We performed a comparison between Cisco Secure Network Analytics and Commvault Cloud based on real PeerSpot user reviews.
Find out what your peers are saying about Zabbix, Datadog, Auvik and others in Network Monitoring Software."We can manage the entire system across the network and troubleshoot the pain points."
"Able to drill down into a center's utilization, then create reports based on it."
"The most valuable features are encrypted threat analysis and the ability to run jobs on entire flows."
"The solution reduces the amount of time it takes to detect and remediate threats."
"The most valuable feature of this solution is data hoarding because it catches threats on a frequent basis that we had no idea of."
"It's easy to set up. The deployment takes one or two days. You need to collect the data from a device and then direct it to the portal."
"I believe this solution has reduced our incident response time."
"Using the Cognitive Analytics feature, we have complete visibility that we didn’t have before."
"The most valuable features of this solution are the logging, keeping threats under control, and keeping our data and environment secure."
"The Commvault Complete Data Protection interface is straightforward to use."
"We recommend this product for people who are running the Oracle Virtualization Manager."
"Metallic helped me to restore the data within an hour, which is much faster than restoring from Microsoft services."
"The features I find most helpful in Commvault are its ability to perform incremental backups and significantly reduce backup times for our diverse multi-architecture, multi-environment environment."
"The initial setup is straightforward."
"Great archive feature, OnePass, for the file system and Exchange servers."
"The backup and restore capabilities are key. The most useful things to us about Commvault, in general, is the breadth of the applications that it can protect as well as the features inside of it, like deduplication and encryption. When people get their data encrypted, Commvault has a way to tell if somebody is being attacked through a cybersecurity threat because their data changes. So, Commvault has what they call honeypot files out there to look to see if anybody is changing these files. Only Commvault knows which files those are, so nobody should be messing with those files. If it changes, then it will alert you to say, "Oh, I potentially have somebody messing with my files." It will alert you to something going on in your environment that probably shouldn't be happening. We deploy that with all our customers so they have this capability as well."
"Whoever has an Endpoint license can store unlimited data on the cloud."
"The Wi-Fi side needs improvement."
"One update that I would like to see is an agent-based client. Currently, Stealthwatch is network-based. A local agent could help manage endpoints."
"Cisco Stealthwatch needs more integration with device discovery. We have to do a lot of hard work to figure out what things are. Better service integration is required."
"I would like to see it better organized when I'm looking at it."
"Its granularity for RBAC roles-based access control needs improvement."
"They should include Citrix VDIs in the next release."
"Many of these tools require extensive on-premises hardware to run."
"I would like to see a hybrid solution that can work without being connected directly to the internet for those destinations."
"Stealthwatch needs improvement when it comes to speed."
"It is a little more complicated than it really needs to be."
"Our main pain point is that some of our hardware is old. For example, the SSD disks for our application database are slow. It's hard to avoid a slowdown in our environment because the size of our backups is growing every year. If you're growing and don't upgrade the environment, you will see slower backups and restores. You must enhance the environment if you are growing."
"It takes a lot of steps to implement backups. We have to do a lot of planning to make the solution work properly. It takes some time to create every policy. It's an easy task, but there are many steps. It's not as easy as using Veeam."
"The product does not provide an option to save a copy of data on-premises."
"Commvault is complex even if the product has comprehensive solutions and covers pretty much every technology out there. There's no unified way to manage all of the products on one single console."
"The solution is expensive in comparison to similar solutions."
"The Java interface is not great. The Command Center interface is far better and it looks nicer, but it doesn't have all the powerful features available in the CommServe/Java console. The place to improve the product is on the management interface level."
"Command Center definitely gives us a complete view of our data. But finding some of the granular, very small items that we sometimes have to find, such as auxiliary copies for tapes, I still find that it's easier to navigate and, sometimes, only possible to find them using the CommCell tool."
More Cisco Secure Network Analytics Pricing and Cost Advice →
Cisco Secure Network Analytics is ranked 24th in Network Monitoring Software with 57 reviews while Commvault Cloud is ranked 3rd in Backup and Recovery with 104 reviews. Cisco Secure Network Analytics is rated 8.2, while Commvault Cloud is rated 8.6. The top reviewer of Cisco Secure Network Analytics writes "Increased the visibility of what is happening in our network". On the other hand, the top reviewer of Commvault Cloud writes "Provides excellent visibility and helps reduce costs and time". Cisco Secure Network Analytics is most compared with Darktrace, Cisco Secure Cloud Analytics, ThousandEyes, Vectra AI and Arista NDR, whereas Commvault Cloud is most compared with Veeam Backup & Replication, Rubrik, Veeam Backup for Microsoft 365, Azure Backup and Zerto.
We monitor all Network Monitoring Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.