Most Helpful Review
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
The feature most valuable for us is to gain visibility of what is actually floating through, so we can stop it based on whether it's good or bad traffic.
It is a good application, providing for real-time monitoring of the organization of data. It can basically identify points of peak traffic where possible issues are being caused.
The most valuable feature is its alerts and dashboard.
The most valuable part is that Stealthwatch is part of a portfolio of security devices from Cisco. Cisco literally can touch every single end point, every single ingress and egress point in the network. Nobody else has that.
The solution has increased our threat detection rate. Cisco Stealthwatch has not reduced our incident response times. It has not reduced the amount of time it takes us to detect immediate threats. It has reduced false positives.
The search options on Cisco Stealthwatch are the most valuable. You can get very granular with it, down to the kilobits or the seconds if you want. The product supports any time frame that you need, so that is nice.
Cisco Stealthwatch has reduced the amount of time to detect an immediate threat.
The artifacts available in the tool provide better information for analyzing network traffic. It enables a holistic view of network traffic and general packet analysis. It's easy to identify anomalies without the use of signatures. The way in which we implemented Stealthwatch Cloud has enabled my team to analyze traffic behind proxies.
Embedding it into my application development lifecycle prevents data loss and business disruption, allowing the adoption to operate at the speed of my AWS Cloud.
It has a good performance which helps you with the stability of your virtual environment.
In AWS, Palo Alto provides us a better view than flow logs for network traffic.
App-ID and User-ID have repeatedly shown value in securing business critical systems.
It provides complete security posture from end-to-end. This has given us better visibility into what our security aspects are.
You already can scale it if you put it in Auto Scaling groups. If you put it in a load balancer, it should already be able to scale.
It allows us to see all our traffic to properly secure it and only allow what is needed through the firewall.
It offers a single pane of glass for all the different types of installations.
The initial setup was complex.
At my company, we might not be using it enough with other applications that we have that can integrate with it.
It's too complicated to install, when starting out.
I would like Cisco to make it easier for the administrators to use it.
The ability to be natively integrated into Port Aggregator would be beneficial because it would reduce just one more component that's needed in order to have that type of view.
I would like the search page available with Cisco Stealthwatch to be more intuitive. The previous release was better than the current one for the UI.
There's a lot of traffic on our network that we don't see sometimes.
If there was one improvement I’d suggest it would be that it detect traffic through an intranet. The product requires that traffic flow through a managed network device. The product is designed mostly for enterprise environments and not smaller environments or businesses.
It can definitely improve on the performance.
It has to be more scalable for the deployment of VMs on the cloud.
I would like to see a more thorough QA process. We have had some difficulties from bugs in releases.
We have ran into issues with Palo Alto’s limitations for resolving large IP lists from DNS lookups, as well as the antivirus interfering with App-ID.
The product could provide protection above Layer 3, which gets into the application layer and provides better visibility into those aspects of application security.
On the cloud side, they need to come up with more HA solutions to support the multi-region.
AWS doesn't integrate well with third-party firewalls.
I would like a way to do everything programmatically, or be able to copy the configs from different prices at different levels.
Pricing and Cost Advice
Today, we are part of the big Cisco ELA, and it is a la carte. We can get orders for whatever we want. At the end of the day, we have to pay for it in one big expense, but that is fine. We are okay with that.
NetFlow is very expensive.
One of the things which bugs me about Lancope is the licensing. We understand how licensing works. Our problem is when we bought and purchased most of these Lancope devices, we did so with our sister company. Somewhere within the purchase and distribution, licensing got mixed up. That is all on Cisco, and it is their responsibility. They allotted some of our sister company's equipment to us, and some of our equipment to them. To date, they have never been able to fix it.
Licensing is done by flows per second, not including outside (in traffic).
Pricing is much higher compared to other solutions.
Licensing is done by flows per second, not including outside>in traffic.
The pricing and licensing of this product on AWS should be from $1.28/hr or $4,500.00/yr. Then, it would be a good price for the performance that it delivers.
We used BYOL, because of the cost to own.
The pricing and licensing of this product on AWS for a three-year commitment is a great deal, if you can plan that far ahead.
Because the solution was getting deployed on AWS, it was the best place to go and it was available there.
One of the factors for selecting Palo Alto was they had flexible pricing. They had a pay-as-you-go model. Comparable to other products, such as Check Point, the price point was definitely a plus.
The pricing was expensive but it was comparable to the competition.
AWS is available as a AMI that you can purchase from the AWS Marketplace. Therefore, you need to purchase the licensing, since it is per AMI. Then, you deploy it on a regular EC2. Then, for on-premise, you can use both Palo Alto's software and hardware.
The price is not bad. They have a yearly renewal fee, and the pricing is exactly where we expect it to be.
out of 41 in Intrusion Detection and Prevention Software
Average Words per Review
out of 50 in Firewalls
Average Words per Review
Compared 24% of the time.
Compared 6% of the time.
Compared 5% of the time.
Compared 28% of the time.
Compared 9% of the time.
Compared 9% of the time.
Also Known As
|Cisco Stealthwatch Enterprise, Lancope StealthWatch|
|Cisco||Palo Alto Networks|
Cisco Stealthwatch uses NetFlow to provide visibility across the network, data center, branch offices, and cloud. Its advanced security analytics uncover stealthy attacks on the extended network. Stealthwatch helps you use your existing network as a security sensor and enforcer to dramatically improve your threat defense.
The VM-Series is a virtualized form factor of our next-generation firewall that can be deployed in a range of private and public cloud computing environments based on technologies from VMware, Amazon Web Services, Microsoft, Citrix and KVM.
The VM-Series natively analyzes all traffic in a single pass to determine the application identity, the content within, and the user identity. These core elements of your business can then be used as integral components of your security policy, enabling you to improve your security efficacy through a positive control model and reduce your incident response time though complete visibility into applications across all ports.
In both private and public cloud environments, the VM-Series can be deployed as a perimeter gateway, an IPsec VPN termination point, and a segmentation gateway, protecting your workloads with application enablement and threat prevention policies.
Learn more about Cisco Stealthwatch
Learn more about Palo Alto Networks VM-Series
|Edge Web Hosting, Telenor Norway, Ivy Tech Community College of Indiana, Webster Financial Corporation, Westinghouse Electric, VMware, TIAA-CREF||Warren Rogers Associates|
Financial Services Firm12%
Financial Services Firm18%
Comms Service Provider11%
No Data Available
See also Cisco Stealthwatch Reviews, Palo Alto Networks VM-Series Reviews, and our list of Best Intrusion Detection and Prevention Software Companies.