Compare Cisco Cognitive Threat Analytics vs. Cisco Stealthwatch Cloud

Cisco Cognitive Threat Analytics is ranked 32nd in Intrusion Detection and Prevention Software while Cisco Stealthwatch Cloud is ranked 19th in Intrusion Detection and Prevention Software with 1 review. Cisco Cognitive Threat Analytics is rated 0, while Cisco Stealthwatch Cloud is rated 0. On the other hand, the top reviewer of Cisco Stealthwatch Cloud writes "Offers great visibility of your traffic". Cisco Cognitive Threat Analytics is most compared with Cisco Stealthwatch, whereas Cisco Stealthwatch Cloud is most compared with Cisco Stealthwatch, Dome9 and Darktrace.
Cancel
You must select at least 2 products to compare!
Find out what your peers are saying about Darktrace, GFI, Splunk and others in Intrusion Detection and Prevention Software. Updated: March 2020.
405,901 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software solutions are best for your needs.
405,901 professionals have used our research since 2012.
Ranking
Views
129
Comparisons
118
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
Views
2,542
Comparisons
2,214
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
Top Comparisons
Compared 9% of the time.
Also Known As
Cognitive Threat Analytics, CTAObservable Networks
Learn
Cisco
Cisco
Overview

Cognitive Threat Analytics (CTA) enhances web security with breach detection and analytics to stop threats in the network. Online threats have become increasingly sophisticated, targeted attacks are on the rise, and cybercriminals launch their campaigns through a variety of vectors. They can serve up malvertising and deploy exploit kits that install rootkits. They can establish a botnet presence within your infrastructure. Once cybercriminals establish a foothold, more than 90 percent of their threats use the web. There, they can establish channels for command-and-control communications and exfiltrate sensitive information. Analyzing more than 10 billion web requests daily, Cisco Cognitive Threat Analytics finds malicious activity that has bypassed security controls, or entered through unmonitored channels (including removable media), and is operating inside an organization’s environment. Cognitive Threat Analytics is a cloud-based product that uses machine learning and statistical modeling of networks. It creates a baseline of the traffic in your network and identifies anomalies. It analyzes user and device behavior, and web traffic, to discover command-and-control communications, data exfiltration, and potentially unwanted applications operating in your infrastructure.

Cisco Stealthwatch Cloud improves security and incident response across the distributed network, from the private network and branch office to the public cloud. This solution addresses the need for digital businesses to quickly identify threats posed by their network devices and cloud resources, and to do so with minimal management, oversight, and security manpower.

Offer
Learn more about Cisco Cognitive Threat Analytics
Learn more about Cisco Stealthwatch Cloud
Sample Customers
TransplaceOptions, Schneider Electric, Washington University in St Louis, Gotcha, Kraft Kennedy, PartnerRe, Sumologic, Veterans United, AFGE, Agraform, Artesys, Dynamic Ideas Financials, Department of Agriculture and Commerce
Top Industries
No Data Available
VISITORS READING REVIEWS
Comms Service Provider41%
Software R&D Company30%
Financial Services Firm7%
Government7%
Find out what your peers are saying about Darktrace, GFI, Splunk and others in Intrusion Detection and Prevention Software. Updated: March 2020.
405,901 professionals have used our research since 2012.
We monitor all Intrusion Detection and Prevention Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.