Try our new research platform with insights from 80,000+ expert users

Cisco Secure Network Analytics vs Sangfor Cyber Command comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Network Analytics
Ranking in Network Detection and Response (NDR)
5th
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
60
Ranking in other categories
Network Monitoring Software (22nd), Network Traffic Analysis (NTA) (3rd), Cisco Security Portfolio (7th)
Sangfor Cyber Command
Ranking in Network Detection and Response (NDR)
17th
Average Rating
8.6
Reviews Sentiment
7.1
Number of Reviews
2
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2025, in the Network Detection and Response (NDR) category, the mindshare of Cisco Secure Network Analytics is 7.2%, down from 10.2% compared to the previous year. The mindshare of Sangfor Cyber Command is 1.0%, down from 1.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Network Detection and Response (NDR)
 

Featured Reviews

Sudhakar T - PeerSpot reviewer
Strong network security analytics with excellent encrypted traffic analysis features
Improvements are needed on the application layer for complete security analysis. The solution should have the ability to analyze security events not only at the network layer but also at the application and OS layers. There's a need for a more comprehensive licensing model where all necessary licenses are included by default.
Zaid Farooqui - PeerSpot reviewer
Helped our organization by providing a comprehensive picture of our cyber posture in terms of threat intelligence
The most valuable feature is the capability to correlate all the vulnerabilities or threats detected from different sources. It does a very good job in correlating and identifying threat actors. Its integration with other products such as HCI, Firewall, and VDI solution for native control and detection also adds significant value.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It works efficiently for encrypted traffic analysis."
"From what I understand, you can encrypt and unencrypt traffic moving in transit. This is one of the features that we liked about it."
"Cisco products are incredibly stable, boasting a 200% stability."
"Visibility. The ability to look East and West. To see what is passing through your circuits, where it is coming from, and how big it is."
"It does change the way we troubleshoot and it is relatively easy to use once you learn it. I would recommend it to someone considering it."
"Stealthwatch has greatly improved our network visibility, in terms of bandwidth, malware, and PCI violations."
"It provides good visibility to the customers. People are still evaluating it, but it provides visibility and helps them to take action to remediate and mitigate the issues that are highlighted on the dashboard. It has good integration with the Cisco switching platform."
"The most valuable feature is having visibility into the data segments throughout our network."
"Sangfor Cyber Command has helped our organization by providing a comprehensive picture of our cyber posture in terms of threat intelligence."
"The tool is a good product in the NDR market. Its valuable features are ease of management and breach of response features. It is an easy-to-learn solution."
"The most valuable feature is the capability to correlate all the vulnerabilities or threats detected from different sources."
 

Cons

"At my company, we might not be using it enough with other applications that we have that can integrate with it."
"One update I would like to see is an agent-based client. Currently StealthWatch is network based."
"It's not great as a standalone solution."
"Its granularity for RBAC roles-based access control needs improvement."
"I would like to see more and cleaner reporting. For example, if I pull up Steven and I want to look and maybe compare him to what you've done in the past week, and compare that to the past six months, the point would be to see what the difference in activity looks like over this time. I don't see that capability in reporting to date. You see that trend but you don't really see a straightforward comparison. That right there is key to what we want to see about the normal activity."
"Reliance on Java. Get away from that."
"Stealthwatch needs improvement when it comes to speed."
"The configuration of the solution was quite complex."
"Technical support could be improved, and I rate them a seven. The support team has fewer cybersecurity resources capable of managing Cyber Command compared to other solutions."
"The product needs to improve its dashboard. Integration with existing systems has been challenging. When comparing it with Trend Micro, which offers an all-in-one NDR solution, the tool's integration process can be difficult."
"The solution could improve by incorporating email security."
 

Pricing and Cost Advice

"The pricing for this solution is good."
"Pricing is much higher compared to other solutions."
"This is an expensive product. We have quit paying for support because we don't want to have to upgrade it and keep paying for it."
"Licensing is on a yearly basis."
"The licensing costs are outrageous."
"It is worth the cost."
"​Licensing is done by flows per second, not including outside (in traffic)."
"It has a subscription model. There is yearly support, and there is also three-year support. It depends on what the customers want."
Information not available
report
Use our free recommendation engine to learn which Network Detection and Response (NDR) solutions are best for your needs.
849,686 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
28%
Financial Services Firm
11%
Government
9%
Manufacturing Company
7%
Hospitality Company
13%
Manufacturing Company
13%
Computer Software Company
11%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Cisco Stealthwatch?
The most valuable feature of Cisco Secure Network Analytics is the Threat Intelligence integration.
What is your experience regarding pricing and costs for Cisco Stealthwatch?
The organization experienced challenges with licensing as Cisco has multiple licensing factors, and there are concerns about the price. Cisco solutions are considered to be very expensive.
What needs improvement with Cisco Stealthwatch?
Improvements are needed on the application layer for complete security analysis. The solution should have the ability to analyze security events not only at the network layer but also at the applic...
What do you like most about Sangfor Cyber Command?
The tool is a good product in the NDR market. Its valuable features are ease of management and breach of response features. It is an easy-to-learn solution.
What needs improvement with Sangfor Cyber Command?
The solution could improve by incorporating email security. Additionally, there is room for improvement in the technical support capability side, as there are relatively fewer cybersecurity profess...
What is your primary use case for Sangfor Cyber Command?
The primary use case for Sangfor Cyber Command is threat hunting. It correlates vulnerabilities and threats detected from various sources including user side, server side, and Internet-facing and i...
 

Also Known As

Cisco Stealthwatch, Cisco Stealthwatch Enterprise, Lancope StealthWatch
No data available
 

Overview

 

Sample Customers

Edge Web Hosting, Telenor Norway, Ivy Tech Community College of Indiana, Webster Financial Corporation, Westinghouse Electric, VMware, TIAA-CREF
Information Not Available
Find out what your peers are saying about Cisco Secure Network Analytics vs. Sangfor Cyber Command and other solutions. Updated: April 2025.
849,686 professionals have used our research since 2012.