Compare Cisco Cognitive Threat Analytics vs. Cisco IOS Security

Cisco Cognitive Threat Analytics is ranked 35th in Intrusion Detection and Prevention Software while Cisco IOS Security is ranked 5th in Intrusion Detection and Prevention Software with 10 reviews. Cisco Cognitive Threat Analytics is rated 0, while Cisco IOS Security is rated 8.4. On the other hand, the top reviewer of Cisco IOS Security writes "Increased endpoint security but is overall a very complicated product". Cisco Cognitive Threat Analytics is most compared with Cisco Stealthwatch, whereas Cisco IOS Security is most compared with Darktrace, Fortinet FortiManager and Fortinet FortiOS.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Use Cisco Cognitive Threat Analytics? Share your opinion.
Find out what your peers are saying about Cisco, GFI, Darktrace and others in Intrusion Detection and Prevention Software. Updated: October 2019.
371,062 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
Information Not Available
The licenses for this solution are expensive.The licensing is on a subscription basis, and it is fairly costly. I would prefer a one-time payment.The pricing is very expensive. Normally I do a yearly contract; I don't know the exact pricing, but it's around $75,000 USD per year. That's the standard licensing.

Read more »

report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software solutions are best for your needs.
371,062 professionals have used our research since 2012.
Ranking
Views
56
Comparisons
47
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
Views
1,119
Comparisons
829
Reviews
10
Average Words per Review
425
Avg. Rating
8.3
Top Comparisons
Compared 21% of the time.
Also Known As
Cognitive Threat Analytics, CTAIOS Security
Learn
Cisco
Cisco
Overview

Cognitive Threat Analytics (CTA) enhances web security with breach detection and analytics to stop threats in the network. Online threats have become increasingly sophisticated, targeted attacks are on the rise, and cybercriminals launch their campaigns through a variety of vectors. They can serve up malvertising and deploy exploit kits that install rootkits. They can establish a botnet presence within your infrastructure. Once cybercriminals establish a foothold, more than 90 percent of their threats use the web. There, they can establish channels for command-and-control communications and exfiltrate sensitive information. Analyzing more than 10 billion web requests daily, Cisco Cognitive Threat Analytics finds malicious activity that has bypassed security controls, or entered through unmonitored channels (including removable media), and is operating inside an organization’s environment. Cognitive Threat Analytics is a cloud-based product that uses machine learning and statistical modeling of networks. It creates a baseline of the traffic in your network and identifies anomalies. It analyzes user and device behavior, and web traffic, to discover command-and-control communications, data exfiltration, and potentially unwanted applications operating in your infrastructure.

Cisco IOS Software delivers a sophisticated set of security capabilities for a comprehensive, layered security approach throughout your network infrastructure. Cisco IOS security technologies help to defend critical business processes against attack and disruption, protect privacy, and support policy and regulatory compliance controls.
Offer
Learn more about Cisco Cognitive Threat Analytics
Learn more about Cisco IOS Security
Sample Customers
TransplaceArup Group, Brunel University London, City of Biel, Gobierno de Castilla-La Mancha, K&L Gates , New South Wales Rural Fire Service, Offshore Northern Seas, Transplace
Find out what your peers are saying about Cisco, GFI, Darktrace and others in Intrusion Detection and Prevention Software. Updated: October 2019.
371,062 professionals have used our research since 2012.
We monitor all Intrusion Detection and Prevention Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Sign Up with Email