fortinet-fortigate-reviews ) fi...
What needs improvement with Palo Alto Networks Threat Prevention?
Palo Alto Networks can improve Advanced Threat Prevention by catering to the growing adoption of AI and agentic tooling. The Threat Protection modules should have the necessary intelligence to prot...
 

Also Known As

Cisco Stealthwatch Cloud, Observable Networks
No data available
 

Overview

 

Sample Customers

Options, Schneider Electric, Washington University in St Louis, Gotcha, Kraft Kennedy, PartnerRe, Sumologic, Veterans United, AFGE, Agraform, Artesys, Dynamic Ideas Financials, Department of Agriculture and Commerce
University of Arkansas, JBG SMITH, SkiStar AB, TRI-AD, Temple University, Telkom Indonesia
Find out what your peers are saying about Fortinet, Darktrace, Check Point Software Technologies and others in Intrusion Detection and Prevention Software (IDPS). Updated: February 2026.
885,264 professionals have used our research since 2012.