We performed a comparison between Cisco Secure Network Analytics and Splunk User Behavior Analytics based on real PeerSpot user reviews.
Find out in this report how the two Network Monitoring Software solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We can manage the entire system across the network and troubleshoot the pain points."
"The most valuable part is that Stealthwatch is part of a portfolio of security devices from Cisco. Cisco literally can touch every single end point, every single ingress and egress point in the network. Nobody else has that."
"The most valuable feature of Cisco Secure Network Analytics is the Threat Intelligence integration."
"Using this solution has helped us to detect and identify viruses or malicious activity in the network early on."
"The most valuable feature about this solution is that it gives me insight of my network."
"It works efficiently for encrypted traffic analysis."
"Cisco Stealthwatch has reduced the amount of time to detect an immediate threat."
"It has been pretty stable since we deployed it, and everything seems to be working fine."
"The most valuable feature is its alerts and dashboard."
"Because of some of the visualizations that we utilize, we are able to understand strange, unusual traffic on our networks."
"The most valuable features are its data aggregation and the ability to automatically identify a number of threats, then suggest recommended actions upon them."
"We are really pleased with Splunk and its features. It would be practically impossible to function without it. To provide a general overview of the system, it's important to note that the standard log files are currently around 250 gigabytes per day. It would be impossible to manually walk through these logs by hand, which is why automation is essential."
"The solution is fast, flexible, and easy to use."
"The most valuable features are the indexing and powerful search features."
"The solution is extremely scalable. Our customers are regularly scaling up after installing Splunk."
"It's straightforward in terms of configuration and troubleshooting and log management and monitoring as well. These are the edge points in addition to it being a modular solution where you can capitalize on your current licenses with extra licensing models, which can match the customer's business requirement and it can help the customer to design or to actually plan for their own roadmap."
"It's easily scalable."
"The Wi-Fi side needs improvement."
"Stealthwatch is still maturing in AI. It uses artificial intelligence for predictions, but AI still needs to mature. It is in a phase where you get 95% correct detection. As its AI engine learns more, it will become more accurate. This is applicable to all the devices that are using AI because they support both supervised and unsupervised machine learning. The accuracy in the case of supervised machine learning is dependent on the data you feed into the box. The accuracy in the case of unsupervised machine learning is dependent on the algorithm. The algorithm matures depending on retrospective learning, and this is how it is able to detect zero-day attacks."
"The visualization could be improved, the GUI is not the best."
"I would like to see it better organized when I'm looking at it."
"We determined that Stealthwatch wouldn't provide the machine learning model that we required."
"I would like to see more expansion in artificial intelligence and machine learning features."
"One update that I would like to see is an agent-based client. Currently, Stealthwatch is network-based. A local agent could help manage endpoints."
"If there was one improvement I’d suggest it would be that it detect traffic through an intranet. The product requires that traffic flow through a managed network device. The product is designed mostly for enterprise environments and not smaller environments or businesses."
"It's too complicated to install, when starting out."
"The correlation engine should have persistent and definable rules."
"I would like improved downward integration with other tools such as McAfee and other GCP solutions."
"They should work to add more built-in correlation searches and more use cases based on worldwide customer experiences. They need more ready-made use cases."
"We want to have an automated system for bot hunting that enables us to detect anomalies predictively based on historical data. It would be helpful if Splunk included process mining as an alternative option. We have a threat workflow, but it would be useful if we could supplement that with some process mining capabilities over time."
"The initial setup was complex because some of the configurations that we required needed customization."
"I'm not aware of any lacking features."
"We'd like the ability to do custom searches."
"The solution is much more expensive than relative competitors like ArcSight or LogRhythm. It makes it hard to sell to customers sometimes."
More Cisco Secure Network Analytics Pricing and Cost Advice →
More Splunk User Behavior Analytics Pricing and Cost Advice →
Cisco Secure Network Analytics is ranked 24th in Network Monitoring Software with 57 reviews while Splunk User Behavior Analytics is ranked 2nd in User Entity Behavior Analytics (UEBA) with 17 reviews. Cisco Secure Network Analytics is rated 8.2, while Splunk User Behavior Analytics is rated 8.2. The top reviewer of Cisco Secure Network Analytics writes "Increased the visibility of what is happening in our network". On the other hand, the top reviewer of Splunk User Behavior Analytics writes "Easy to configure and easy to use solution that integrates with many applications and scripts ". Cisco Secure Network Analytics is most compared with Darktrace, Cisco Secure Cloud Analytics, ThousandEyes, Vectra AI and Trend Micro Deep Discovery, whereas Splunk User Behavior Analytics is most compared with Darktrace, Microsoft Defender for Identity, IBM Security QRadar, Varonis Datalert and Microsoft Purview Insider Risk Management. See our Cisco Secure Network Analytics vs. Splunk User Behavior Analytics report.
We monitor all Network Monitoring Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.