"One of the core features is that Vectra AI triages threats and correlates them with compromised host devices. From a visibility perspective, we can better track the threat across the network. Instead of us potentially finding one device that has been impacted without Vectra AI, it will give us the visibility of everywhere that threat went. Therefore, visibility has increased for us."
"It keeps up with the network traffic, which is a good thing. It provides more context to plain alerts compared to using an older system. So, it helps an analyst reduce the information overload."
"The administrative privilege detection feature is the most valuable feature. The admin accounts are often highly accessible to the high-risk component of the environment. If those accounts are compromised or are being used in a suspicious manner, that's high-fidelity events for us to look into."
"It does a reliable job of parsing out the logs of all the network traffic so that we can ingest them into our SIEM and utilize them for threat hunting and case investigations. It is pretty robust and reliable. The administration time that we spend maintaining it or troubleshooting it is very low. So, the labor hour overhead is probably our largest benefit from it. We spend 99% of our time in Vectra investigating cases, responding to incidents, or hunting, and only around 1% of our time is spent patching, troubleshooting, or doing anything else. That's our largest benefit from Vectra."
"The dashboard gives me a scoring system that allows me to prioritize things that I should look at. I may not necessarily care so much about one event, whereas if I have a single botnet detection or a brute force attack, I really want to get on top of those."
"It has helped us to organize our security. We get a better overview on what is happening on the network, which has helped us get quicker responses to users. If we see malicious activity, then we can quickly take action on it. Previously, we weren't getting an overview as fast as we are now, so we can now provide a quicker response."
"Cognito Streams gives you a detailed view of what happens in the network in the form of rich metadata. It is just a super easy way to capture network traffic for important protocols, giving us an advantage. This is very helpful on a day-to-day basis."
"The most valuable feature for Cognito Detect, the main solution, is that external IDS's create a lot of alerts. When I say a lot of alerts I really mean a lot of alerts. Vectra, on the other hand, contextualizes everything, reducing the number of alerts and pinpointing only the things of interest. This is a key feature for me. Because of this, a non-trained analyst can use it almost right away."
"What the network team found most valuable in SolarWinds NetFlow Traffic Analyzer is that it helps them to troubleshoot or analyze the issue. For example, traffic that comes from our location: India, goes to the US, so for the network team to analyze where the traffic comes from and where it is directed, and whether the packets are being dropped, they use SolarWinds NetFlow Traffic Analyzer. The network team also likes that through the solution, they can analyze the complete traffic utilization and how they're going to use it. SolarWinds NetFlow Traffic Analyzer is user-friendly. The team finds it comfortable to use."
"The integration with other SolarWinds products is good."
"They have instructional videos and other information available on the site to assist you with learning it."
"What I like the most is the bandwidth assessment."
"The most valuable feature is the ability to look for any increases in bandwidth over time so that we can plan before it becomes critical."
"For managing the traffic, it provides you a response about whether the traffic is down, up, or heavy, which is a very powerful feature. It has a good response time. We have been using this solution for many years, and we don't have any problem with this solution."
"The software management tools are very useful for our customers."
"We are able to monitor our virtual infrastructure, virtual machines, windows servers, databases, and the network using a simple network management protocol. We are able to pull almost all the metrics that we want, receive notifications, and have them integrate with telegrams for certain devices that are critical, such as UPSs."
"The most valuable feature is service assurance."
"The most valuable feature is the monitoring of virtual machines."
"The overall functionality of Zabbix is very good. The monitoring of bank applications that Zabbix provides is great. The information is displayed on a dashboard that is easily viewed."
"Like other common Linux distributions, some of the most valuable features of this solution are the ease of use and deployment. It's simple and has a lot of packages and a lot of software."
"During my testing, the features that I like the most are that it can be integrated with my system, and it provides me with reports of all of my servers."
"It is a great product. The SNMP protocol tracking feature is good. I really like how it tracks SNMP. The alerts are also great."
"Every new asset placed in the environment can be automatically detected, predicting human failures."
"Integration with other security components needs improvement. It should have true integration as opposed to just being a separate pane of glass."
"In comparison with a lot of systems I used in the past, the false positives are really a burden because they are taking a lot of time at this moment."
"Vectra is still limited to packet management. It's only monitoring packet exchanges. While it can see a lot of things, it can't see everything, depending on where it's deployed. It has its limits and that's why I still have my SIEM."
"I would like to see data processed onshore. Right now, the cloud components, like Office 365, must be processed on servers outside of Australia. I would like to see a future adoption of onshore processing."
"I would like more integrations with IOCs and threats currently on the Internet. I would also like to know which threats are based on zero-day attacks, current botnets, etc. Therefore, I would like more information on external threats."
"If you hit a certain number of rules, triage filters, or groups, the UX responds more slowly. However, we have a complex network and a lot of rules. So, our setup might not be a typical implementation example. We even had UX engineers onsite, and they looked at issues, improvements, and user feedback. Since then, it has gotten a lot better, they even built in features that we specifically requested for our company."
"It does a little bit of packet capture on alert so you can look at the packet capture activity going on, but it doesn't collect a whole lot of data. Sometimes it's only one or two frames, sometimes it does collect more. That's why they have the addition of their Recall platform, because that really does help expand the capability."
"They use a proprietary logging format that is probably 90% similar to Bro Logs. Their biggest area of improvement is finishing out the remaining 10%. That 10% might not be beneficial to their ML engine, but that's fine. The industry standard is Zeek Logs or Bro Logs, or Bro or Zeek, depending on how old you are. While they have 90% of those fields, they're still missing some fields. In very rare instances, some community rules do not have the fields that they need, and we had to modify community rules for our logs. So, their biggest area of improvement would be to just finish their matching of the Zeek standard."
"There are some areas for improvement in SolarWinds NetFlow Traffic Analyzer. There are some challenges with the solution when compared to other monitoring tools such as difficulty in operations and difficulty with backup installation. My team is currently trying out different solutions but would need to see how it goes."
"It's scalable, but it could be simplified because it's not completely easy."
"Technical support could be improved with quicker response times."
"I would like to see better customization capabilities."
"I would like to see more artificial intelligence capabilities."
"It's not a cheap product, so the pricing could be improved."
"If your network is on SolarWinds, and you notice that the traffic is bad because it says "user downloading a heavy file," it doesn't indicate which endpoint is downloading those heavy files. SolarWinds doesn't have the tools to be able to handle this kind of situation. You can just notice through your network device that the traffic is becoming overwhelming or heavy, but you cannot go inside and get more details related to the endpoint where it is happening. We would like SolarWinds to be able to handle this kind of situation and even manage the traffic inside a network from the endpoint to the network device. These would be good enhancements. It is mostly stable. The problem comes only when we want to add another SolarWinds model. SolarWinds has so many models, and sometimes when we want to add other models on the platforms that are reserved for our firm, it freezes. When this happens, we have to create a new VM for that model."
"The product could be more secure and more stable."
"There's a small module of APM, however, it is not an enhanced version. People usually ask for a full-fledged APM solution."
"My company wanted to do an exercise command to access IT from Cameroon. They wanted to access an FSS to a second host with second equipment that was on another coast but it is not possible on Zabbix to do it. They want to directly access from the front-end of Zabbix to access a prompt in Zabbix to an access terminal. In the front-end, there is no way to do that. That would be an important improvement."
"Its UI should be improved. They did some improvements in version 5, but it could benefit from some more work. Its integrations should also be improved. They've been active for one year, and they seem to have noticed that. It has new integrations, but it could benefit from more integrations. As far as I know, there is no model to push statistics, metrics, or events towards Zabbix. This type of API isn't yet there, whereas some other tools provide an API for this."
"It would be helpful if they translated the documentation to Cyrillic languages."
"Zabbix claims that there is an auto-discovery process but my team member was facing difficulty and was told that it's not really automatic, and there are some manual steps."
"The documentation could be improved."
"As far as improvements, sometimes I get a bit frustrated when I move from a previous version to a new one because some configuration has changed—I need to investigate the documentation to deal with some configuration. But it doesn't take much time, so it's okay."
Vectra threat detection and response is a complete cybersecurity platform that collects, detects, and prioritizes security alerts. The Cognito platform for Network Detection and Response (NDR) detects and responds to attacks inside cloud, data center, Internet of Things, and enterprise networks. The platform also provides automated response capabilities for low-level threats and escalates more severe anomalies to security personnel.
Cognito captures data for multiple relevant sources and enriches it with context and security insights. It starts by deploying sensors across different networks in datacenters, IoT, or enterprise networks. The algorithm extracts relevant metadata from network and cloud traffic. The information can also be non-security information that can help investigation.
The data is enriched with security context to support critical use cases, such as threat detection, investigation, hunting and compliance. The platform is machine learning-based, which enables it to adapt to any new and current threat scenario. It detects, clusters, prioritizes, and anticipates attacks by using identity and host-level enforcement.
With the Vectra platform, a person can investigate 50 threats in just two hours. By prioritizing alerts and leveraging threat intelligence, it provides faster results.Vectra solves today’s security challenges for network detection and response.
One of Vectra’s best features is the emphasis they put in pairing research and data science for security insights. It offers behavior codification with unsupervised, supervised, and deep learning models.
The pricing is according to a subscription model with a free trial available.Vectra is available for Office 365, Azure AD and AWS Brain.
Features of Vectra AI
Benefits of Vectra AI
Other advantages of Vectra services include that they can be deployed in the public, private, or hybrid cloud. Support is available via email or online ticketing with an average of 4 hours of response. Phone support is available 24/7.
Vectra provides full on-site and online training and documentation. Regarding the user interface, it supports several types of web browsers, such as Internet Explorer, Microsoft Edge, Firefox, Chrome, Safari and Opera. However, it is not available for mobile devices.
Reviews from Real Users
Here’s what PeerSpot users of Vectra AI have to say about it:
"One of the core features is that Vectra AI triages threats and correlates them with compromised host devices. From a visibility perspective, we can better track the threat across the network. Instead of us potentially finding one device that has been impacted without Vectra AI, it will give us the visibility of everywhere that threat went. Therefore, visibility has increased for us." - Dave W., Operations Manager at a healthcare company
"It does a reliable job of parsing out the logs of all the network traffic so that we can ingest them into our SIEM and utilize them for threat hunting and case investigations. It is pretty robust and reliable. The administration time that we spend maintaining it or troubleshooting it is very low.” - T.S., Senior Security Engineer at a manufacturing company
Zabbix is a free software tool traditionally used for monitoring your organization’s IT infrastructure, including networks, servers, virtual machines, and cloud services. Zabbix makes it possible for you to maintain control of your infrastructure by collecting any metric from any source. The solution also offers agentless monitoring, synthetic monitoring, custom collection methods, and data transformation.
Zabbix has many valuable key features, including:
Action Log, Anomaly Detection, Auditing, Automated Actions, Availability Reports, Capacity Planning, Custom Scripts, Custom Templates, Data Retrieval, Drill-Down Reports, Encryption, Event Correlation, History Data Analysis, Metric Collection, Multiple Authentication Methods, Multiple Severity Levels, Native WMI Support for Windows Agent, Network Discovery, Notifications, Root Cause Analysis, Trend Prediction, WMI Support, Web Services Widget-based Dashboards, Zero-Maintenance
There are several benefits to implementing Zabbix. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Below are some reviews and helpful feedback written by Zabbix users.
PeerSpot user Shibu B., Regional Manager/ Service Delivery at ASPL Info Services, says, "The solution is quite mature and very stable. The monitoring capabilities of the product are excellent.” He also adds, “The solution is very easy to scale and the product is open-source, meaning there aren't any licensing costs associated with it.”
Julian L., Senior Specialist Critical Infrastructure at an educational organization, comments that the solution is “A complete solution that doesn't cost anything, does what I need it to do, and has easy-to-use templates and very good scalability.” He also mentions “The agents are pretty cool. They're easy to roll out. The standard out-of-the-box templates are also pretty easy to use. The integration with other learning products is also good.”
Faycal N., CEO/Founder at Zen Networks, praises the product, mentioning, “Its overall flexibility is most valuable. When our customers have some custom applications that are not necessarily covered by the community or a standard monitoring tool, we use Zabbix to build our own modules with our own templates. This feature has been useful in using Zabbix for infrastructure and IT monitoring. It has also been useful for industrial equipment monitoring. Zabbix is very lightweight. It is efficient in terms of performance because it doesn't use a lot of resources."
SolarWinds NetFlow Traffic Analyzer is ranked 6th in Network Traffic Analysis (NTA) with 7 reviews while Zabbix is ranked 1st in Network Monitoring Software with 49 reviews. SolarWinds NetFlow Traffic Analyzer is rated 7.6, while Zabbix is rated 8.2. The top reviewer of SolarWinds NetFlow Traffic Analyzer writes "User-friendly and helps in troubleshooting issues and analyzing utilization". On the other hand, the top reviewer of Zabbix writes "Very mature, easy to scale, and free to use". SolarWinds NetFlow Traffic Analyzer is most compared with Cisco Stealthwatch, Auvik, Plixer Scrutinizer, Centreon and SolarWinds NPM, whereas Zabbix is most compared with Nagios XI, Centreon, Nagios Core, Splunk and Zenoss Service Dynamics. See our SolarWinds NetFlow Traffic Analyzer vs. Zabbix report.
We monitor all Network Traffic Analysis (NTA) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.