We performed a comparison between Broadcom Network Flow Analysis and Cisco Secure Network Analytics based on real PeerSpot user reviews.
Find out in this report how the two Network Monitoring Software solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We can manage the entire system across the network and troubleshoot the pain points."
"This solution has helped our organization by allowing us to have visibility. We deal with cybersecurity, so visibility is very important."
"It is an overall stable solution."
"Ease of deployment, once you get your ducks in a row."
"Most of the engineers I've worked with have been really good. Very knowledgeable and easy to work with."
"The most valuable feature about this solution is that it gives me insight of my network."
"It is a good application, providing for real-time monitoring of the organization of data. It can basically identify points of peak traffic where possible issues are being caused."
"The most valuable features provided by this solution are visibility and information."
"The most valuable features of this solution are its reporting and mitigation capabilities."
"The most valuable features of this solution are the logging, keeping threats under control, and keeping our data and environment secure."
"Most valuable features are the network maps and server and network response time."
"The Wi-Fi side needs improvement."
"I would like to see more security features, like a lost protection package."
"Currently, Broadcom Network Flow Analysis does not support high-availability solutions, making it an area that needs improvement."
"The ability to be natively integrated into Port Aggregator would be beneficial because it would reduce just one more component that's needed in order to have that type of view."
"Stealthwatch is still maturing in AI. It uses artificial intelligence for predictions, but AI still needs to mature. It is in a phase where you get 95% correct detection. As its AI engine learns more, it will become more accurate. This is applicable to all the devices that are using AI because they support both supervised and unsupervised machine learning. The accuracy in the case of supervised machine learning is dependent on the data you feed into the box. The accuracy in the case of unsupervised machine learning is dependent on the algorithm. The algorithm matures depending on retrospective learning, and this is how it is able to detect zero-day attacks."
"I would like the search page available with Cisco Stealthwatch to be more intuitive. The previous release was better than the current one for the UI."
"The GUI could use some improvement. Being able to find features more easily would be a great improvement if it was simplified."
"It's a good solid solution but integration with Network Access Control products with Cisco ISE would be good."
"The initial setup was complex."
"At my company, we might not be using it enough with other applications that we have that can integrate with it."
"Stealthwatch needs improvement when it comes to speed."
More Broadcom Network Flow Analysis Pricing and Cost Advice →
More Cisco Secure Network Analytics Pricing and Cost Advice →
Broadcom Network Flow Analysis is ranked 65th in Network Monitoring Software with 6 reviews while Cisco Secure Network Analytics is ranked 24th in Network Monitoring Software with 57 reviews. Broadcom Network Flow Analysis is rated 8.4, while Cisco Secure Network Analytics is rated 8.2. The top reviewer of Broadcom Network Flow Analysis writes "A stable tool that helps identify the complete flow analysis in a network". On the other hand, the top reviewer of Cisco Secure Network Analytics writes "Increased the visibility of what is happening in our network". Broadcom Network Flow Analysis is most compared with WatchTower Security Management App, Wireshark and SCOM, whereas Cisco Secure Network Analytics is most compared with Darktrace, Cisco Secure Cloud Analytics, ThousandEyes, Vectra AI and Arista NDR. See our Broadcom Network Flow Analysis vs. Cisco Secure Network Analytics report.
See our list of best Network Monitoring Software vendors.
We monitor all Network Monitoring Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.