We performed a comparison between Broadcom Network Flow Analysis and Cisco Secure Network Analytics based on real PeerSpot user reviews.
Find out in this report how the two Network Monitoring Software solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We can manage the entire system across the network and troubleshoot the pain points."
"The single dashboard is a valuable feature."
"This solution has helped our organization by allowing us to have visibility. We deal with cybersecurity, so visibility is very important."
"It is an overall stable solution."
"The artifacts available in the tool provide better information for analyzing network traffic. It enables a holistic view of network traffic and general packet analysis. It's easy to identify anomalies without the use of signatures. The way in which we implemented Stealthwatch Cloud has enabled my team to analyze traffic behind proxies."
"The solution's analytics and thrust detection capabilities are good. We're still adjusting it. It's a little hypersensitive, but it is working right now."
"I value the feature which enables me to detect devices talking to suspect IPs."
"Cisco Stealthwatch provides the solutions analytics and threat detection capabilities that I am looking for. It has also improved the network visibility of our organization."
"Most of the engineers I've worked with have been really good. Very knowledgeable and easy to work with."
"Using the Cognitive Analytics feature, we have complete visibility that we didn’t have before."
"It's easy to set up. The deployment takes one or two days. You need to collect the data from a device and then direct it to the portal."
"Most valuable features are the network maps and server and network response time."
"The technical support needs improvement."
"The Wi-Fi side needs improvement."
"Currently, Broadcom Network Flow Analysis does not support high-availability solutions, making it an area that needs improvement."
"I would like to see more security features, like a lost protection package."
"We are continuing down the road of ACI and ISE with Cisco, so we would like to see the continuation of Stealthwatch integrating into ISE for exchange of information, and also, more into the ACI environment too."
"We would like the solution to make more advances in the way that Extreme Networks has been doing."
"We need to be able to filter out internal IPs as non-threats."
"I would like to see some improvement when it comes to reporting."
"The reporting of day-to-day metrics still has room for improvement."
"I would like to see it better organized when I'm looking at it."
"It's not great as a standalone solution."
"Its granularity for RBAC roles-based access control needs improvement."
More Juniper Mist Premium Analytics Pricing and Cost Advice →
More Broadcom Network Flow Analysis Pricing and Cost Advice →
More Cisco Secure Network Analytics Pricing and Cost Advice →
Broadcom Network Flow Analysis is ranked 65th in Network Monitoring Software with 6 reviews while Cisco Secure Network Analytics is ranked 24th in Network Monitoring Software with 57 reviews. Broadcom Network Flow Analysis is rated 8.4, while Cisco Secure Network Analytics is rated 8.2. The top reviewer of Broadcom Network Flow Analysis writes "A stable tool that helps identify the complete flow analysis in a network". On the other hand, the top reviewer of Cisco Secure Network Analytics writes "Increased the visibility of what is happening in our network". Broadcom Network Flow Analysis is most compared with WatchTower Security Management App, Wireshark and SCOM, whereas Cisco Secure Network Analytics is most compared with Darktrace, Cisco Secure Cloud Analytics, ThousandEyes, Vectra AI and Arista NDR. See our Broadcom Network Flow Analysis vs. Cisco Secure Network Analytics report.
See our list of best Network Monitoring Software vendors.
We monitor all Network Monitoring Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.