Compare Cisco Cognitive Threat Analytics vs. Trend Micro Deep Discovery Analyzer

Cisco Cognitive Threat Analytics is ranked 35th in Intrusion Detection and Prevention Software while Trend Micro Deep Discovery Analyzer is ranked 9th in Intrusion Detection and Prevention Software with 2 reviews. Cisco Cognitive Threat Analytics is rated 0, while Trend Micro Deep Discovery Analyzer is rated 9.0. On the other hand, the top reviewer of Trend Micro Deep Discovery Analyzer writes "Helped us to improve our security levels and protects our internal network from any external threats". Cisco Cognitive Threat Analytics is most compared with Cisco Stealthwatch, whereas Trend Micro Deep Discovery Analyzer is most compared with Trend Micro Deep Discovery Inspector, Darktrace and Palo Alto Threat Prevention.
Cancel
You must select at least 2 products to compare!
Find out what your peers are saying about Cisco, GFI, Darktrace and others in Intrusion Detection and Prevention Software. Updated: October 2019.
372,622 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software solutions are best for your needs.
372,622 professionals have used our research since 2012.
Ranking
Views
56
Comparisons
47
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
Views
1,139
Comparisons
914
Reviews
2
Average Words per Review
757
Avg. Rating
9.0
Top Comparisons
Also Known As
Cognitive Threat Analytics, CTA
Learn
Cisco
Trend Micro
Overview

Cognitive Threat Analytics (CTA) enhances web security with breach detection and analytics to stop threats in the network. Online threats have become increasingly sophisticated, targeted attacks are on the rise, and cybercriminals launch their campaigns through a variety of vectors. They can serve up malvertising and deploy exploit kits that install rootkits. They can establish a botnet presence within your infrastructure. Once cybercriminals establish a foothold, more than 90 percent of their threats use the web. There, they can establish channels for command-and-control communications and exfiltrate sensitive information. Analyzing more than 10 billion web requests daily, Cisco Cognitive Threat Analytics finds malicious activity that has bypassed security controls, or entered through unmonitored channels (including removable media), and is operating inside an organization’s environment. Cognitive Threat Analytics is a cloud-based product that uses machine learning and statistical modeling of networks. It creates a baseline of the traffic in your network and identifies anomalies. It analyzes user and device behavior, and web traffic, to discover command-and-control communications, data exfiltration, and potentially unwanted applications operating in your infrastructure.

Trend Micro Deep Discovery Analyzer is a turnkey appliance that uses virtual images of endpoint configurations to analyze and detect targeted attacks. By applying an XGen security blend of cross generational detection techniques at the right place and time, it detects targeted attacks designed to evade standard security solutions. Deep Discovery Inspector is part of the Network Defense family of network security products including Intrusion Prevention System (IPS).
Offer
Learn more about Cisco Cognitive Threat Analytics
Learn more about Trend Micro Deep Discovery Analyzer
Sample Customers
TransplaceAllied Telesis, Atma Jaya Catholic University of Indonesia, Babou, Blekinge County Council, Delacour, Hiroshima Prefectural Government, Live Nation Entertainment Inc., Mazda Motor Logistics Europe, McGill University Health Centre, Mikuni Corporation, OKWAVE, Sinar Mas Land, SWICA, UTOC Corporation
Find out what your peers are saying about Cisco, GFI, Darktrace and others in Intrusion Detection and Prevention Software. Updated: October 2019.
372,622 professionals have used our research since 2012.
We monitor all Intrusion Detection and Prevention Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Sign Up with Email