Cisco Secure Network Analytics Valuable Features

JT
Development Manager at a healthcare company with 10,001+ employees

The user interface is quite good and helps us to understand what is happening.

Cisco Secure Network Analytics provides better visibility, which has helped free up our IT staff's time.

We have been able to save time as an organization in terms of trouble shooting.

View full review »
DB
Assistant Director of IT at University of Rochester Medical Center

The most valuable feature is the graphical analytics that it provides for mobile data.

The solution's analytics and threat detection capabilities are fantastic.

View full review »
Richard Payne - PeerSpot reviewer
Senior Cyber Scientist at a government with 10,001+ employees

We deal with TLS and other forms of encrypted tunnels. The kind of encrypted traffic analysis we receive from Cisco Secure Network Analytics gives us behavior analytics or anomaly detection on those tunnels, which is really insightful. These analytics are particularly important when we can't man in the middle and decrypt to do a deep packet inspection.

View full review »
Buyer's Guide
Cisco Secure Network Analytics
April 2024
Learn what your peers think about Cisco Secure Network Analytics. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,995 professionals have used our research since 2012.
Rainier S. - PeerSpot reviewer
Head of Integration Engineering / Enterprise Technology & Innovation at a healthcare company with 10,001+ employees

Visibility. The ability to look East and West. To see what is passing through your circuits, where it is coming from, and how big it is. This is pretty key for us. It is the network. 

From a security standpoint, it is seeing pockets as well. Visibility is very key for us.

View full review »
RH
Network Operations Manager at Philips Electronics

The fact that it can identify down to an IP address of a system that is causing problems, or potentially causing problems, is very valuable.

Its analytics and threat detection capabilities are also pretty good. Stealthwatch finds things that we don't normally see. There are false positives but it's pretty good at catching things that are doing bad things.

View full review »
JT
Former Employee of Orange Business Services as Head of Security Engineering at a comms service provider with 5,001-10,000 employees

The solution's most valuable feature is its ability to detect potential endpoint threats.

View full review »
Gerald Jimenez - PeerSpot reviewer
IT Operations Supervisor at Aboitiz Equity Ventures, Inc.

StealthWatch lets me see the ports running in and out and the country. It has excellent reporting, telemetry, and artificial intelligence features. With the telemetry, I can set thresholds to detect sudden changes and the alarms go through the PLC parts. I can see all the ports running on that trunk.

View full review »
TB
Senior Director of Architecture and Engineering at Trace3

The most valuable part is that Stealthwatch is part of a portfolio of security devices from Cisco, so while some of the competition may have other products that could be better or provide a better administrative experience, they don't have the breadth that Cisco does. Cisco literally can touch every single end point, every single ingress and egress point in the network. Nobody else has that.

Stealthwatch has analytics and threat protection capabilities up there with the industry best. It's a super powerful database on the backend, basically giving you access to all the latest and greatest threat detection events that are out there, and they're constantly being updated and monitored, so that's probably the best part about having something like that.

View full review »
JS
Manager at Indiana University Health

The single most valuable feature we get out of Stealthwatch is visibility. Also, analytics and threat protection capabilities are good, so far.

View full review »
SK
Senior Operations Consultant at NNIT

The most valuable features of this solution are its reporting and mitigation capabilities.

View full review »
AA
Director Network Services at a consultancy with 1,001-5,000 employees

The most valuable feature is having visibility into the data segments throughout our network.

Using the encrypted traffic analysis has given us more intelligence on the data that we're seeing, and provides us with even greater visibility. We can now see stuff that we haven't been able to see.

There is an encrypted analytics feature that gives us visibility into some of the encrypted traffic.

View full review »
BS
Director of Network and Telecom Services at a healthcare company with 10,001+ employees

Being able to look at the Layer 7 application and get information about intrusion attempts is the most valuable feature for us. 

View full review »
JD
Enterprise Information Security Architect at a agriculture with 5,001-10,000 employees

The most valuable feature of this solution is the ability to do TAPs because we have a distributed network.

The ability to set up one tool to stream that data over to us has been helpful because that way, we don't have to have other infrastructure and be really close to where the activity is. 

The security features have been good for helping create some correlation. For example, when you tap in, what else happens from the network perspective. 

Otherwise, just the general network performance monitoring is probably the number one thing that gets used. If we're having slowness issues then it can tell us what the bandwidth and usage are. We can find things like what is using up all the bandwidth and then find out how can we break that apart or route that differently, through a different WAN connection or internet connection.

View full review »
AK
Sales director at Future Point Technologies

The most valuable feature of Cisco Secure Network Analytics is the Threat Intelligence integration.

View full review »
EF
Network Manager at a financial services firm with 1,001-5,000 employees

The most valuable feature we got out of Stealthwatch is to be able to, while troubleshooting, go deep into one of our interfaces and verify what the bandwidth is and if there's any activity there that's causing problems.

In terms of their analytics, we use the stats that we get from the tool itself to see that we're using a high utilization of the tool. As far as troubleshooting, it helps us to analyze some of the effects that our customers are seeing.

View full review »
ML
Airway Transportation Service Specialist at Federal Aviation Administration

From what I understand, you can encrypt and unencrypt traffic moving in transit. This is one of the features that we liked about it. 

View full review »
SG
Engineer at Charter Communications, Inc.

Being able to identify specific data closed across the network is invaluable.

Their analytics and threat detection capabilities are good. We're able to pick out the individual traffic flows for specific users and even individual sessions across the network and reconstruct timelines of activity after the fact, if needed, or use the data in real time to plan out network capacity and growth.

View full review »
AR
Technical Consultant at a tech services company with 501-1,000 employees

The most valuable features are encrypted threat analysis and the ability to run jobs on entire flows.

The reporting feature is helpful for creating documentation because you can export relevant information and paste it into the back of the report.

I’ve found that the solution's analytics and threat detection capabilities are very useful. I would like it to be able to better integrate with Firepower, but it meets the needs that it was promising from the beginning.

View full review »
AM
Senior Consultant at a manufacturing company with 10,001+ employees

The most valuable feature is integration.

View full review »
RU
Network Architect at Henry Ford health system

The most valuable feature is the level of visibility and the automation behind it. We don't have to go chasing things down.

View full review »
SJ
IT Network Engineer at a logistics company with 10,001+ employees

The feature most valuable for us is to gain visibility of what is actually floating through, so we can stop it based on whether it's good or bad traffic.

Their analytics and threat detection capabilities are good, too.

View full review »
ER
Forensic Analyst at a pharma/biotech company with 1,001-5,000 employees

It enables a holistic view of network traffic and general packet analysis. It's easy to identify anomalies without the use of signatures. The way in which we implemented Stealthwatch Cloud has enabled my team to analyze traffic behind proxies.

View full review »
JC
Chief Technology Officer at a tech services company with 51-200 employees

The best feature is the network monitoring, looking at anomaly detection and evaluation. For our operations team, a valuable feature is the ability to do the taps and access that via Stealthwatch. 

View full review »
UN
Director of Operations at a manufacturing company with 1,001-5,000 employees

The most valuable features of this solution are the logging, keeping threats under control, and keeping our data and environment secure.

View full review »
FK
Architect at Atea A/S

The most valuable features provided by this solution are visibility and information.

The solution's analytics and threat detection capabilities are good. Network visibility is also really good. 

The encrypted traffic analytics work well, I don't see any problem with it.

The time to value is very good, and it is based on visibility. For example, one of our customers was locked by Ransomware and it cost them two million Danish Krones (approximately $300,000 USD). The shipper was not able to send anything until we got everything working.

It has reduced the amount of time it takes to detect and remediate threats, although it is hard to tell by how much. If you’re under attack and you get visibility then you know it, and you can take precautions as fast as possible.

View full review »
MG
Network Operations Manager at a tech company with 10,001+ employees

The most valuable feature of this solution is the reporting, in terms of operational metrics and what I can show to the execs.

View full review »
KP
Security Analysist at Amwins Group

The ability to see a real-time picture of the network is the most valuable for us.

View full review »
JC
Lead Network Engineer at a retailer with 1,001-5,000 employees

The ability to send data flow from other places and have them all in one place is very valuable for us.

View full review »
WR
Network Engineer at a government with 1,001-5,000 employees

The search options on Cisco Stealthwatch are the most valuable. You can get very granular with it, down to the kilobits or the seconds if you want. The product supports any time frame that you need, so that is nice.

The solution affects network visibility in our company across all of our data, including our data center. All data transfers pass through our NetFlow collector. 

It's very easy to pinpoint any network anomalies or any type of suspicious behavior. NetFlow is very good at detecting those spikes and traffic.

View full review »
VS
Network and Security with 10,001+ employees

I like auto-remediation. Pushing to Cisco ISE is very useful. Also, you can send all traffic, any SIEM logger, and a behavior analyst. It integrates with the ISE. 

If you are using Darktrace or NAC solutions you can integrate Stealthwatch. However, I don't like just the Stealthwatch appliance. It's better integrated with others. 

The solution is stable.

It's scalable. 

View full review »
CK
Manager, Network Engineering & Telecommunications at a healthcare company with 1,001-5,000 employees

The features I find most valuable is the deep level of knowledge that we get on every device as well as what other devices it's talking to. 

Analytics and threat detection capabilities are a little overwhelming. I would say it's about average. 

The solution reduces the amount of time it takes to detect and remediate threats.

View full review »
BG
Manager of Digital Communications at Memorial Hermann Healthcare System

The analytics and threat detection capabilities of Cisco Stealthwatch are pretty good. It gives us good visibility of the information. It is easy to use and to the point.

View full review »
JM
Sr Network Engineer at a insurance company with 5,001-10,000 employees

The most valuable feature is its ability to track anomalies in real time. It increases our time-to-value ratios.

View full review »
SD
Network Manager at a healthcare company with 1,001-5,000 employees

The most valuable features are its abilities to analyze data streams and determining what is inside those data streams to troubleshoot a problem. It is also easy to use. 

View full review »
JQ
Network Manager Administrator at a financial services firm with 501-1,000 employees

It is a good application, providing for real-time monitoring of the organization of data. It can basically identify points of peak traffic where possible issues are being caused.

View full review »
MM
PMO Department at a comms service provider with 1,001-5,000 employees

It provides good visibility to the customers. People are still evaluating it, but it provides visibility and helps them to take action to remediate and mitigate the issues that are highlighted on the dashboard. It has good integration with the Cisco switching platform.

View full review »
DK
Network Engineer at UC San Diego Health System

The most valuable feature of this solution is the way the net flow is being merged together in a single pane. That's been extremely useful for us because we can see what's going on with traffic in one single place.
I also believe the solution has increased our organization's threat protection rate. The actual threat reports are run by our Infosec security person, but we are actually using this solution for that too. We're having reports generated so that our network engineering doesn't have to do the review. That team is responsible for reviewing reports and then we work with them to locate and do the next steps.

View full review »
RF
Senior Network Engineer at a comms service provider

The most valuable feature about this solution is that it gives me insight into my network. It has great analytics and threat protection capabilities to detect faults and find viruses and trions. I can definitely say that this solution saves us time, money and administrative work.

When it comes to time to value, it gets new insights, so it's worth the time and it allows me to know more of what's going on in the network.

View full review »
JW
Network Administrator at a mining and metals company with 1,001-5,000 employees

The most valuable feature of this solution is data hoarding because it catches threats on a frequent basis that we had no idea of. Like if certain hosts were talking to certain hosts. With this tool, we got that kind of information and it allows us to see when two hosts are talking when they shouldn't be talking at all.

View full review »
AM
Associate Director Network Services at a pharma/biotech company with 10,001+ employees

The most valuable feature is its alerts and dashboard.

The solution's analytics and threat detection capabilities are also pretty reasonable.

View full review »
it_user735195 - PeerSpot reviewer
Senior Information Security Engineer at a transportation company with 10,001+ employees

NetFlow: The beginning of any security investigation starts with NetFlow data. 

View full review »
SA
Network Section Chief at a government with 1,001-5,000 employees

The solution has probably increased our incident response rate a little bit. We're seeing extra traffic on the network as opposed to before.

Cisco Stealthwatch has reduced the amount of time to detect an immediate threat.

View full review »
ML
National Offering Lead - Security Practice at a computer software company with 501-1,000 employees

We find that Stealthwatch can detect the unseen. Once you have a fully deployed Cisco enterprise agreement, we can turn on Stealthwatch and usually catch the last little bit.

View full review »
RG
Infosec Manager at a energy/utilities company with 1,001-5,000 employees

Stability is the most valuable feature we have seen in this solution.

View full review »
LW
Network Engineer at a tech services company

The features I find most valuable about Cisco Stealthwatch its integration with the pxGrid and all of our other devices that are tied in with pxGrid, so they can communicate with each other and be able to dynamically change, quarantine a suspicious device, or do whatever necessary in case of a malware attack or similar problem.

View full review »
MP
Senior Security Engineer at a tech services company with 501-1,000 employees

Cisco Stealthwatch has predefined alerts for different types of security issues that might happen in the network. Whether it's PCs or servers that are used for botnets or Bitcoin mining we receive the alerts automatically. This functionality is what we receive from the solution out of the box.

The solution has a lot of add-on features available.

View full review »
SL
Network Administrator at a retailer with 1,001-5,000 employees

There's a lot of stuff on the new version we haven't had the chance to work with yet. 

View full review »
it_user631224 - PeerSpot reviewer
Information Security Analyst at a non-profit with 1,001-5,000 employees

I value the feature which enables me to detect devices talking to suspect IPs.

View full review »
it_user734160 - PeerSpot reviewer
Senior Technical Consultant

SMC and FC, though they are components, not features.

Most valuable features are the network maps and server and network response time. Maps is a unique feature which provides logical grouping of different segments of the network with complete visibility and alerting based on a total or protocol base as per defined threshold. So, one can check how many connections to the server and/or on the protocol, and who is consuming the most bandwidth. This is done, while the server and network response time provide quick identification of root cause of slow response from the server.

View full review »
RH
Sr. Network Engineer at a tech services company with 10,001+ employees

The most valuable feature of this solution is that it give us insight into what's happening in our network. 

View full review »
it_user983178 - PeerSpot reviewer
PIC for Cyber Security at a university with 51-200 employees

The Cisco IOS is very important because that is what we have to teach our students.

View full review »
JH
Chief Consultant at a tech services company with 11-50 employees

The most valuable feature is anomaly detection, where it finds things that are not allowed internally.

View full review »
it_user735216 - PeerSpot reviewer
Highly motivated Security Engineer incident Response, Vuln Mgmt, Malware Analysis, IDS/IPS, DLP, Network Security +more at a transportation company with 10,001+ employees

There's nothing like it and a dream to operate, very intuitive. The most valuable feature is NetFlow. The beginning of any security investigation starts with NetFlow data.

View full review »
JB
Ingenieria at a tech services company with 11-50 employees

Overall, the implementation is very good.

The solution offers good security. 

We find the solution is very good at collaborating with other solutions.

View full review »
Buyer's Guide
Cisco Secure Network Analytics
April 2024
Learn what your peers think about Cisco Secure Network Analytics. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,995 professionals have used our research since 2012.