We performed a comparison between Cisco Secure Network Analytics and Trend Micro Deep Security based on real PeerSpot user reviews.
Find out what your peers are saying about Zabbix, Datadog, Auvik and others in Network Monitoring Software."The single dashboard is a valuable feature."
"We can manage the entire system across the network and troubleshoot the pain points."
"Overall, the implementation is very good."
"It provides good visibility to the customers. People are still evaluating it, but it provides visibility and helps them to take action to remediate and mitigate the issues that are highlighted on the dashboard. It has good integration with the Cisco switching platform."
"It has improved our internal knowledge of what's going on with the network, and that's helpful."
"The most valuable feature is having visibility into the data segments throughout our network."
"Being able to identify specific date closed across the network is invaluable."
"From a security standpoint, it is just seeing pockets as well. Visibility is very key for us."
"The most valuable feature of this solution is the way the net flow is being merged together in a single pane. That's been extremely useful for us, because can see what's going on with traffic in one single place."
"Most valuable features are the network maps and server and network response time."
"Very straightforward and very easy to implement."
"The tool provides information on server activities and hosts."
"The most valuable feature of this solution is the virtual path function, which is the reason we chose to implement it."
"It has a perfect SaaS which integrates with AWS, offering flexibility to deploy quickly and easily in the cloud."
"It is stable and we have not faced any challenges during the rolled out"
"Patch management is most valuable. The major selling point of Deep Security is that it is based on the cloud. Deep Security is for the servers and databases of data centers, and generally, for patch management, you have to shut down the machines, and then you have to restart them. So, they need shutdown time, which is a cost. Big enterprises don't want to shut down their database or their data center for any kind of patch. Deep Security creates a wall and downloads all patches. You install it on the cloud. So, it saves your server from any kind of intrusion or any kind of penetration, and whenever you get a chance or time, in six, eight, or nine months, you can physically download or install all those patches in one go. So, it saves you time. It also saves your shutdown time and keeps your data center safe."
"Support and threat prevention are the most valuable features of this solution."
"It integrates well with the cloud; for example, AWS, and Google Cloud Provider."
"The Wi-Fi side needs improvement."
"The technical support needs improvement."
"Stealthwatch needs improvement when it comes to speed."
"It's too complicated to install, when starting out."
"We haven't seen ROI."
"Some of our customers find this solution to be a little bit tough because they don't understand how to configure and use it."
"Many of these tools require extensive on-premises hardware to run."
"I would like to see better filters."
"Its granularity for RBAC roles-based access control needs improvement."
"I would like to see more and cleaner reporting. For example, if I pull up Steven and I want to look and maybe compare him to what you've done in the past week, and compare that to the past six months, the point would be to see what the difference in activity looks like over this time. I don't see that capability in reporting to date. You see that trend but you don't really see a straightforward comparison. That right there is key to what we want to see about the normal activity."
"The initial setup needs improvement, as it was a bit challenging."
"AWS products could become more compatible with intrusion detection products leveraging help from Trend Micro."
"The default reports provided don't provide much insight."
"Pricing is on the expensive side and could be more affordable. The technical support for Trend Micro Deep Security also needs improvement."
"What this product lacks at this stage is the ability to have automated workbooks to do the response. At this stage, the response is more manual, and it is not automated. If there is a response functionality in Deep Security, similar to what we have in EDR these days, to automatically respond to some of the threats, it would be cool. So, we'd like to have an automated response. There should be a response functionality."
"The situation with the currency in Turkey makes this solution a little bit on the expensive side, and if it were lowered then it would be more competitive."
"We want to see improved authentication."
"The client can show as offline sometimes, and that becomes a bit difficult for troubleshooting. We end up basically redeploying the client. This is something that could be improved in the future."
More Juniper Mist Premium Analytics Pricing and Cost Advice →
More Cisco Secure Network Analytics Pricing and Cost Advice →
Cisco Secure Network Analytics is ranked 24th in Network Monitoring Software with 57 reviews while Trend Micro Deep Security is ranked 1st in Virtualization Security with 81 reviews. Cisco Secure Network Analytics is rated 8.2, while Trend Micro Deep Security is rated 8.6. The top reviewer of Cisco Secure Network Analytics writes "Increased the visibility of what is happening in our network". On the other hand, the top reviewer of Trend Micro Deep Security writes "High availability, effective VPM, and responsive support". Cisco Secure Network Analytics is most compared with Darktrace, Cisco Secure Cloud Analytics, ThousandEyes, Vectra AI and Arista NDR, whereas Trend Micro Deep Security is most compared with Trend Micro Apex One, CrowdStrike Falcon, Microsoft Defender for Endpoint, Symantec Endpoint Security and Trellix Endpoint Security.
We monitor all Network Monitoring Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.