Cisco Stealthwatch vs. Palo Alto Networks VM-Series

As of June 2019, Cisco Stealthwatch is ranked 1st in Intrusion Detection and Prevention Software with 12 reviews vs Palo Alto Networks VM-Series which is ranked 10th in Firewalls with 12 reviews. The top reviewer of Cisco Stealthwatch writes "You are able to drill down into a center's utilization, then create reports based on it". The top reviewer of Palo Alto Networks VM-Series writes "A reliable tool with excellent support". Cisco Stealthwatch is most compared with Darktrace, Splunk User Behavior Analytics and FireEye Network Security. Palo Alto Networks VM-Series is most compared with Fortinet FortiGate, Juniper SRX and Meraki MX Firewalls.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Cisco, GFI, Darktrace and others in Intrusion Detection and Prevention Software. Updated: May 2019.
348,275 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
The feature most valuable for us is to gain visibility of what is actually floating through, so we can stop it based on whether it's good or bad traffic.It is a good application, providing for real-time monitoring of the organization of data. It can basically identify points of peak traffic where possible issues are being caused.The most valuable feature is its alerts and dashboard.The most valuable part is that Stealthwatch is part of a portfolio of security devices from Cisco. Cisco literally can touch every single end point, every single ingress and egress point in the network. Nobody else has that.The solution has increased our threat detection rate. Cisco Stealthwatch has not reduced our incident response times. It has not reduced the amount of time it takes us to detect immediate threats. It has reduced false positives.The search options on Cisco Stealthwatch are the most valuable. You can get very granular with it, down to the kilobits or the seconds if you want. The product supports any time frame that you need, so that is nice.Cisco Stealthwatch has reduced the amount of time to detect an immediate threat.The artifacts available in the tool provide better information for analyzing network traffic. It enables a holistic view of network traffic and general packet analysis. It's easy to identify anomalies without the use of signatures. The way in which we implemented Stealthwatch Cloud has enabled my team to analyze traffic behind proxies.

Read more »

Embedding it into my application development lifecycle prevents data loss and business disruption, allowing the adoption to operate at the speed of my AWS Cloud.It has a good performance which helps you with the stability of your virtual environment.In AWS, Palo Alto provides us a better view than flow logs for network traffic.App-ID and User-ID have repeatedly shown value in securing business critical systems.It provides complete security posture from end-to-end. This has given us better visibility into what our security aspects are.You already can scale it if you put it in Auto Scaling groups. If you put it in a load balancer, it should already be able to scale.It allows us to see all our traffic to properly secure it and only allow what is needed through the firewall.It offers a single pane of glass for all the different types of installations.

Read more »

Cons
The initial setup was complex.At my company, we might not be using it enough with other applications that we have that can integrate with it.It's too complicated to install, when starting out.I would like Cisco to make it easier for the administrators to use it.The ability to be natively integrated into Port Aggregator would be beneficial because it would reduce just one more component that's needed in order to have that type of view.I would like the search page available with Cisco Stealthwatch to be more intuitive. The previous release was better than the current one for the UI.There's a lot of traffic on our network that we don't see sometimes.If there was one improvement I’d suggest it would be that it detect traffic through an intranet. The product requires that traffic flow through a managed network device. The product is designed mostly for enterprise environments and not smaller environments or businesses.

Read more »

It can definitely improve on the performance.It has to be more scalable for the deployment of VMs on the cloud.I would like to see a more thorough QA process. We have had some difficulties from bugs in releases.We have ran into issues with Palo Alto’s limitations for resolving large IP lists from DNS lookups, as well as the antivirus interfering with App-ID.The product could provide protection above Layer 3, which gets into the application layer and provides better visibility into those aspects of application security.On the cloud side, they need to come up with more HA solutions to support the multi-region.AWS doesn't integrate well with third-party firewalls.I would like a way to do everything programmatically, or be able to copy the configs from different prices at different levels.

Read more »

Pricing and Cost Advice
Today, we are part of the big Cisco ELA, and it is a la carte. We can get orders for whatever we want. At the end of the day, we have to pay for it in one big expense, but that is fine. We are okay with that.NetFlow is very expensive.One of the things which bugs me about Lancope is the licensing. We understand how licensing works. Our problem is when we bought and purchased most of these Lancope devices, we did so with our sister company. Somewhere within the purchase and distribution, licensing got mixed up. That is all on Cisco, and it is their responsibility. They allotted some of our sister company's equipment to us, and some of our equipment to them. To date, they have never been able to fix it.​Licensing is done by flows per second, not including outside (in traffic).Pricing is much higher compared to other solutions.Licensing is done by flows per second, not including outside>in traffic.

Read more »

The pricing and licensing of this product on AWS should be from $1.28/hr or $4,500.00/yr. Then, it would be a good price for the performance that it delivers.We used BYOL, because of the cost to own.The pricing and licensing of this product on AWS for a three-year commitment is a great deal, if you can plan that far ahead.Because the solution was getting deployed on AWS, it was the best place to go and it was available there.One of the factors for selecting Palo Alto was they had flexible pricing. They had a pay-as-you-go model. Comparable to other products, such as Check Point, the price point was definitely a plus.The pricing was expensive but it was comparable to the competition.AWS is available as a AMI that you can purchase from the AWS Marketplace. Therefore, you need to purchase the licensing, since it is per AMI. Then, you deploy it on a regular EC2. Then, for on-premise, you can use both Palo Alto's software and hardware.The price is not bad. They have a yearly renewal fee, and the pricing is exactly where we expect it to be.

Read more »

report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software solutions are best for your needs.
348,275 professionals have used our research since 2012.
Ranking
Views
21,792
Comparisons
12,173
Reviews
6
Average Words per Review
608
Avg. Rating
9.7
10th
out of 50 in Firewalls
Views
3,766
Comparisons
2,198
Reviews
10
Average Words per Review
510
Avg. Rating
8.6
Top Comparisons
Compared 24% of the time.
Also Known As
Cisco Stealthwatch Enterprise, Lancope StealthWatch
Learn
Cisco
Palo Alto Networks
Overview

Cisco Stealthwatch uses NetFlow to provide visibility across the network, data center, branch offices, and cloud. Its advanced security analytics uncover stealthy attacks on the extended network. Stealthwatch helps you use your existing network as a security sensor and enforcer to dramatically improve your threat defense.

The VM-Series is a virtualized form factor of our next-generation firewall that can be deployed in a range of private and public cloud computing environments based on technologies from VMware, Amazon Web Services, Microsoft, Citrix and KVM.

The VM-Series natively analyzes all traffic in a single pass to determine the application identity, the content within, and the user identity. These core elements of your business can then be used as integral components of your security policy, enabling you to improve your security efficacy through a positive control model and reduce your incident response time though complete visibility into applications across all ports.

In both private and public cloud environments, the VM-Series can be deployed as a perimeter gateway, an IPsec VPN termination point, and a segmentation gateway, protecting your workloads with application enablement and threat prevention policies.

Offer
Learn more about Cisco Stealthwatch
Learn more about Palo Alto Networks VM-Series
Sample Customers
Edge Web Hosting, Telenor Norway, Ivy Tech Community College of Indiana, Webster Financial Corporation, Westinghouse Electric, VMware, TIAA-CREFWarren Rogers Associates
Top Industries
REVIEWERS
Healthcare Company24%
Financial Services Firm12%
Manufacturing Company9%
Transportation Company6%
VISITORS READING REVIEWS
Healthcare Company26%
Financial Services Firm18%
Media Company18%
Comms Service Provider11%
No Data Available
Find out what your peers are saying about Cisco, GFI, Darktrace and others in Intrusion Detection and Prevention Software. Updated: May 2019.
348,275 professionals have used our research since 2012.
We monitor all Intrusion Detection and Prevention Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email