Try our new research platform with insights from 80,000+ expert users

Darktrace vs Threat Stack Cloud Security Platform [EOL] comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 10, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.0
Darktrace enhances security with threat detection and vulnerability exposure, providing financial benefits despite deployment challenges.
Sentiment score
7.3
Threat Stack Cloud Security boosted compliance and revenue, reduced staffing needs, enhanced security, and expanded infrastructure dramatically.
Other NDR solutions provide virtual appliances that can be deployed on virtualization servers to get up and running quickly.
Using this solution provides financial benefits by securing from server attacks, which offers indirect savings.
 

Customer Service

Sentiment score
7.6
Darktrace customer service is responsive and helpful, praised for efficient issue resolutions and proactive engagement with users.
Sentiment score
7.4
Threat Stack Cloud Security Platform's support is praised for responsiveness, precise solutions, and effective communication with technical representatives.
The challenge lies in waiting for a response after logging a ticket.
Any queries I have logged are responded to efficiently.
I can rate Darktrace's technical support as one of the best products in the world.
 

Scalability Issues

Sentiment score
7.6
Darktrace is praised for its scalability, seamless expansion, robust architecture, and capacity to manage increasing demands effectively.
Sentiment score
8.2
Threat Stack Cloud Security Platform is scalable, easy to deploy, and efficient across AWS accounts, with minor configuration concerns.
Since it's cloud-based, it expands easily.
There is still a gap in terms of storage, and we are trying to figure out how to increase that capacity for regulated environments, which require data retention for 5 to 6 years.
Darktrace has high scalability, and I would rate it a nine out of ten.
 

Stability Issues

Sentiment score
8.5
Darktrace is praised for its reliability and stability, offering seamless performance and quick resolutions to occasional issues.
Sentiment score
7.5
Threat Stack Cloud Security Platform [EOL] is stable and efficient, with minor GUI and agent issues for some users.
The stability of Darktrace is excellent, rated ten out of ten.
The appliance itself has never let me down.
For stability, I would rate Darktrace an eight out of ten.
 

Room For Improvement

Users seek better SIEM integration, improved automation, user-friendly interfaces, and enhanced protection with more intuitive reports and dashboards.
Threat Stack Cloud Security Platform needs UI improvements, better API alignment, and enhanced integrations, especially for serverless and container environments.
There is no dedicated salesperson in Egypt, and having one would help to improve focus on this market.
We need Darktrace on each branch to get the data out, and I suggest having some kind of a centralized product that gets data from multiple sources to aggregate and provide the data.
They say they can integrate with most firewalls, but when we did an integration with Meraki MX firewalls, that integration didn't work and still doesn't work to this day.
 

Setup Cost

Darktrace offers flexible payment options but is costly, especially for small businesses, justified by its advanced features.
Threat Stack Cloud Security Platform offers value with transparent pricing, ranging $15-$20 monthly, seen as competitively priced by users.
The product is considered expensive compared to others.
The pricing is costly in USD, and they charge based on device counts.
The pricing is affordable and not very expensive.
 

Valuable Features

Darktrace provides AI-driven security with fast responses, real-time monitoring, and autonomous threat management, minimizing false positives efficiently.
Threat Stack Cloud Security platform is esteemed for its configurability, integration, monitoring capabilities, and effective alert management.
If more than 2.5 gigabytes of data have been pulled in a few minutes, it engages by blocking for one-hour intervals, alerts, and extends the block until it goes into full isolation if the violation continues.
After deploying Darktrace, we gain insights into machine-to-machine communication, which adds more value to the organization and is especially beneficial for the SOC team.
I do not need to manually process incidents as Darktrace provides an incident summary, potential detection paths, and other details, all exportable with just a click.
 

Categories and Ranking

Darktrace
Average Rating
8.2
Reviews Sentiment
7.2
Number of Reviews
82
Ranking in other categories
Email Security (8th), Intrusion Detection and Prevention Software (IDPS) (1st), Network Traffic Analysis (NTA) (1st), Network Detection and Response (NDR) (1st), Extended Detection and Response (XDR) (6th), Cloud Security Posture Management (CSPM) (15th), Cloud-Native Application Protection Platforms (CNAPP) (11th), Attack Surface Management (ASM) (4th), AI-Powered Cybersecurity Platforms (2nd)
Threat Stack Cloud Security...
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
8
Ranking in other categories
No ranking in other categories
 

Q&A Highlights

CW
Feb 11, 2020
 

Featured Reviews

Malebo Lethoba Group - PeerSpot reviewer
Have found the AI analyst and detection functions highly valuable for network operations while managing complexity in initial setup
The functions I find most valuable in Darktrace are the AI analyst as well as the detection.The autonomous response capabilities of Darktrace are not crucial for me because it doesn't work in a network where there are no core switches. In a modern network, the autonomous response doesn't work, especially when sitting in a shared data center.If I'm running a traditional network where I am not in a shared data center with a layer two dedicated for my resources, then it can work for me. However, if I am in a data center where I don't have layer two, it becomes an issue because the autonomous response is reliant on sending spoofed TCP resets to my core switch to block traffic, which is a major issue.
SC
SecOps program for us, as a smaller company, is amazing; they know what to look for
They could give a few more insights into security groups and recommendations on how to be more effective. That's getting more into the AWS environment, specifically. I'm not sure if that's Threat Stack's plan or not, but I would like them to help us be efficient about how we're setting up security groups. They could recommend separation of VPCs and the like - really dig into our architecture. I haven't seen a whole lot of that and I think that's something that, right off the bat, could have made us smarter. Even as part of the SecOps Program, that could be helpful; a quick analysis. They're analyzing our whole infrastructure and saying, "You have one VPC and that doesn't make a lot of sense, that should be multiple VPCs and here's why." The architecture of the servers in whatever cloud-hosting provider you're on could be helpful. Other than that, they should continue to expand on their notifications and on what's a vulnerability. They do a great job of that and we want them to continue to do that. It would be cool, since the agent is already deployed and they know about the server, they know the IP address, and they know what vulnerability is there, for them to test the vulnerability and see if they can actually exploit it. Or, once we patch it, they could double-check that it can't be. I don't know how hard that would be to build. Thinking on it off the top off my head, it could be a little challenging but it could also be highly interesting. It would also be great if we could test a couple of other features like hammering a server with 100 login attempts and see what happens. Real test scenarios could be really helpful. That is probably more something close to what they do with the SOC 2 audit or the report. But more visualization of that, being able to test things out on our infrastructure to make sure we can or can't hit this box could be interesting.
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
865,164 professionals have used our research since 2012.
 

Answers from the Community

CW
Feb 11, 2020
Feb 11, 2020
I that feel there are two old problems still there in the market: 1-Vendors don't talk to each other. 2-Whoever is focusing on endpoint is missing the network and human side and the opposite is also true. I love, for example, what Darktrace is doing in the network side and the playback option to know what happened in my network during a long holiday, for example, things will never be caught by...
2 out of 9 answers
reviewer973458 - PeerSpot reviewer
Aug 26, 2019
Raffael Marty, Vice President, Forcepoint Research and Intelligence, said: "There is no artificial intelligence in the field of information security, and it is unlikely to be developed in 2019." Most of unsupervised machine learning-based network anomaly detection solution does not provide why the anomaly has been aroused and whether the anomaly is malicious or not. Most of such solution's pricing model is based on number of endpoints but I prefer to have flat fee subscription-based.
IT
Aug 26, 2019
I that feel there are two old problems still there in the market: 1-Vendors don't talk to each other. 2-Whoever is focusing on endpoint is missing the network and human side and the opposite is also true. I love, for example, what Darktrace is doing in the network side and the playback option to know what happened in my network during a long holiday, for example, things will never be caught by a second-generation AV but I need to have a solid 2nd gen. AV besides the total high cost of Darktrace which by the way is worth it for IT pros but not for business owners. We need to have something like virus total but for risks and threats beyond viruses where all vendors work on this and all endpoint customers with different vendors connect to it to be secured.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Manufacturing Company
9%
Financial Services Firm
8%
Government
7%
Manufacturing Company
12%
Performing Arts
12%
University
9%
Computer Software Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Crowdstrike Falcon compare with Darktrace?
Both of these products perform similarly and have many outstanding attributes. CrowdStrike Falcon offers an amazing user interface that makes setup easy and seamless. CrowdStrike Falcon offers a cl...
Which is better - SentinelOne or Darktrace?
Which solution is better depends on which is more suitable specifically for your company. Darktrace, for example, is meant for smaller to medium-sized businesses. It is also a good option for organ...
What do you like most about Darktrace?
A very useful feature in Darktrace for real-time threat analysis is the packet inspection that analyzes the packet traffic in real time.
Ask a question
Earn 20 points
 

Also Known As

No data available
Threat Stack, CSP,
 

Overview

 

Sample Customers

Irwin Mitchell, Open Energi, Wellcome Trust, FirstGroup plc, Virgin Trains, Drax, QUI! Group, DNK, CreaCard, Macrosynergy, Sisley, William Hill plc, Toyota Canada, Royal British Legion, Vitol, Allianz, KKR, AIRBUS, dpd, Billabong, Mclaren Group.
StatusPage.io, Walkbase, Spanning, DNAnexus, Jobcase, Nextcapital, Smartling, Veracode, 6sense
Find out what your peers are saying about Darktrace, Check Point Software Technologies, Fortinet and others in Intrusion Detection and Prevention Software (IDPS). Updated: July 2025.
865,164 professionals have used our research since 2012.