We performed a comparison between Check Point SandBlast Network and Cisco Secure Network Analytics based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Palo Alto Networks, ESET and others in Advanced Threat Protection (ATP)."The zero-day protection is its most valuable feature."
"The most valuable feature of Check Point SandBlast Network is the sandboxing of PDF and Microsoft system files."
"Check Point SandBlast Network Solution provides signature-based as well as zero-day threat protection. Also sandboxing can be performed on an on-premise device, cloud as well as the combination of both. Threat emulation is done on multiple OS & verdict is provided."
"One of its characteristics that we liked the most was its analysis and emulation of activities in the emails since it manages to review them and inspect them if they have an infected attachment."
"SandBlast has opened us up to a lot more opportunities where we can offer this service to clients, that way they don't have to go to a third-party to get this specific solution. It comes in the Check Point Infinity Package so it has helped us a lot."
"It has caught some harmful attachments and downloads."
"You do not need to risk your network by using the in-line sandbox."
"In terms of the scalability, it's expandable across the cloud."
"Great network monitoring, looking at anomaly detection and evaluation."
"The most valuable feature is having visibility into the data segments throughout our network."
"Able to drill down into a center's utilization, then create reports based on it."
"If you are using Darktrace or NAC solutions you can integrate Stealthwatch."
"The ability to send data flow from other places and have them all in one place is very valuable for us."
"We find that Stealthwatch can detect the unseen."
"It has definitely helped us improve our mean time to resolution on network issues."
"Cisco Stealthwatch has reduced the amount of time to detect an immediate threat."
"In Check Point SandBlast, improvement has to be made with respect to the GUI."
"Many Important controls are only available in CLI & very very complicated. All tecli command features should available on GUI so that it will become easy for normal users to monitor & control queue."
"They need to improve the GUI interface."
"We have found a need for the application to be a bit more elastic, bringing it to SAS services and not IAS."
"I think Check Point provides standard time which ideally most other vendors take to identify behaviors of a file by sending them into a sandbox environment for inspection."
"At the support level, they could improve the attention times and have the resolution of cases happen a little faster."
"There should be some customized price reductions in the offered packages."
"EDR and EPM solutions like Carbon Black or CyberArk have integrations with the cloud version of Sandblast, however, there must be on-premise Sandblast options also."
"Complexity on integration is not so straightforward and you really need an expert to help build it out."
"It's a good solid solution but integration with Network Access Control products with Cisco ISE would be good."
"There could be better integration on the programming side, which uses Python. StealthWatch could provide a template for Python to manage the switches. For example, it would be nice if StealthWatch bounced a port automatically it detected something anomalous."
"I would like the search page available with Cisco Stealthwatch to be more intuitive. The previous release was better than the current one for the UI."
"I would like to see more and cleaner reporting. For example, if I pull up Steven and I want to look and maybe compare him to what you've done in the past week, and compare that to the past six months, the point would be to see what the difference in activity looks like over this time. I don't see that capability in reporting to date. You see that trend but you don't really see a straightforward comparison. That right there is key to what we want to see about the normal activity."
"We need to be able to filter out internal IPs as non-threats."
"If they can make this product more web-based, that would be amazing."
"Stealthwatch is still maturing in AI. It uses artificial intelligence for predictions, but AI still needs to mature. It is in a phase where you get 95% correct detection. As its AI engine learns more, it will become more accurate. This is applicable to all the devices that are using AI because they support both supervised and unsupervised machine learning. The accuracy in the case of supervised machine learning is dependent on the data you feed into the box. The accuracy in the case of unsupervised machine learning is dependent on the algorithm. The algorithm matures depending on retrospective learning, and this is how it is able to detect zero-day attacks."
More Check Point SandBlast Network Pricing and Cost Advice →
More Cisco Secure Network Analytics Pricing and Cost Advice →
Check Point SandBlast Network is ranked 8th in Advanced Threat Protection (ATP) with 33 reviews while Cisco Secure Network Analytics is ranked 25th in Network Monitoring Software with 58 reviews. Check Point SandBlast Network is rated 8.4, while Cisco Secure Network Analytics is rated 8.2. The top reviewer of Check Point SandBlast Network writes "High detection with few false positives and able to handle large volumes of data". On the other hand, the top reviewer of Cisco Secure Network Analytics writes "Increased the visibility of what is happening in our network". Check Point SandBlast Network is most compared with Palo Alto Networks WildFire, Fortinet FortiSandbox, Microsoft Defender for Office 365, Trellix Network Detection and Response and Symantec Advanced Threat Protection, whereas Cisco Secure Network Analytics is most compared with Darktrace, Cisco Secure Cloud Analytics, ThousandEyes, Vectra AI and Arista NDR.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.