No more typing reviews! Try our Samantha, our new voice AI agent.

Dragos vs Vectra AI comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Dragos
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
2
Ranking in other categories
Operational Technology (OT) Security (6th)
Vectra AI
Average Rating
8.6
Reviews Sentiment
7.0
Number of Reviews
47
Ranking in other categories
Intrusion Detection and Prevention Software (IDPS) (4th), Network Detection and Response (NDR) (2nd), Extended Detection and Response (XDR) (15th), Identity Threat Detection and Response (ITDR) (9th), AI-Powered Cybersecurity Platforms (6th)
 

Mindshare comparison

While both are Network Security Systems solutions, they serve different purposes. Dragos is designed for Operational Technology (OT) Security and holds a mindshare of 8.5%, down 11.2% compared to last year.
Vectra AI, on the other hand, focuses on Network Detection and Response (NDR), holds 12.5% mindshare, down 16.3% since last year.
Operational Technology (OT) Security Mindshare Distribution
ProductMindshare (%)
Dragos8.5%
Nozomi Networks19.4%
Claroty Platform17.5%
Other54.6%
Operational Technology (OT) Security
Network Detection and Response (NDR) Mindshare Distribution
ProductMindshare (%)
Vectra AI12.5%
Darktrace16.6%
ExtraHop Reveal(x)6.7%
Other64.19999999999999%
Network Detection and Response (NDR)
 

Featured Reviews

JR
OT Cybersecurity Engineer at Nadar
Offers strong incident response features but requires more asset visibility and flexibility
Dragos' best features are that they are more focused towards Incident Response, so they have a dedicated playbook in their platform, making it easier for anyone investigating any incidents to investigate the alerts. One of the main features of Dragos is that they have a dedicated Incident Response team, so if clients need any help, they are there to help. Dragos does real-time monitoring as well, collecting mirror traffic from the span port of the switch, and as soon as it gets the traffic, it analyzes it in real time and shows what's going on in the networks, which relates to the real-time visibility feature for ICS networks.
RR
Consultant at a retailer with 5,001-10,000 employees
Threat detection has improved and malicious emails are now identified quickly
Vectra AI offers artificial intelligence capabilities with visibility that can be integrated into our day-to-day operations and other tools, including malware detection tools and cyber threat tools. Vectra AI has positively impacted my organization. Last year while using it, we received many malicious email threats and virus incidents, including a trojan virus that had reportedly been deployed by someone. Our company used Vectra AI to detect the malicious threats and viruses before they could cause more damage, and we successfully stopped the threats. Using Vectra AI, I notice that server downtime has decreased significantly. We now experience only two to three hours of downtime, whereas without Vectra AI and other tools, our downtime would exceed 48 to 72 hours.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Dragos' best features are that they are more focused towards Incident Response, so they have a dedicated playbook in their platform, making it easier for anyone investigating any incidents to investigate the alerts."
"Dragos is more expensive than other vendors, probably about fifteen to twenty percent more, but it is generally worth the investment."
"If I look at the value I can extract from every Euro that I spend on Vectra, and compare it to every Euro I spend on other solutions, the return on investment on Vectra is way better."
"The biggest feature for us, because we are heavy Microsoft users, is its integration with Office 365. On top of Vectra AI, we use all of the Microsoft security platforms, such as Defender ATP and Sentinel. Having full integration and a central platform to look at all of the threats that are coming through from the different platforms is a huge benefit for us."
"It provides various dashboards that facilitate the identification of connections and can detect data exfiltration, meaning data sent from your environment to another."
"It's easy to manage, and I love the UX. It's very well designed. When we are looking for something, it's quite easy to find it."
"The core product provides excellent visibility, but my favorite feature is Vectra Recall."
"In comparison to some of the other tools that I've come across in this category, I would definitely give it a 10 out of 10."
"What I like best about Vectra AI is that it alerts you about suspicious activities."
"The solution provide visibility into behaviors across the full lifecycle of an attack in our network, beyond just the Internet gateway, and makes our security operations much more effective because we are now looking not just at traffic on the border, but at east-west internal traffic to see not only if an exploit kit is being downloaded, but also if it is then laterally distributed into our environment."
 

Cons

"I think Dragos can offer more flexibility similar to Nozomi and more visibility into the assets, nodes, and links, which would make it more competitive in the future."
"Dragos could improve its asset visibility and discovery tools, as the competitor Claroty has better options in this area."
"I'd like to be able to get granular reports and to be able to output them into formats that are customizable and more useful. The reporting GUI is lacking."
"There is room for improvement in the documentation. We would like to have more details on how it detects what we see."
"Vectra is still limited to packet management. It's only monitoring packet exchanges. While it can see a lot of things, it can't see everything, depending on where it's deployed. It has its limits and that's why I still have my SIEM."
"We would like to see more information with the syslogs. The syslogs that they send to our SIEM are a bit short compared to what you can see. It would be helpful if they send us more data that we can incorporate into our SIEM, then can correlate with other events."
"One of the things that we are missing a bit is the capability to add our own rules to it. At the moment, the tech engine does its thing, but we have some cool ideas to make additional rules. There should be an option in the platform to add custom rules, or there should be some kind of user group where we can suggest them for the roadmap and see if they get evaluated and get transparent communication on whether they will be implemented in the product or not."
"The solution needs to become more proactive. When Vectra AI is the primary solution in an environment - like it is in our case - you must work on response time. We have a small team so response time at endpoint level is vital."
"You are always limited with visibility on the host due to the fact that it is a network based tool. It gives you visibility on certain elements of the attack path, but it doesn't necessarily give you visibility on everything. Specifically, the initial intrusion side of things that doesn't necessarily see the initial compromise. It doesn't see stuff that goes on the host, such as where scripts are run. Even though you are seeing traffic, it doesn't necessarily see the malicious payload. Therefore, it's very difficult for it to identify these type of host-driven complex attacks."
"Some of the customization could be improved. We think the integration with source solutions could be better."
 

Pricing and Cost Advice

Information not available
"At the time of purchase, we found the pricing acceptable. We had an urgency to get something in place because we had a minor breach that occurred at the tail end of 2016 to the beginning of 2017. This indicated we had a lack of ability to detect things on the network. Hence, why we moved quickly to get into the tool in place. We found things like Bitcoin mining and botnets which we closed quickly. In that regard, it was worth the money."
"We have a desire to increase our use. However, it all comes down to budget. It's a very expensive tool that is very difficult to prove business support for. We would like to have two separate networks. We have our corporate network and PCI network, which is segregated due to payment processing. We don't have it for deployed in the PCI network. It would be good to have it fully deployed there to provide us with additional monitoring and control, but the cost associated with their licensing model makes it prohibitively expensive to deploy."
"Their licensing model is antiquated. I'm not a fan of their licensing model. We have to pay for licensing based on four different things. You have to pay based on the number of unique IPs, the number of logs that we send through Recall and Stream, and the size of our environment. They need to simplify their licensing down to just one thing. It should be based on the amount of data, the number of devices, or something else, but there should be just one thing for everything. That's what they need to base their licensing on. Cost-wise, they're not cheap. They were definitely the most expensive option, but you get what you pay for. They're not the cheapest option."
"Vectra is a bit on the higher side in terms of price, but they have always been transparent. The reason that they are this good is that they invest, so they need to charge accordingly."
"The license is based on the concurrent IP addresses that it's investigating. We have 9,800 to 10,000 IP addresses."
"There are additional features that can be purchased in addition to the standard licensing fee, such as Cognito Recall and Stream."
"The solution's pricing was 50 percent lower than the other vendors shortlisted."
"Cost is a big factor, as always. However, I think we have a very good price–performance ratio."
report
Use our free recommendation engine to learn which Operational Technology (OT) Security solutions are best for your needs.
885,728 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Energy/Utilities Company
15%
Manufacturing Company
13%
Construction Company
7%
Comms Service Provider
6%
Financial Services Firm
10%
Manufacturing Company
8%
Computer Software Company
8%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise10
Large Enterprise29
 

Questions from the Community

What is your experience regarding pricing and costs for Dragos?
Dragos is more expensive than other vendors, probably about fifteen to twenty percent more, but it is generally worth the investment.
What needs improvement with Dragos?
I think Dragos could be improved, as I have worked in Nozomi and compared it to Nozomi. Nozomi offers a lot of flexibility in what I am able to learn and unlearn, and I have more visibility towards...
What is your primary use case for Dragos?
I am an engineer in a service provider company where we help clients choose and implement security solutions, and I'm still looking for a new solution. I am certified in Dragos, but I have not depl...
What is the biggest difference between Corelight and Vectra AI?
The two platforms take a fundamentally different approach to NDR. Corelight is limited to use cases that require the eventual forwarding of events and parsed data logs to a security team’s SIEM or ...
What do you like most about Vectra AI?
The solution is currently used as a central threat detection and response system.
What is your experience regarding pricing and costs for Vectra AI?
It is very acceptable when you compare it with Darktrace, for example.
 

Comparisons

 

Also Known As

Dragos Platform
Vectra Networks, Vectra AI NDR
 

Overview

 

Sample Customers

NaturEner
Tribune Media Group, Barry University, Aruba Networks, Good Technology, Riverbed, Santa Clara University, Securities Exchange, Tri-State Generation and Transmission Association
Find out what your peers are saying about Nozomi, Claroty, CyberArk and others in Operational Technology (OT) Security. Updated: March 2026.
885,728 professionals have used our research since 2012.