Try our new research platform with insights from 80,000+ expert users

Cisco Secure Network Analytics vs Cisco SecureX [EOL] comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Network Analytics
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
61
Ranking in other categories
Network Monitoring Software (38th), Network Traffic Analysis (NTA) (3rd), Network Detection and Response (NDR) (8th), Cisco Security Portfolio (9th)
Cisco SecureX [EOL]
Average Rating
9.0
Reviews Sentiment
8.2
Number of Reviews
13
Ranking in other categories
No ranking in other categories
 

Featured Reviews

Muhammad Harun-Owr-Roshid - PeerSpot reviewer
CEO at BRIGHT-i SYSTEMS LIMITED
Have streamlined network visibility and troubleshooting while seeing benefits from AI integration
In terms of improvements for Cisco Secure Network Analytics, from the implementation point of view, now that AI is in use, some other features need to be upgraded considering AI solutions. Proper management of the database is also important; it should be centralized for easier data collection from a single database. When precise manual analysis is needed, it's sometimes difficult, so having a centralized database will allow network admins to find actual scenarios more effectively, especially since some information may not be visible on the GUI. Cisco should upgrade their hardware part to run the database, because sometimes it cannot handle the load while all features are running in the network. The database management should indeed be centralized because while AI runs behind the systems, central management is essential. For example, in a network with 100 Cisco switches, a few routers, firewalls, and access points, all data generated should be preserved in a central database. This approach simplifies management and analysis for troubleshooting, as GUI interfaces may not always provide visible information. Centralizing the database will allow for better understanding of which information is preserved for each specific device.
Dene Lewis - PeerSpot reviewer
Head of Technical Strategy and Direction CAE Technology Services Ltd at CAE Technology Services Limited
A scalable SaaS based platform that helps with cyber threat intelligence and automated hunting
I would rate Cisco SecureX a ten out of ten. I find the product to be a fantastic platform. If you are eligible, start using it straight away. The best way to evaluate it is to start using it and see where it fits within your organization. I think it helps our customers really deliver their SecOps goals, and I see it as a core foundation of CAE's own security strategy going forward. Our partnership with Cisco is one that was built on trust over a long period of time. This has enabled us to work together to be able to provide the solutions that our customers need to drive their organizations forward. The value we add as a reseller is being able to work closer with our customers, understand them, and get intimate with their organizations. That enables us to offer them the right solutions that will help them achieve their goals.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable features of this solution are the logging, keeping threats under control, and keeping our data and environment secure."
"The solution's analytics and thrust detection capabilities are good. We're still adjusting it. It's a little hypersensitive, but it is working right now."
"It works efficiently for encrypted traffic analysis."
"From a security standpoint, it is just seeing pockets as well. Visibility is very key for us."
"The artifacts available in the tool provide better information for analyzing network traffic. It enables a holistic view of network traffic and general packet analysis. It's easy to identify anomalies without the use of signatures. The way in which we implemented Stealthwatch Cloud has enabled my team to analyze traffic behind proxies."
"The feature most valuable for us is to gain visibility of what is actually floating through, so we can stop it based on whether it's good or bad traffic."
"Most valuable features are the network maps and server and network response time."
"The most valuable feature of the solution is that it helps you gain visibility for your application."
"Using SecureX, a tool provided by Cisco, we can easily integrate it with many of our other Cisco products such as Cisco ISE and many networking devices."
"Our customers find the product's third-party integrations valuable. Our customers are also impressed with the tool's capability to pick up third-party threat feeds and use that as part of the decision-making process."
"The automation and orchestration tools are the most valuable features."
"The most beneficial feature of Cisco SecureX for cybersecurity efforts is its integration with other Cisco solutions and the environment. This sets it apart, as its APIs and overall integration capabilities are very strong. Additionally, its detection capabilities are commendable."
"The most valuable feature is its ability to manage all the applications and visibility. For example, if there is malware, spam, or another component that wants to attack the company in my servers, network, or applications, then SecureX will react to the problem."
"SecureX enables us to have all the threat intelligence and threat event data in one place."
"One of the most valuable features is the simplicity of deploying SecureX. It's very easy to do that and then you gain very detailed visibility into everything that's going on in your network and, obviously, at the device level. There's just a wealth of information that you can pull from all of these products that are part of SecureX. You know exactly if you have an issue or not."
"The forensics are amazing because when you have enrichment, and the solutions talk with each other, when you need it, you have the ability to know everything in the organization: when, why, whatever."
 

Cons

"We would like the solution to make more advances in the way that Extreme Networks has been doing."
"The solution should have the ability to analyze security events not only at the network layer but also at the application and OS layers."
"Stealthwatch is still maturing in AI. It uses artificial intelligence for predictions, but AI still needs to mature. It is in a phase where you get 95% correct detection. As its AI engine learns more, it will become more accurate. This is applicable to all the devices that are using AI because they support both supervised and unsupervised machine learning. The accuracy in the case of supervised machine learning is dependent on the data you feed into the box. The accuracy in the case of unsupervised machine learning is dependent on the algorithm. The algorithm matures depending on retrospective learning, and this is how it is able to detect zero-day attacks."
"Cisco should upgrade their hardware part to run the database, because sometimes it cannot handle the load while all features are running in the network."
"I would like to see better filters."
"Better integration between Cisco Secure Network Analytics and Cisco Secure Workload would be beneficial."
"The GUI could use some improvement. Being able to find features more easily would be a great improvement if it was simplified."
"If there was one improvement I’d suggest it would be that it detect traffic through an intranet. The product requires that traffic flow through a managed network device. The product is designed mostly for enterprise environments and not smaller environments or businesses."
"The automation and orchestration could be simpler. It could be that all the other parts are that easy to use so that these stick out as a negative, but that's the trickiest part for us. The workflows within the orchestration are just a bit more difficult."
"The front-end work controls the new algorithm and the firewall rules. The search feature of these rules could be improved."
"Remediation stuff could be integrated into the product's automation."
"They could expand into more areas. The more third-parties that we have tied into it, the better. The capabilities are there. As they just continue to involve the product, the more things that you can look into, then the more analytics that you can get. Also, the more data that we can get, then the better off we will be."
"If they could make the Cisco Umbrella piece a little bit more advanced or easier to manage, that would help. We use it for filtering and when you compare it to a normal content filter, it lacks some functionality."
"One of the improvements the product needs is more integration with collaboration platforms."
"The playbooks provided with the product are great, although I would appreciate having more playbooks available. Threats are constantly evolving, so having access to updated playbooks is crucial."
"I'm not sure that I would call it a bug, but sometimes the solution is a little slow."
 

Pricing and Cost Advice

"Licensing is done by flows per second, not including outside>in traffic."
"We pay for support costs on a yearly basis."
"Our fees are approximately $3,000 USD."
"It is worth the cost."
"Licensing is on a yearly basis."
"The solution is expensive. It costs several hundred thousand dollars per year (depending on how many flows you are collecting)."
"NetFlow is very expensive."
"The yearly licensing cost is about $50,000."
"For the value you get, the pricing of the solution is excellent."
"The product is absolutely free to any customer. As such, the only thing one must keep in mind is that as long as he already has one Cisco security product, irregardless of what that product is, SecureX is available for free."
"Cisco SecureX is more expensive than Trend Micro. However, considering the integration capabilities with other solutions and the quality of technical support, I believe there's justification for the price difference."
"It is free. It can't get any better than that."
"You can spend less money for another solution, but if you really want to have a good solution you have to pay. We are happy that we are getting such a good solution for what we are spending."
"The pricing is competitive, especially for education institutions. Licensing can be a little bit difficult to navigate, especially with resellers with Cisco, but for us it has been pretty easy."
"The pricing is the best part of this solution. It is free if you buy Umbrella or Duo Security. It is also a good solution."
"It comes free with all Cisco products. So, it is a good price."
report
Use our free recommendation engine to learn which Cisco Security Portfolio solutions are best for your needs.
884,873 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Government
11%
Manufacturing Company
10%
Financial Services Firm
9%
Computer Software Company
19%
Marketing Services Firm
11%
Government
8%
Outsourcing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business11
Midsize Enterprise7
Large Enterprise52
By reviewers
Company SizeCount
Small Business4
Midsize Enterprise7
Large Enterprise3
 

Questions from the Community

What is your experience regarding pricing and costs for Cisco Stealthwatch?
Regarding cost, for the Bangladesh context, Cisco Secure Network Analytics is a little bit high-priced because we are a developing country, making it tough to manage affordable solutions. However, ...
What needs improvement with Cisco Stealthwatch?
In terms of improvements for Cisco Secure Network Analytics, from the implementation point of view, now that AI is in use, some other features need to be upgraded considering AI solutions. Proper m...
What is your primary use case for Cisco Stealthwatch?
Our customers mainly use Cisco Secure Network Analytics to get whole network visibility and easy troubleshooting to find actual problems and also to mitigate loopholes or findings immediately to pr...
Ask a question
Earn 20 points
 

Also Known As

Cisco Stealthwatch, Cisco Stealthwatch Enterprise, Lancope StealthWatch
Kenna.AppSec, Kenna.VI
 

Overview

 

Sample Customers

Edge Web Hosting, Telenor Norway, Ivy Tech Community College of Indiana, Webster Financial Corporation, Westinghouse Electric, VMware, TIAA-CREF
NHS, Rackspace, UNC Pembroke, University of North Carolina at Charlotte, Missing Piece
Find out what your peers are saying about Cisco and others in Cisco Security Portfolio. Updated: March 2026.
884,873 professionals have used our research since 2012.