Try our new research platform with insights from 80,000+ expert users

Cisco Secure Network Analytics vs Sangfor Cyber Command comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Network Analytics
Ranking in Network Detection and Response (NDR)
7th
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
61
Ranking in other categories
Network Monitoring Software (33rd), Network Traffic Analysis (NTA) (5th), Cisco Security Portfolio (8th)
Sangfor Cyber Command
Ranking in Network Detection and Response (NDR)
16th
Average Rating
8.6
Reviews Sentiment
7.1
Number of Reviews
2
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of August 2025, in the Network Detection and Response (NDR) category, the mindshare of Cisco Secure Network Analytics is 7.0%, down from 9.0% compared to the previous year. The mindshare of Sangfor Cyber Command is 1.1%, up from 1.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Network Detection and Response (NDR)
 

Featured Reviews

Muhammad Harun-Owr-Roshid - PeerSpot reviewer
Have streamlined network visibility and troubleshooting while seeing benefits from AI integration
In terms of improvements for Cisco Secure Network Analytics, from the implementation point of view, now that AI is in use, some other features need to be upgraded considering AI solutions. Proper management of the database is also important; it should be centralized for easier data collection from a single database. When precise manual analysis is needed, it's sometimes difficult, so having a centralized database will allow network admins to find actual scenarios more effectively, especially since some information may not be visible on the GUI. Cisco should upgrade their hardware part to run the database, because sometimes it cannot handle the load while all features are running in the network. The database management should indeed be centralized because while AI runs behind the systems, central management is essential. For example, in a network with 100 Cisco switches, a few routers, firewalls, and access points, all data generated should be preserved in a central database. This approach simplifies management and analysis for troubleshooting, as GUI interfaces may not always provide visible information. Centralizing the database will allow for better understanding of which information is preserved for each specific device.
Zaid Farooqui - PeerSpot reviewer
Helped our organization by providing a comprehensive picture of our cyber posture in terms of threat intelligence
The most valuable feature is the capability to correlate all the vulnerabilities or threats detected from different sources. It does a very good job in correlating and identifying threat actors. Its integration with other products such as HCI, Firewall, and VDI solution for native control and detection also adds significant value.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"StealthWatch lets me see the ports running in and out and the country. It has excellent reporting, telemetry, and artificial intelligence features. With the telemetry, I can set thresholds to detect sudden changes and the alarms go through the PLC parts. I can see all the ports running on that trunk."
"The deployment was a breeze. It is a very innovative and robust platform that allows us to bi-directionally stitch together data elements from Netflow-enabled devices to provide a context for network utilization."
"Stealthwatch has greatly improved our network visibility, in terms of bandwidth, malware, and PCI violations."
"Most valuable features are the network maps and server and network response time."
"Another notable feature of Cisco Secure Network Analytics is its Layer 7 visibility, which allows us to monitor and analyze network communications at the application layer."
"The most valuable feature we got out of Stealthwatch is to be able to, while troubleshooting, go deep into one of our interfaces and verify what the bandwidth is and if there's any activity there that's causing problems."
"The most valuable feature is anomaly detection, where it finds things that are not allowed internally."
"The most valuable part is that Stealthwatch is part of a portfolio of security devices from Cisco. Cisco literally can touch every single end point, every single ingress and egress point in the network. Nobody else has that."
"The tool is a good product in the NDR market. Its valuable features are ease of management and breach of response features. It is an easy-to-learn solution."
"The most valuable feature is the capability to correlate all the vulnerabilities or threats detected from different sources."
"Sangfor Cyber Command has helped our organization by providing a comprehensive picture of our cyber posture in terms of threat intelligence."
 

Cons

"There's a lot of traffic on our network that we don't see sometimes."
"The overall visibility into the actual device itself would be helpful. I don't just want support-specific data, but also to be able to see information such as CPU and other internal components or usage of the devices."
"One update that I would like to see is an agent-based client. Currently, Stealthwatch is network-based. A local agent could help manage endpoints."
"We are continuing down the road of ACI and ISE with Cisco, so we would like to see the continuation of Stealthwatch integrating into ISE for exchange of information, and also, more into the ACI environment too."
"The initial setup was straightforward but required a lot of data entry, to begin with building out the server types and network types."
"I would like Cisco to make it easier for the administrators to use it."
"The reporting of day-to-day metrics still has room for improvement."
"The version with the Dell server had iDRAC problems. Often, it reported iDRAC failure."
"The product needs to improve its dashboard. Integration with existing systems has been challenging. When comparing it with Trend Micro, which offers an all-in-one NDR solution, the tool's integration process can be difficult."
"Technical support could be improved, and I rate them a seven. The support team has fewer cybersecurity resources capable of managing Cyber Command compared to other solutions."
"The solution could improve by incorporating email security."
 

Pricing and Cost Advice

"Licensing is on a yearly basis."
"NetFlow is very expensive."
"It is worth the cost."
"On a yearly basis, licensing is somewhere around $30,000."
"​Licensing is done by flows per second, not including outside (in traffic)."
"It has a subscription model. There is yearly support, and there is also three-year support. It depends on what the customers want."
"The tool is not cheaply priced."
"This is an expensive product. We have quit paying for support because we don't want to have to upgrade it and keep paying for it."
Information not available
report
Use our free recommendation engine to learn which Network Detection and Response (NDR) solutions are best for your needs.
865,164 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
24%
Government
10%
Financial Services Firm
9%
Manufacturing Company
9%
Manufacturing Company
14%
Hospitality Company
13%
Computer Software Company
11%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Cisco Stealthwatch?
The most valuable feature of Cisco Secure Network Analytics is the Threat Intelligence integration.
What is your experience regarding pricing and costs for Cisco Stealthwatch?
Regarding cost, for the Bangladesh context, Cisco Secure Network Analytics is a little bit high-priced because we are a developing country, making it tough to manage affordable solutions. However, ...
What needs improvement with Cisco Stealthwatch?
In terms of improvements for Cisco Secure Network Analytics, from the implementation point of view, now that AI is in use, some other features need to be upgraded considering AI solutions. Proper m...
What do you like most about Sangfor Cyber Command?
The tool is a good product in the NDR market. Its valuable features are ease of management and breach of response features. It is an easy-to-learn solution.
What needs improvement with Sangfor Cyber Command?
The solution could improve by incorporating email security. Additionally, there is room for improvement in the technical support capability side, as there are relatively fewer cybersecurity profess...
What is your primary use case for Sangfor Cyber Command?
The primary use case for Sangfor Cyber Command is threat hunting. It correlates vulnerabilities and threats detected from various sources including user side, server side, and Internet-facing and i...
 

Also Known As

Cisco Stealthwatch, Cisco Stealthwatch Enterprise, Lancope StealthWatch
No data available
 

Overview

 

Sample Customers

Edge Web Hosting, Telenor Norway, Ivy Tech Community College of Indiana, Webster Financial Corporation, Westinghouse Electric, VMware, TIAA-CREF
Information Not Available
Find out what your peers are saying about Cisco Secure Network Analytics vs. Sangfor Cyber Command and other solutions. Updated: July 2025.
865,164 professionals have used our research since 2012.