We performed a comparison between Cisco Secure Network Analytics and Qualys VMDR based on real PeerSpot user reviews.
Find out what your peers are saying about Zabbix, Datadog, Auvik and others in Network Monitoring Software."The single dashboard is a valuable feature."
"We can manage the entire system across the network and troubleshoot the pain points."
"I value the feature which enables me to detect devices talking to suspect IPs."
"Able to drill down into a center's utilization, then create reports based on it."
"The most valuable feature we got out of Stealthwatch is to be able to, while troubleshooting, go deep into one of our interfaces and verify what the bandwidth is and if there's any activity there that's causing problems."
"The fact that it can identify down to an IP address of a system that is causing problems, or potentially causing problems, is very valuable."
"If you are using Darktrace or NAC solutions you can integrate Stealthwatch."
"The most valuable feature of Cisco Secure Network Analytics is the Threat Intelligence integration."
"There are already many functionalities, so I don't think there is anything to improve."
"We find that Stealthwatch can detect the unseen."
"There are many features. Its reliability, ease of installation, ease of use, and the richness of the information provided are the most valuable features."
"The biggest benefit is from a security operations perspective, where we are able to drive our security posture upwards by remediating any discovered vulnerabilities."
"This is one of the best products I have worked with so far. I like the power of Qualys, and it's a better solution because you can scan a compact file, a BIT file, or batch files. The product already knows what's happening inside, and you don't need to expand the package. Tenable will do the same thing, but you need to have a package issuance claim. With Qualys, we can immediately understand the file, even a compact file. If there's some kind of discovery or incident, you will know what happened in the environment."
"Qualys VM had a recent upgrade and the newer version is supporting the cloud."
"Qualys VM has allowed us to know the vulnerabilities we need to prioritize based on the threat levels and the possible impact if there's an intrusion."
"This solution gives us insight into our environment and improves our security. It helps us to maintain a good patching system whereby we know that XYZ is vulnerable within the system."
"The solution shows us classic categories, including high, medium, and low risks. It also shows critical items, and that gives us the advantage of prioritizing things."
"The most valuable features are vulnerability scanning, policy compliance scanning, and tablet for web application scanning."
"The Wi-Fi side needs improvement."
"The technical support needs improvement."
"One update I would like to see is an agent-based client. Currently StealthWatch is network based."
"Reliance on Java. Get away from that."
"I would like the search page available with Cisco Stealthwatch to be more intuitive. The previous release was better than the current one for the UI."
"We haven't seen ROI."
"The overall visibility into the actual device itself would be helpful. I don't just want support-specific data, but also to be able to see information such as CPU and other internal components or usage of the devices."
"Complexity on integration is not so straightforward and you really need an expert to help build it out."
"I would like to see more expansion in artificial intelligence and machine learning features."
"Cisco could improve the administration for the customers."
"Its integration with ServiceNow and other similar products is complicated and can be improved. It should also have virtual batching. They should support more standards and compliance requirements and more customizations. For policy compliance, they can add the standards required by the countries in the Middle East. Each country generates its own standards and frameworks, and those frameworks should be there in all products, not only in Qualys. The market here is huge, especially in the cybersecurity field. Qatar has a framework for Qatar 2022, and each and every company in the public or private sector has to follow the Qatar 2022 framework."
"Sometimes we face a problem with accessing the tool and not getting an expected result. From a technology point of view, they need to look into this."
"One of the biggest issues from the clients' perspective is that all Qualys computing is on the cloud."
"They should make it accessible for more operating systems."
"Some of the older features could be polished instead of focusing on releasing new features."
"Endpoint stability and fault resolution could be improved."
"The IoT scan is not great."
"When you want to cover yourself for scalability, you will be charged for the number you place on the scan itself."
More Juniper Mist Premium Analytics Pricing and Cost Advice →
More Cisco Secure Network Analytics Pricing and Cost Advice →
Cisco Secure Network Analytics is ranked 24th in Network Monitoring Software with 58 reviews while Qualys VMDR is ranked 3rd in Risk-Based Vulnerability Management with 77 reviews. Cisco Secure Network Analytics is rated 8.2, while Qualys VMDR is rated 8.2. The top reviewer of Cisco Secure Network Analytics writes "Increased the visibility of what is happening in our network". On the other hand, the top reviewer of Qualys VMDR writes "Good visibility but expensive and needs better support". Cisco Secure Network Analytics is most compared with Darktrace, Cisco Secure Cloud Analytics, ThousandEyes, Vectra AI and Arista NDR, whereas Qualys VMDR is most compared with Tenable Nessus, Tenable Security Center, Rapid7 InsightVM, Microsoft Defender Vulnerability Management and Tenable Vulnerability Management.
We monitor all Network Monitoring Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.