We performed a comparison between Cisco Secure Network Analytics and Trend Micro Deep Discovery based on real PeerSpot user reviews.
Find out in this report how the two Network Monitoring Software solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We can manage the entire system across the network and troubleshoot the pain points."
"It has been pretty stable since we deployed it, and everything seems to be working fine."
"The most valuable feature about this solution is that it gives me insight of my network."
"It does change the way we troubleshoot and it is relatively easy to use once you learn it. I would recommend it to someone considering it."
"It has definitely helped us improve our mean time to resolution on network issues."
"The deployment was a breeze. It is a very innovative and robust platform that allows us to bi-directionally stitch together data elements from Netflow-enabled devices to provide a context for network utilization."
"The solution has increased our threat detection rate. Cisco Stealthwatch has not reduced our incident response times. It has not reduced the amount of time it takes us to detect immediate threats. It has reduced false positives."
"Stealthwatch has greatly improved our network visibility, in terms of bandwidth, malware, and PCI violations."
"The fact that it can identify down to an IP address of a system that is causing problems, or potentially causing problems, is very valuable."
"The product's initial setup phase was not difficult."
"The most valuable features are the protection and that it is fast."
"The tool's most valuable feature is its collaboration with other products. Integrating with other security products was simple and easy."
"As a security product, managing threats is crucial for my clients."
"There is no downtime or server vulnerability with this solution."
"The most valuable feature of Trend Micro Deep Discovery is its complete end-to-end visibility of threats."
"The most valuable features are monitoring for advanced persistent threats, the system runs in a sandbox allowing for effective zero-day exploits management, and the Inspector has a built-in sandbox."
"Generally speaking, it just gives us a broad understanding of exactly what kind of threats occur. The submission point, analyzing point, and virtualization are within the environment that it supports. It helped us to improve our security levels and protect our internal network from any threats outside."
"The Wi-Fi side needs improvement."
"We would like the solution to make more advances in the way that Extreme Networks has been doing."
"The ability to be natively integrated into Port Aggregator would be beneficial because it would reduce just one more component that's needed in order to have that type of view."
"Initially, I felt Cisco Secure Network Analytics lacked integration with Splunk."
"Stealthwatch is still maturing in AI. It uses artificial intelligence for predictions, but AI still needs to mature. It is in a phase where you get 95% correct detection. As its AI engine learns more, it will become more accurate. This is applicable to all the devices that are using AI because they support both supervised and unsupervised machine learning. The accuracy in the case of supervised machine learning is dependent on the data you feed into the box. The accuracy in the case of unsupervised machine learning is dependent on the algorithm. The algorithm matures depending on retrospective learning, and this is how it is able to detect zero-day attacks."
"The configuration of the solution was quite complex."
"The initial setup was complex."
"We've had problems with element licensing costs so scalability is a concern."
"I would like to see more and cleaner reporting. For example, if I pull up Steven and I want to look and maybe compare him to what you've done in the past week, and compare that to the past six months, the point would be to see what the difference in activity looks like over this time. I don't see that capability in reporting to date. You see that trend but you don't really see a straightforward comparison. That right there is key to what we want to see about the normal activity."
"The scalability is sometimes limited."
"The stability of the solution could be improved. It should be 100% stable, but it's not there right now."
"Trend Micro can improve the pricing in general. There is nothing else they can add or improve in the solution."
"The solution needs to be able to integrate better with third-party infrastructure."
"The solution needs improvement in terms of pricing."
"Scalability becomes an issue when managing a higher number of customers."
"There are certain aspects of flexibility in the policies that should be added to Deep Discovery."
"I would like to see integration with third-party tools to improve the visibility of the dashboards."
More Cisco Secure Network Analytics Pricing and Cost Advice →
Cisco Secure Network Analytics is ranked 24th in Network Monitoring Software with 57 reviews while Trend Micro Deep Discovery is ranked 6th in Intrusion Detection and Prevention Software (IDPS) with 23 reviews. Cisco Secure Network Analytics is rated 8.2, while Trend Micro Deep Discovery is rated 8.4. The top reviewer of Cisco Secure Network Analytics writes "Increased the visibility of what is happening in our network". On the other hand, the top reviewer of Trend Micro Deep Discovery writes "Good threat detection capabilities and offers flexibility for hosting options". Cisco Secure Network Analytics is most compared with Darktrace, Cisco Secure Cloud Analytics, ThousandEyes and Vectra AI, whereas Trend Micro Deep Discovery is most compared with Darktrace, Trend Micro TippingPoint Threat Protection System, Arista NDR, Vectra AI and ExtraHop Reveal(x). See our Cisco Secure Network Analytics vs. Trend Micro Deep Discovery report.
We monitor all Network Monitoring Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.