Try our new research platform with insights from 80,000+ expert users

Cisco Secure Network Analytics vs Infraon IMS comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 10, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Network Analytics
Ranking in Network Monitoring Software
32nd
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
61
Ranking in other categories
Network Traffic Analysis (NTA) (4th), Network Detection and Response (NDR) (8th), Cisco Security Portfolio (8th)
Infraon IMS
Ranking in Network Monitoring Software
88th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
8
Ranking in other categories
Server Monitoring (29th), IT Infrastructure Monitoring (59th), Cloud Monitoring Software (47th)
 

Mindshare comparison

As of June 2025, in the Network Monitoring Software category, the mindshare of Cisco Secure Network Analytics is 1.2%, down from 1.6% compared to the previous year. The mindshare of Infraon IMS is 0.1%, down from 0.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Network Monitoring Software
 

Featured Reviews

Muhammad Harun-Owr-Roshid - PeerSpot reviewer
Have streamlined network visibility and troubleshooting while seeing benefits from AI integration
In terms of improvements for Cisco Secure Network Analytics, from the implementation point of view, now that AI is in use, some other features need to be upgraded considering AI solutions. Proper management of the database is also important; it should be centralized for easier data collection from a single database. When precise manual analysis is needed, it's sometimes difficult, so having a centralized database will allow network admins to find actual scenarios more effectively, especially since some information may not be visible on the GUI. Cisco should upgrade their hardware part to run the database, because sometimes it cannot handle the load while all features are running in the network. The database management should indeed be centralized because while AI runs behind the systems, central management is essential. For example, in a network with 100 Cisco switches, a few routers, firewalls, and access points, all data generated should be preserved in a central database. This approach simplifies management and analysis for troubleshooting, as GUI interfaces may not always provide visible information. Centralizing the database will allow for better understanding of which information is preserved for each specific device.
Maharajan S - PeerSpot reviewer
Provides data accuracy for availability and policy harmonization
The reporting capabilities are a challenge and could be improved. We have been trying to connect to it from our help desk ticketing system, because the ticketing system manages asset tracking, which has been a bit challenging for us. Otherwise, they give some reports that are okay, but we do not use them much because we work in the dashboard. This solution is available in SaaS. The reason why we have not gone to SaaS is they do not have a country-specific separation of assets. There are GDPR and other requirements that might require country-specific sensitive information to be filtered as well as other things that need to be taken care of. Normally, if we need to do any compliance, like ISO27000 compliance, they don't have such a report within their system. This kind of report is missing from their SaaS. That is one of the reasons that we have gone to the on-prem version, where I am assured that my data is secure. I can take the report and show it to them from a compliance point of view. However, the moment we go to a SaaS model, I don't have control of the data and where the data is stored. I don't receive any complaints-based reports from the SaaS model.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution's analytics and thrust detection capabilities are good. We're still adjusting it. It's a little hypersensitive, but it is working right now."
"It's easy to set up. The deployment takes one or two days. You need to collect the data from a device and then direct it to the portal."
"The solution allowed us to not only get gain insight but also start collaborating with other tools."
"It provides good visibility to the customers. People are still evaluating it, but it provides visibility and helps them to take action to remediate and mitigate the issues that are highlighted on the dashboard. It has good integration with the Cisco switching platform."
"Being able to graph and show data to management has improved our organization. We can show the data to the higher-ups. It shows them that it's picking up on these anomalies and doing its job."
"The artifacts available in the tool provide better information for analyzing network traffic. It enables a holistic view of network traffic and general packet analysis. It's easy to identify anomalies without the use of signatures. The way in which we implemented Stealthwatch Cloud has enabled my team to analyze traffic behind proxies."
"The solution has increased our threat detection rate. Cisco Stealthwatch has not reduced our incident response times. It has not reduced the amount of time it takes us to detect immediate threats. It has reduced false positives."
"The search options on Cisco Stealthwatch are the most valuable. You can get very granular with it, down to the kilobits or the seconds if you want. The product supports any time frame that you need, so that is nice."
"Their discovery is very quick and they have a CSV file upload mechanism that allows you to onboard five thousand devices a day."
"The role-based dashboards provide data points and charts and topology diagrams in a single window. It's like a spider web, where the application, connectivity, and everything is defined for each user of those applications."
"It is a stable product. After the initial configuration, you don't have to tweak it much. All systems of Everest IMS work perfectly."
"The most valuable feature is alerting. We get email alerts when a link is down that tell us which device is having a problem."
"We use the solution to automatically trigger processes to help us resolve issues. The whole IT process has been automated, such as trying to map all the users and the escalation process. So, if any issue happens, we get an SMS and WhatsApp of the report. If there is a critical issue this has to be sorted out, like the entire data center being down, then there is an alarm."
"The backup, restore, and comparison features are all good."
"Our response time is within 30 minutes for any support. This solution provides alerts immediately, so we are within our SLA, giving efficiency to our support."
"The feature that I like the most and the best part is the customization."
 

Cons

"I would like to see more expansion in artificial intelligence and machine learning features."
"The initial setup was complex."
"There's a lot of traffic on our network that we don't see sometimes."
"The visualization could be improved, the GUI is not the best."
"We need to be able to filter out internal IPs as non-threats."
"The expensive nature of the tool is an area of concern where improvements are required."
"Improvements are needed on the application layer for complete security analysis."
"It's not great as a standalone solution."
"Email support is a bit slow. Once you drop an email, it takes time."
"The graphical view of the topology does not show us all of the connectivity in our network, which is something that could be improved."
"I would like to see an integrated view of Infraon IMS and Infraon Desk. It would be very helpful if that were integrated into the solution."
"The GUI is in need of improvement. It is not drag-and-drop or easy to use."
"I would like to have the option to add a new device or meet with the next release. Right now, it needs to be done from the backend which results in a heavy reliance on R&D."
"This solution is available in SaaS. The reason why we have not gone to SaaS is they do not have a country-specific separation of assets. There are GDPR and other requirements that might require country-specific sensitive information to be filtered as well as other things that need to be taken care of. Normally, if we need to do any compliance, like ISO27000 compliance, they don't have such a report within their system. This kind of report is missing from their SaaS. That is one of the reasons that we have gone to the on-prem version, where I am assured that my data is secure."
"There might be some features in other products that are currently not there in Everest IMS and can be included. I have not yet compared it with any other product."
"We have enquired if there are any possibilities of monitoring non-IPBS devices."
 

Pricing and Cost Advice

"​Licensing is done by flows per second, not including outside (in traffic)."
"One of the things which bugs me about Lancope is the licensing. We understand how licensing works. Our problem is when we bought and purchased most of these Lancope devices, we did so with our sister company. Somewhere within the purchase and distribution, licensing got mixed up. That is all on Cisco, and it is their responsibility. They allotted some of our sister company's equipment to us, and some of our equipment to them. To date, they have never been able to fix it."
"NetFlow is very expensive."
"This is an expensive product. We have quit paying for support because we don't want to have to upgrade it and keep paying for it."
"Today, we are part of the big Cisco ELA, and it is a la carte. We can get orders for whatever we want. At the end of the day, we have to pay for it in one big expense, but that is fine. We are okay with that."
"Pricing is much higher compared to other solutions."
"The licensing costs are outrageous."
"The solution is expensive. It costs several hundred thousand dollars per year (depending on how many flows you are collecting)."
"We pay for a number of devices on the accounts and since it is on-premises, we pay the maintenance charges for the year."
"The pricing is reasonable, given the features that they provide."
"The cost model is within our budget. I have less than 180 critical assets, but the moment that I have 1,000 assets, then the license model is totally different. I don't know whether they are capable of handling that kind of a load. They could revisit the licensing model."
"I think that the pricing for this solution is reasonable and varies by number of devices."
"Licensing is calculated on a per-user basis."
"If you are looking for the best product with the best price, Infraon is the best product. We evaluated five to six products and finally felt Infraon was better because of the pricing model, especially because it was more flexible."
report
Use our free recommendation engine to learn which Network Monitoring Software solutions are best for your needs.
859,129 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
26%
Financial Services Firm
11%
Government
9%
Manufacturing Company
7%
Manufacturing Company
13%
Construction Company
13%
Real Estate/Law Firm
12%
Computer Software Company
12%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Cisco Stealthwatch?
The most valuable feature of Cisco Secure Network Analytics is the Threat Intelligence integration.
What is your experience regarding pricing and costs for Cisco Stealthwatch?
Regarding cost, for the Bangladesh context, Cisco Secure Network Analytics is a little bit high-priced because we are a developing country, making it tough to manage affordable solutions. However, ...
What needs improvement with Cisco Stealthwatch?
In terms of improvements for Cisco Secure Network Analytics, from the implementation point of view, now that AI is in use, some other features need to be upgraded considering AI solutions. Proper m...
What is the best network monitoring software for large enterprises?
It actually depends on the exact purpose or requirements. Some tools are better for only network devices while others are better from a cloud monitoring or APM monitoring perspective. You can check...
 

Also Known As

Cisco Stealthwatch, Cisco Stealthwatch Enterprise, Lancope StealthWatch
Everest IMS
 

Overview

 

Sample Customers

Edge Web Hosting, Telenor Norway, Ivy Tech Community College of Indiana, Webster Financial Corporation, Westinghouse Electric, VMware, TIAA-CREF
Airtel, BSNL, BlackBox Corporation, ACT, Geojit, Canara Bank, Federal Bank, Corporation Bank, Birla Corporation, CESC Limited, Mphasis, GAIL, Udaan, Cowrks, SEBI, PowerGrid, ION, Summit Communications, National Information Technology Center (Nepal), Bhutan National Bank, Servion T, Greenlam, Translab Technologies, CMSIT Services, Nelco, HPCL, Navitas Life Sciences etc. 
Find out what your peers are saying about Cisco Secure Network Analytics vs. Infraon IMS and other solutions. Updated: June 2025.
859,129 professionals have used our research since 2012.