We changed our name from IT Central Station: Here's why

Cisco Stealthwatch Cloud vs Splunk User Behavior Analytics comparison

Cancel
You must select at least 2 products to compare!
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Monitoring the traffic, making sure you have the visibility."

More Cisco Stealthwatch Cloud Pros →

"The product is at the forefront of auto-remediation networking. It's great.""This is a good security product.""The solution appears to be stable, although we haven't used it heavily."

More Splunk User Behavior Analytics Pros →

Cons
"The initial setup is a bit complex in terms of deployment and configuration"

More Cisco Stealthwatch Cloud Cons →

"Currently, a lot of network operations need improvement. We still need people to handle incidents. Our vision is to leverage status and convert it directly from the network devices. It would be ideal if we could take action using APIs and API code and remove manual processes.""The price of Splunk UBA is too high.""I'm not aware of any lacking features."

More Splunk User Behavior Analytics Cons →

report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
564,599 professionals have used our research since 2012.
Questions from the Community
Top Answer: 
All features are valuable. That's why we purchased it, and that's why we onsell it. We find it very useful for the analysis and consolidation of specific security incidents. We then do the reporting… more »
Top Answer: 
We are in South Africa, and their cloud service is located in the US or the UK. We don't have a local instance in South Africa, and this is still a concern from a customer-experience point of view. We… more »
Top Answer: 
We're a reseller. Our clients are in the financial vertical as well as in the telecommunication vertical. We onsell this solution. We've got an MSSP license, and we propose this solution to clients.
Top Answer: 
The solution appears to be stable, although we haven't used it heavily.
Top Answer: 
We simply use the free demo version of the product. We do not pay any licensing fees at this time.
Ranking
Views
2,539
Comparisons
2,124
Reviews
1
Average Words per Review
276
Rating
N/A
Views
7,974
Comparisons
5,634
Reviews
3
Average Words per Review
389
Rating
8.7
Comparisons
Also Known As
Observable Networks
Caspida, Splunk UBA
Learn More
Overview

Cisco Stealthwatch Cloud improves security and incident response across the distributed network, from the private network and branch office to the public cloud. This solution addresses the need for digital businesses to quickly identify threats posed by their network devices and cloud resources, and to do so with minimal management, oversight, and security manpower.

Splunk User Behavior Analytics is a behavior-based threat detection is based on machine learning methodologies that require no signatures or human analysis, enabling multi-entity behavior profiling and peer group analytics – for users, devices, service accounts and applications. It detects insider threats and external attacks using out-of-the-box purpose-built that helps organizations find known, unknown and hidden threats, but extensible unsupervised machine learning (ML) algorithms, provides context around the threat via ML driven anomaly correlation and visual mapping of stitched anomalies over various phases of the attack lifecycle (Kill-Chain View). It uses a data science driven approach that produces actionable results with risk ratings and supporting evidence that increases SOC efficiency and supports bi-directional integration with Splunk Enterprise for data ingestion and correlation and with Splunk Enterprise Security for incident scoping, workflow management and automated response. The result is automated, accurate threat and anomaly detection.
Offer
Learn more about Cisco Stealthwatch Cloud
Learn more about Splunk User Behavior Analytics
Sample Customers
Options, Schneider Electric, Washington University in St Louis, Gotcha, Kraft Kennedy, PartnerRe, Sumologic, Veterans United, AFGE, Agraform, Artesys, Dynamic Ideas Financials, Department of Agriculture and Commerce
8 Securities, AAA Western, AdvancedMD, Amaya, Cerner Corporation, CJ O Shopping, CloudShare, Crossroads Foundation, 7-Eleven Indonesia
Top Industries
VISITORS READING REVIEWS
Comms Service Provider44%
Computer Software Company19%
Financial Services Firm5%
Government5%
REVIEWERS
Financial Services Firm50%
Insurance Company13%
Government13%
Security Firm13%
VISITORS READING REVIEWS
Computer Software Company25%
Comms Service Provider21%
Government8%
Financial Services Firm8%
Company Size
No Data Available
REVIEWERS
Small Business25%
Midsize Enterprise33%
Large Enterprise42%
Find out what your peers are saying about Darktrace, Vectra AI, GFI and others in Intrusion Detection and Prevention Software (IDPS). Updated: January 2022.
564,599 professionals have used our research since 2012.

Cisco Stealthwatch Cloud is ranked 22nd in Intrusion Detection and Prevention Software (IDPS) with 1 review while Splunk User Behavior Analytics is ranked 11th in Intrusion Detection and Prevention Software (IDPS) with 3 reviews. Cisco Stealthwatch Cloud is rated 0.0, while Splunk User Behavior Analytics is rated 8.6. The top reviewer of Cisco Stealthwatch Cloud writes "Offers great visibility of your traffic". On the other hand, the top reviewer of Splunk User Behavior Analytics writes "Stable, with good automation capabilities, however, we want to be able to automate even more". Cisco Stealthwatch Cloud is most compared with Cisco Stealthwatch, Microsoft Defender for Endpoint, Darktrace, CrowdStrike Falcon and Cortex XDR by Palo Alto Networks, whereas Splunk User Behavior Analytics is most compared with Darktrace, Cisco Stealthwatch, ELK Elasticsearch, Exabeam Fusion SIEM and IBM QRadar User Behavior Analytics.

See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.

We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.