We performed a comparison between Check Point IPS and Cisco Secure Network Analytics based on real PeerSpot user reviews.
Find out what your peers are saying about Darktrace, Vectra AI, Check Point Software Technologies and others in Intrusion Detection and Prevention Software (IDPS)."Protection in real-time is very good. It helps us detect things on time and make decisions to improve perimeter security."
"The reports are well written so that you can understand what type of attack has occurred, the originating IP address, and other details."
"Check Point is one of the best security brands worldwide."
"IPS signatures can be set quite granularly depending on your environment. You can filter on performance impact, severity, and confidence which makes sizing and adapting easier."
"It protects against specific known exploits but also, with SandBlast integration, it is able to protect against unknown or zero-day attacks at the perimeter level."
"I can easily monitor all of our connected devices and I get instant notification of reconnections and new connections, which removes some of the monitoring burden."
"The solution's IPS functionality and firewall functionality are the solution's most valuable features."
"The autonomous threat prevention is very easy to use. The APIs and SmartConsole tool also work well."
"There are already many functionalities, so I don't think there is anything to improve."
"Great network monitoring, looking at anomaly detection and evaluation."
"Stealthwatch has greatly improved our network visibility, in terms of bandwidth, malware, and PCI violations."
"If you are using Darktrace or NAC solutions you can integrate Stealthwatch."
"The most valuable features of this solution are the logging, keeping threats under control, and keeping our data and environment secure."
"I believe this solution has reduced our incident response time."
"The most valuable feature is integration."
"The artifacts available in the tool provide better information for analyzing network traffic. It enables a holistic view of network traffic and general packet analysis. It's easy to identify anomalies without the use of signatures. The way in which we implemented Stealthwatch Cloud has enabled my team to analyze traffic behind proxies."
"Enhancements are necessary for the proficiency of notifications in the event of a Social Security incident, whether through email or alternative channels such as SMS."
"The pain point that I have with this solution is contacting technical support."
"There is a performance impact on the NGFW post-enabling the IPS blade/Module, which can even lead to downtime if IPS starts to monitor or block high-volume traffic."
"The hardware-based version of Check Point IPS could be more scalable. Right now, it's not scalable."
"The cost is high."
"I observed on our management that sometimes IPS does not connect to the threat cloud, we have to check and improve it. Otherwise, all of the features are good."
"Occasionally there are glitches and errors like false positives, which would be a nice area of this solution to improve upon."
"In my opinion, the Check Point software engineers should works on the performance of the blade - when it is activated with the big number of the protections in place, the monitoring shows us the significant increase in the CPU utilization for the gateway appliances - up to 30 percents, even so we are cherry-picking only the profiles that we really needed."
"Stealthwatch is still maturing in AI. It uses artificial intelligence for predictions, but AI still needs to mature. It is in a phase where you get 95% correct detection. As its AI engine learns more, it will become more accurate. This is applicable to all the devices that are using AI because they support both supervised and unsupervised machine learning. The accuracy in the case of supervised machine learning is dependent on the data you feed into the box. The accuracy in the case of unsupervised machine learning is dependent on the algorithm. The algorithm matures depending on retrospective learning, and this is how it is able to detect zero-day attacks."
"At my company, we might not be using it enough with other applications that we have that can integrate with it."
"If they can make this product more web-based, that would be amazing."
"Many of these tools require extensive on-premises hardware to run."
"We haven't seen ROI."
"The initial setup was complex."
"Cisco Stealthwatch can improve by having bundled packages for popular add-ons. It would be a lot easier for people implementing it, have let's say a better way to use the product."
"One update I would like to see is an agent-based client. Currently StealthWatch is network based."
More Cisco Secure Network Analytics Pricing and Cost Advice →
Check Point IPS is ranked 3rd in Intrusion Detection and Prevention Software (IDPS) with 45 reviews while Cisco Secure Network Analytics is ranked 24th in Network Monitoring Software with 57 reviews. Check Point IPS is rated 8.6, while Cisco Secure Network Analytics is rated 8.2. The top reviewer of Check Point IPS writes "Great for detection and access with the capabilities of defining specific rules". On the other hand, the top reviewer of Cisco Secure Network Analytics writes "Increased the visibility of what is happening in our network". Check Point IPS is most compared with Darktrace, Palo Alto Networks URL Filtering with PAN-DB, Palo Alto Networks Advanced Threat Prevention, Trend Micro TippingPoint Threat Protection System and Cisco NGIPS, whereas Cisco Secure Network Analytics is most compared with Darktrace, Cisco Secure Cloud Analytics, ThousandEyes, Vectra AI and Arista NDR.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.