We performed a comparison between Broadcom Network Flow Analysis and Cisco Secure Network Analytics based on real PeerSpot user reviews.
Find out in this report how the two Network Monitoring Software solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We can manage the entire system across the network and troubleshoot the pain points."
"This solution has helped our organization by allowing us to have visibility. We deal with cybersecurity, so visibility is very important."
"It is an overall stable solution."
"It's a dependable product that is able to pinpoint where we have vulnerabilities if they occur."
"The feature most valuable for us is to gain visibility of what is actually floating through, so we can stop it based on whether it's good or bad traffic."
"The most valuable feature of this solution is data hoarding because it catches threats on a frequent basis that we had no idea of."
"The most valuable feature of Cisco Secure Network Analytics is the Threat Intelligence integration."
"It has definitely helped us improve our mean time to resolution on network issues."
"The beginning of any security investigation starts with net flow data."
"The most valuable feature is integration."
"StealthWatch lets me see the ports running in and out and the country. It has excellent reporting, telemetry, and artificial intelligence features. With the telemetry, I can set thresholds to detect sudden changes and the alarms go through the PLC parts. I can see all the ports running on that trunk."
"The Wi-Fi side needs improvement."
"I would like to see more security features, like a lost protection package."
"Currently, Broadcom Network Flow Analysis does not support high-availability solutions, making it an area that needs improvement."
"One update I would like to see is an agent-based client. Currently StealthWatch is network based."
"Some of our customers find this solution to be a little bit tough because they don't understand how to configure and use it."
"Stealthwatch needs improvement when it comes to speed."
"If there was one improvement I’d suggest it would be that it detect traffic through an intranet. The product requires that traffic flow through a managed network device. The product is designed mostly for enterprise environments and not smaller environments or businesses."
"We determined that Stealthwatch wouldn't provide the machine learning model that we required."
"Many of these tools require extensive on-premises hardware to run."
"We would like the solution to make more advances in the way that Extreme Networks has been doing."
"It's a good solid solution but integration with Network Access Control products with Cisco ISE would be good."
More Broadcom Network Flow Analysis Pricing and Cost Advice →
More Cisco Secure Network Analytics Pricing and Cost Advice →
Broadcom Network Flow Analysis is ranked 65th in Network Monitoring Software with 6 reviews while Cisco Secure Network Analytics is ranked 24th in Network Monitoring Software with 57 reviews. Broadcom Network Flow Analysis is rated 8.4, while Cisco Secure Network Analytics is rated 8.2. The top reviewer of Broadcom Network Flow Analysis writes "A stable tool that helps identify the complete flow analysis in a network". On the other hand, the top reviewer of Cisco Secure Network Analytics writes "Increased the visibility of what is happening in our network". Broadcom Network Flow Analysis is most compared with WatchTower Security Management App, Wireshark and SCOM, whereas Cisco Secure Network Analytics is most compared with Darktrace, Cisco Secure Cloud Analytics, ThousandEyes, Vectra AI and Arista NDR. See our Broadcom Network Flow Analysis vs. Cisco Secure Network Analytics report.
See our list of best Network Monitoring Software vendors.
We monitor all Network Monitoring Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.