We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Monitoring the traffic, making sure you have the visibility."
"It has a lot of functions, such as firewall. We are administrators, and we create some rules to protect our network. We also monitor the traffic in and out and have disk encryption on-premises. When we detect malware, we scan for the virus on the PC. We can then delete or block the malware."
"Overall the solution is very good. It offers great protection and gives us a good overview of what is on the network."
"The initial setup is straightforward."
"The solution can scale."
"Great monitoring feature."
"The feature I found most valuable is the network threat analyzer in the security platform. It also integrates with GTI, or Global Threat Intelligence. Otherwise, I just use the basic features."
"There's a good dashboard you can drill down into. It helps you easily locate intrusions and the source of attacks."
"The initial setup is a bit complex in terms of deployment and configuration"
"The management console needs to be less complex and easier to navigate."
"The solution could improve some aspects of detection."
"The management component could be simplified."
"The pricing could be improved."
"We would like to have a simpler version. Some settings and functions on the McAfee console are complex and complicated. I want the management console to be simpler."
"Integration with Global Thereat Intelligence could be better. Also, I think management solutions are end of life now at McAfee. Network threat analyzer may be used for endpoint quarantines. Integration between these sides, as well as endpoint APO, will help you quarantine the risky endpoints."
"Some of the documentation is not as straightforward as it could be."
Cisco Stealthwatch Cloud improves security and incident response across the distributed network, from the private network and branch office to the public cloud. This solution addresses the need for digital businesses to quickly identify threats posed by their network devices and cloud resources, and to do so with minimal management, oversight, and security manpower.
McAfee Network Security Platform is a uniquely intelligent security solution that discovers and blocks sophisticated threats in the network. Using advanced detection and emulation techniques, it moves beyond mere pattern matching to defend against stealthy attacks with a high degree of accuracy. This next-generation hardware platform scales to speeds of more than 40 Gbps with a single device to meet the needs of demanding networks. Our Unified Defense Architecture approach to security management streamlines security operations by combining real-time McAfee Global Threat Intelligence feeds with rich contextual data about users, devices, and applications for fast, accurate response to network-borne attacks.
Cisco Stealthwatch Cloud is ranked 22nd in Intrusion Detection and Prevention Software (IDPS) with 1 review while McAfee Network Security Platform is ranked 8th in Intrusion Detection and Prevention Software (IDPS) with 7 reviews. Cisco Stealthwatch Cloud is rated 0.0, while McAfee Network Security Platform is rated 8.8. The top reviewer of Cisco Stealthwatch Cloud writes "Offers great visibility of your traffic". On the other hand, the top reviewer of McAfee Network Security Platform writes "Attack analysis shows who tries to exploit my vulnerabilities". Cisco Stealthwatch Cloud is most compared with Cisco Stealthwatch, Microsoft Defender for Endpoint, CrowdStrike Falcon, Darktrace and Cortex XDR by Palo Alto Networks, whereas McAfee Network Security Platform is most compared with Cisco NGIPS, Trend Micro TippingPoint Threat Protection System, Palo Alto Networks Threat Prevention, Darktrace and Fortinet FortiGate IPS.
See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.