"Monitoring the traffic, making sure you have the visibility."
"The product is at the forefront of auto-remediation networking. It's great."
"This is a good security product."
"The solution appears to be stable, although we haven't used it heavily."
"The initial setup is a bit complex in terms of deployment and configuration"
"Currently, a lot of network operations need improvement. We still need people to handle incidents. Our vision is to leverage status and convert it directly from the network devices. It would be ideal if we could take action using APIs and API code and remove manual processes."
"The price of Splunk UBA is too high."
"I'm not aware of any lacking features."
Cisco Stealthwatch Cloud improves security and incident response across the distributed network, from the private network and branch office to the public cloud. This solution addresses the need for digital businesses to quickly identify threats posed by their network devices and cloud resources, and to do so with minimal management, oversight, and security manpower.
Cisco Stealthwatch Cloud is ranked 22nd in Intrusion Detection and Prevention Software (IDPS) with 1 review while Splunk User Behavior Analytics is ranked 11th in Intrusion Detection and Prevention Software (IDPS) with 3 reviews. Cisco Stealthwatch Cloud is rated 0.0, while Splunk User Behavior Analytics is rated 8.6. The top reviewer of Cisco Stealthwatch Cloud writes "Offers great visibility of your traffic". On the other hand, the top reviewer of Splunk User Behavior Analytics writes "Stable, with good automation capabilities, however, we want to be able to automate even more". Cisco Stealthwatch Cloud is most compared with Cisco Stealthwatch, Microsoft Defender for Endpoint, Darktrace, CrowdStrike Falcon and Cortex XDR by Palo Alto Networks, whereas Splunk User Behavior Analytics is most compared with Darktrace, Cisco Stealthwatch, ELK Elasticsearch, Exabeam Fusion SIEM and IBM QRadar User Behavior Analytics.
See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.