Most Helpful Review
Users/endpoints focus gives us more understanding of network events, allowing us to see behavior patterns
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
The most valuable feature is anomaly detection, where it finds things that are not allowed internally.
Most of the engineers I've worked with have been really good. Very knowledgeable and easy to work with.
Being able to graph and show data to management has improved our organization. We can show the data to the higher-ups. It shows them that it's picking up on these anomalies and doing its job.
It's a dependable product that is able to pinpoint where we have vulnerabilities if they occur.
Using the Cognitive Analytics feature, we have complete visibility that we didn’t have before.
The most valuable feature about this solution is that it gives me insight of my network.
It has improved our internal knowledge of what's going on with the network, and that's helpful.
The most valuable features of this solution are the logging, keeping threats under control, and keeping our data and environment secure.
The web interface is great — very useful and user-friendly.
The incident case management is the most valuable feature. Even though there's always something I find I would like to add to that feature, the ability to quickly sort through all the logs, network and endpoint data, etc., and add it to an incident case as part of the investigation, is nice. Having it automatically timeline that additional data into the original incident timeline, and correlate it to other notable events and activities on the network, results in a huge improvement in our overall confidence that we've quickly traced down the right source of an issue.
The alerting to drive investigations and remediation has been its most valuable feature.
It improved my organization by building a security alerting program.
User behavioral analytics allows us to pinpoint abnormal or suspicious behavior among millions of events every day.
Log search allows us to dive deep into aggregated logs and query all event types at once.
The log aggregation and storage provided by InsightIDR has shown no issues with scalability; aggregating over one hundred millions events daily.
InsightIDR has allowed us to find potential security issues that we did not know existed, and get remediation quickly.
The usability of this solution needs to be improved.
We've run into some issues with the configuration.
They should include Citrix VDIs in the next release.
The GUI could use some improvement. Being able to find features more easily would be a great improvement if it was simplified.
The initial setup is complex, as there is a lot to configure.
It hasn't really improved our direct detection rate but it has definitely reduced our incident response time as we wouldn't have been able to detect threats or immediate risks without this solution.
I would like to see more and cleaner reporting. For example, if I pull up Steven and I want to look and maybe compare him to what you've done in the past week, and compare that to the past six months, the point would be to see what the difference in activity looks like over this time. I don't see that capability in reporting to date. You see that trend but you don't really see a straightforward comparison. That right there is key to what we want to see about the normal activity.
It is time-consuming to set it up and understand how the tool works.
The interface for doing investigation needs to be enhanced with minor improvements that would make it more useful.
The reporting is the weakest aspect. There needs to be multi-level grouping for events (for example, group by user and destination). Right now, we can do a group by user and a separate table or group by destination. But I'd be more interested in where a person was logging into instead of who was logging in or where he was logging in.
Customised alert recipients need to be added to allow better first-line action and quicker response. Configurable honeypots would be a welcome addition.
It would be useful to import threat intelligence in YARA format along with known incorrect email addresses.
I feel it would greatly benefit from more supported log sources.
The ability to tune the collector for custom logs would greatly help.
I would like the ability to adjust the threshold of certain existing alerts. Currently the only option is to change the notifications or create my own alert.
One thing that springs to mind is easier API integration with ITSMs. We are evaluating a new ITSM and I would like to have InsightIDR create a ticket when an attack is identified, and the ticket would be closed in InsightIDR when the ITSM resolution is completed. This would take out the "single point of failure" we currently have, if the email recipient is somehow absent, in recording the risk appetite for the incident and the actions taken to mitigate or not.
Pricing and Cost Advice
Our fees are approximately $3,000 USD.
Licensing is on a yearly basis.
We pay for support costs on a yearly basis.
On a yearly basis, licensing is somewhere around $30,000.
The yearly licensing cost is about $50,000.
The pricing for this solution is good.
The licensing costs are outrageous.
Today, we are part of the big Cisco ELA, and it is a la carte. We can get orders for whatever we want. At the end of the day, we have to pay for it in one big expense, but that is fine. We are okay with that.
Licensing is by endpoint and amount of retention time (at least ours is). Default retention was one year, but we are able to push the retention further if needed. There's also a provide-your-own-S3 option for longer retention if you don't want to pay for the additional retention years in your Rapid7 agreement.
The pricing and licensing are competitive.
Accurately predict your licensing counts as this is a subscription based product.
The team is very willing to work with companies. My suggestion is to call the Rapid7 sales department and see how they can help.
Licensing is straightforward. If, for some reason, you don’t meet the minimum licensing requirements, there is a third-party managed service that can help.
I am sure that there are cheaper products out there, but none that meet so many of our needs whilst maintaining stability and usability.
out of 45 in Intrusion Detection and Prevention Software
Average Words per Review
out of 42 in Security Information and Event Management (SIEM)
Average Words per Review
Compared 25% of the time.
Compared 6% of the time.
Compared 4% of the time.
Compared 18% of the time.
Compared 13% of the time.
Compared 9% of the time.
Also Known As
|Cisco Stealthwatch Enterprise, Lancope StealthWatch||InsightIDR|
Cisco Stealthwatch uses NetFlow to provide visibility across the network, data center, branch offices, and cloud. Its advanced security analytics uncover stealthy attacks on the extended network. Stealthwatch helps you use your existing network as a security sensor and enforcer to dramatically improve your threat defense.
Parsing hundreds of trivial alerts. Managing a mountain of data. Manually forwarding info from your endpoints. Forget that. InsightIDR instantly arms you with the insight you need to make better decisions across the incident detection and response lifecycle, faster.
Learn more about Cisco Stealthwatch
Learn more about Rapid7 InsightIDR
|Edge Web Hosting, Telenor Norway, Ivy Tech Community College of Indiana, Webster Financial Corporation, Westinghouse Electric, VMware, TIAA-CREF||Liberty Wines, Pioneer Telephone, Visier|
Financial Services Firm14%
Comms Service Provider24%
Software R&D Company14%
Financial Services Firm7%
Software R&D Company26%
Comms Service Provider10%
Financial Services Firm8%
See also Cisco Stealthwatch Reviews, Rapid7 InsightIDR Reviews, and our list of Best Intrusion Detection and Prevention Software Companies.