We performed a comparison between Cisco Secure Network Analytics and Tenable SecurityCenter Continuous View [EOL] based on real PeerSpot user reviews.
Find out what your peers are saying about Zabbix, Datadog, Auvik and others in Network Monitoring Software."We can manage the entire system across the network and troubleshoot the pain points."
"The solution's analytics and thrust detection capabilities are good. We're still adjusting it. It's a little hypersensitive, but it is working right now."
"The beginning of any security investigation starts with net flow data."
"The most valuable features of this solution are the logging, keeping threats under control, and keeping our data and environment secure."
"Overall, the implementation is very good."
"Stability is the most valuable feature we have seen in this solution."
"The most valuable part is that Stealthwatch is part of a portfolio of security devices from Cisco. Cisco literally can touch every single end point, every single ingress and egress point in the network. Nobody else has that."
"It is a good application, providing for real-time monitoring of the organization of data. It can basically identify points of peak traffic where possible issues are being caused."
"The most valuable features of this solution are its reporting and mitigation capabilities."
"Through porting, we can see how the improvement is happening over a period of time. We can see the overall scenario from the last year, where were we were and where we currently stand."
"The scanning itself is really the core of the tool, and it's what we're most interested in."
"We can manage everything with only a single console on the Tenable SecurityCenter. We can pull and define the policy. We can perform every task on the Tenable SecurityCenter."
"The first of the valuable features is how easy it is to access all of the information that's gathered from the assessments... With a lot of other technologies, like Rapid7, if you're using Nexpose you effectively have to be a DBA to get some of the lower-level results from the scans. And Qualys wasn't very intuitive."
"The next big one is supportability. In a large enterprise, we have many types of technologies. The technology we previously had didn't even support authentication to a lot of those technologies."
"The Wi-Fi side needs improvement."
"There could be better integration on the programming side, which uses Python. StealthWatch could provide a template for Python to manage the switches. For example, it would be nice if StealthWatch bounced a port automatically it detected something anomalous."
"I would like to see it better organized when I'm looking at it."
"The initial setup is complex, as there is a lot to configure."
"We need to be able to filter out internal IPs as non-threats."
"There's a lot of traffic on our network that we don't see sometimes."
"We are continuing down the road of ACI and ISE with Cisco, so we would like to see the continuation of Stealthwatch integrating into ISE for exchange of information, and also, more into the ACI environment too."
"At my company, we might not be using it enough with other applications that we have that can integrate with it."
"It's too complicated to install, when starting out."
"When it comes to... dynamic application scanning, I think they are lagging behind the curve. They have a lackluster solution, to the point where I think they need to determine, as a company, whether or not that's a space they even want to play in."
"One area which is missing is cloud security because there are a lot of configurations. Rapid7 has a product called a DV cloud. I would like to have a similar kind of solution and feature."
"There are certain circumstances where they may have found a vulnerable service and they just removed the service completely from the device because nobody was using it. There's no way to go into SecurityCenter and mark it, to say, "This is no longer an issue. It doesn't exist anymore." Or, "The risk was accepted for one year, so let's not report it as 'high' until that one year period is done." The handling of operational flow around vulnerability management could be improved."
"In terms of what could be improved, some customers have a problem with SecurityCenter's ticket system. If I want them to assign one of the issues, they may want to assign someone to it or to assign it somewhere else and I may want to break up the ticket."
More Cisco Secure Network Analytics Pricing and Cost Advice →
More Tenable SecurityCenter Continuous View [EOL] Pricing and Cost Advice →
Earn 20 points
Cisco Secure Network Analytics is ranked 24th in Network Monitoring Software with 57 reviews while Tenable SecurityCenter Continuous View [EOL] doesn't meet the minimum requirements to be ranked in Network Monitoring Software. Cisco Secure Network Analytics is rated 8.2, while Tenable SecurityCenter Continuous View [EOL] is rated 8.4. The top reviewer of Cisco Secure Network Analytics writes "Increased the visibility of what is happening in our network". On the other hand, the top reviewer of Tenable SecurityCenter Continuous View [EOL] writes "Provides the best network-based vulnerability scanning, but the dynamic scanning is lackluster". Cisco Secure Network Analytics is most compared with Darktrace, Cisco Secure Cloud Analytics, ThousandEyes, Vectra AI and Arista NDR, whereas Tenable SecurityCenter Continuous View [EOL] is most compared with .
See our list of best Network Monitoring Software vendors.
We monitor all Network Monitoring Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.