We performed a comparison between Cisco Secure Firewall and Cisco Secure Network Analytics based on real PeerSpot user reviews.
Find out in this report how the two Cisco Security Portfolio solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."IPS and Snort are very important because they also differentiate Cisco from other vendors and competitors."
"Its security and filtering are most valuable. Every layer of data that comes into the organization goes through it. After setting up the criteria, it automatically filters the traffic. We don't have to check it often."
"The feature that I found most valuable is the overall stability of the product."
"Since the product is stable, we do not have to spend additional money to buy other firewalls. Once deployed, we can use the product for a long time. Thus, it is cost effective."
"All the rules are secure and we haven't had a significant malware attack in the five years that we've been using ASA Firewall. It has been a tremendous improvement for our network. However, I can't quantify the benefits in monetary terms."
"The TAC is always very helpful. We pay for Tier 1 support, so we get whatever we need from them. They always give us a solution. If they can't give us an answer that day, they get back to us within at least 24 hours with a solution or fix. I have never had a problem with the TAC. I would rate them as 10 out of 10."
"The most valuable feature of this solution is its ability to integrate vertically."
"Malicious URLs are being blocked."
"It's a dependable product that is able to pinpoint where we have vulnerabilities if they occur."
"It provides good visibility to the customers. People are still evaluating it, but it provides visibility and helps them to take action to remediate and mitigate the issues that are highlighted on the dashboard. It has good integration with the Cisco switching platform."
"Cisco Stealthwatch has reduced the amount of time to detect an immediate threat."
"There are already many functionalities, so I don't think there is anything to improve."
"It does change the way we troubleshoot and it is relatively easy to use once you learn it. I would recommend it to someone considering it."
"It is a good application, providing for real-time monitoring of the organization of data. It can basically identify points of peak traffic where possible issues are being caused."
"Using this solution has helped us to detect and identify viruses or malicious activity in the network early on."
"Cisco Stealthwatch has predefined alerts for different types of security issues that might happen in the network. Whether it's PCs or servers that are used for botnets or Bitcoin mining we receive the alerts automatically. This functionality is what we receive from the solution out of the box."
"The access layer of this solution could be improved in terms of the way the devices interconnect with our network. We need to be able to analyze the traffic between the different interconnection in these areas."
"There used to be information displayed about the packets in a module called Packet Flow, but it is no longer there."
"The graphical interface should be improved to make the configuration easier, to do things with a single click."
"Also, they have a Firepower source file that I can work on the ASA device and on Firepower devices. A problem here lies in the way that you manage these devices. Some devices do not support the FMC, and some devices have to be managed through ASDM, and others have to be managed through FMC."
"Implementations require the use of a console. It would help if the console was embedded."
"We only have an issue with time sync with Cisco ASA and NTP. If the time is out of sync, it will be a disaster for the failover."
"The cloud does not precisely mimic what is on-premises."
"It will be nice if they had what you traditionally would use a web application scanner for. If the solution could take a deeper look into HTTP and HTTPS traffic, that would be nice."
"It's not great as a standalone solution."
"We determined that Stealthwatch wouldn't provide the machine learning model that we required."
"We need to be able to filter out internal IPs as non-threats."
"I would like to see it better organized when I'm looking at it."
"Complexity on integration is not so straightforward and you really need an expert to help build it out."
"The version with the Dell server had iDRAC problems. Often, it reported iDRAC failure."
"I think the interface is a little lacking. The interface seems like it just needs to be modernized. It's been the same interface now, ever since I've seen it probably four years ago."
"One thing I would like to see improved is if it could automatically be tied through ISE, instead of you having to manually get notifications and disable it yourself."
More Cisco Secure Network Analytics Pricing and Cost Advice →
Cisco Secure Firewall is ranked 4th in Cisco Security Portfolio with 404 reviews while Cisco Secure Network Analytics is ranked 3rd in Cisco Security Portfolio with 57 reviews. Cisco Secure Firewall is rated 8.2, while Cisco Secure Network Analytics is rated 8.2. The top reviewer of Cisco Secure Firewall writes "Highlights and helps us catch Zero-day vulnerabilities traveling across our network". On the other hand, the top reviewer of Cisco Secure Network Analytics writes "Increased the visibility of what is happening in our network". Cisco Secure Firewall is most compared with Fortinet FortiGate, Palo Alto Networks WildFire, Netgate pfSense, Meraki MX and Sophos XG, whereas Cisco Secure Network Analytics is most compared with Darktrace, Cisco Secure Cloud Analytics, ThousandEyes, Vectra AI and Arista NDR. See our Cisco Secure Firewall vs. Cisco Secure Network Analytics report.
See our list of best Cisco Security Portfolio vendors.
We monitor all Cisco Security Portfolio reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.