We performed a comparison between Cisco Secure Network Analytics and Palo Alto Networks Advanced Threat Prevention based on real PeerSpot user reviews.
Find out in this report how the two Network Monitoring Software solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We can manage the entire system across the network and troubleshoot the pain points."
"The most valuable feature is its alerts and dashboard."
"StealthWatch lets me see the ports running in and out and the country. It has excellent reporting, telemetry, and artificial intelligence features. With the telemetry, I can set thresholds to detect sudden changes and the alarms go through the PLC parts. I can see all the ports running on that trunk."
"The beginning of any security investigation starts with net flow data."
"It has been pretty stable since we deployed it, and everything seems to be working fine."
"The deployment was a breeze. It is a very innovative and robust platform that allows us to bi-directionally stitch together data elements from Netflow-enabled devices to provide a context for network utilization."
"The most valuable feature is NetFlow. The beginning of any security investigation starts with NetFlow data."
"The most valuable feature is having visibility into the data segments throughout our network."
"The feature most valuable for us is to gain visibility of what is actually floating through, so we can stop it based on whether it's good or bad traffic."
"For those who want a next-gen firewall that's easy to configure and easy to operate, I think you should go for Palo Alto."
"I like the solution's interface."
"It's a monster, it's got so many beautiful features. We do deal with other firewalls and we've got a better idea of what other firewalls' capabilities are, any comparison with the Palo Alto I liked the quality of service on the applications that you can control the amount of bandwidth an application is allowed to consume. The best feature is the quality of the application quality of service."
"I find the malware protection very handy."
"We are currently using the URL filtering feature, which is the most popular."
"The most valuable features are that it's user-friendly, has interesting features, URL filtering, and threat prevention."
"Edge protection is a valuable feature."
"The user interface is a bit more professional than some free products."
"The Wi-Fi side needs improvement."
"It's too complicated to install, when starting out."
"The customizability of the UI should improve."
"Stealthwatch is still maturing in AI. It uses artificial intelligence for predictions, but AI still needs to mature. It is in a phase where you get 95% correct detection. As its AI engine learns more, it will become more accurate. This is applicable to all the devices that are using AI because they support both supervised and unsupervised machine learning. The accuracy in the case of supervised machine learning is dependent on the data you feed into the box. The accuracy in the case of unsupervised machine learning is dependent on the algorithm. The algorithm matures depending on retrospective learning, and this is how it is able to detect zero-day attacks."
"The version with the Dell server had iDRAC problems. Often, it reported iDRAC failure."
"There could be better integration on the programming side, which uses Python. StealthWatch could provide a template for Python to manage the switches. For example, it would be nice if StealthWatch bounced a port automatically it detected something anomalous."
"It's not great as a standalone solution."
"The visualization could be improved, the GUI is not the best."
"If there was one improvement I’d suggest it would be that it detect traffic through an intranet. The product requires that traffic flow through a managed network device. The product is designed mostly for enterprise environments and not smaller environments or businesses."
"Right now we are focusing on email. If Palo Alto can increase the features related to email filtering and the new malware, it would help us protect our systems."
"The technology firewall anomaly network could stand improvement."
"We are attempting to improve the use of URL filtering beyond threat protection."
"The pricing has improved with the newer generation of their Firewalls, but the price could always be lower. In comparison with other solutions, I believe they're quite competitive."
"It's not so easy to set up a test environment, because it's not so easy to get the test license. The vendor only gives you 90 days for a test license; it's a tough license to get."
"I think they can use some improvement on FID."
"The initial setup is complex."
"The installation was complicated."
More Cisco Secure Network Analytics Pricing and Cost Advice →
More Palo Alto Networks Advanced Threat Prevention Pricing and Cost Advice →
Cisco Secure Network Analytics is ranked 24th in Network Monitoring Software with 57 reviews while Palo Alto Networks Advanced Threat Prevention is ranked 6th in Intrusion Detection and Prevention Software (IDPS) with 24 reviews. Cisco Secure Network Analytics is rated 8.2, while Palo Alto Networks Advanced Threat Prevention is rated 8.8. The top reviewer of Cisco Secure Network Analytics writes "Increased the visibility of what is happening in our network". On the other hand, the top reviewer of Palo Alto Networks Advanced Threat Prevention writes "A good amount of granularity and advanced URL filtering capabilities". Cisco Secure Network Analytics is most compared with Darktrace, Cisco Secure Cloud Analytics, ThousandEyes, Vectra AI and Splunk User Behavior Analytics, whereas Palo Alto Networks Advanced Threat Prevention is most compared with Check Point IPS, Fortinet FortiGate IPS, Arista NDR, Forcepoint Next Generation Firewall and Cisco Sourcefire SNORT. See our Cisco Secure Network Analytics vs. Palo Alto Networks Advanced Threat Prevention report.
We monitor all Network Monitoring Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.