Compare RSA NetWitness Logs and Packets (RSA SIEM) vs. Zscaler Cloud Sandbox

RSA NetWitness Logs and Packets (RSA SIEM) is ranked 4th in Advanced Threat Protection with 12 reviews while Zscaler Cloud Sandbox is ranked 17th in Advanced Threat Protection. RSA NetWitness Logs and Packets (RSA SIEM) is rated 7.0, while Zscaler Cloud Sandbox is rated 0. The top reviewer of RSA NetWitness Logs and Packets (RSA SIEM) writes "Good support, powerful decoders and concentrator, but the dashboard is not reflecting events in real-time ". On the other hand, RSA NetWitness Logs and Packets (RSA SIEM) is most compared with IBM QRadar, Splunk, ArcSight, LogRhythm NextGen SIEM and Cisco Stealthwatch, whereas Zscaler Cloud Sandbox is most compared with FireEye Network Security and Fortinet FortiEDR.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Use Zscaler Cloud Sandbox? Share your opinion.
Find out what your peers are saying about Palo Alto Networks, FireEye, RSA and others in Advanced Threat Protection. Updated: July 2020.
430,376 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
Many clients are not able to purchase the packet capability because there is a huge amount of data, and the cost depends on the number of EPS (Events per second), as well as the number of gigabytes of data per day.We have a perpetual license, so the total cost of ownership is not very expensive. It's a good investment.This is a pricey solution; it's not cheap.The licenses are good but the cost is very expensive.It is cheap.

More RSA NetWitness Logs and Packets (RSA SIEM) Pricing and Cost Advice »

Information Not Available
report
Use our free recommendation engine to learn which Advanced Threat Protection solutions are best for your needs.
430,376 professionals have used our research since 2012.
Ranking
Views
6,881
Comparisons
4,539
Reviews
12
Average Words per Review
466
Avg. Rating
7.1
Views
90
Comparisons
52
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
Popular Comparisons
Also Known As
RSA Security Analytics
Learn
RSA
Zscaler
Overview

If you’re relying on log data to detect and prevent cyber threats, you’re in trouble. Attackers increasingly evade detection of log-centric security and network monitoring tools. But logs combined with full packet, endpoint NetFlow data are proven to provide the essential details for early threat detection. Here’s a closer look at our solution.

Today’s appliance-based sandboxing solutions are expensive and, therefore, typically installed only in the data center. When users leave the network, they become exposed to new threats because sandbox protection can’t follow them. Traditional sandboxes usually operate out of line, allowing traffic through while inspecting suspicious files in TAP mode. If a threat is detected in the sandbox, it sends alerts, but they can arrive too late. Traditional sandboxes also lack the ability to fully inspect SSL traffic due to hardware limitations—and many malware authors are exploiting those limitations to distribute their malicious payloads. In order to provide sandbox protection, organizations have bolted sandboxing solutions onto their existing security stacks. It helps, but achieving a fully integrated threat platform across multiple products is nearly impossible.

For more details: https://www.zscaler.com/produc...

Offer
Learn more about RSA NetWitness Logs and Packets (RSA SIEM)
Learn more about Zscaler Cloud Sandbox
Sample Customers
Los Angeles World Airports, ReplyZenith Live, Azure, Carlsberg Group
Top Industries
REVIEWERS
Comms Service Provider29%
Financial Services Firm29%
Computer Software Company29%
Healthcare Company14%
VISITORS READING REVIEWS
Computer Software Company45%
Comms Service Provider13%
Government6%
Media Company6%
No Data Available
Find out what your peers are saying about Palo Alto Networks, FireEye, RSA and others in Advanced Threat Protection. Updated: July 2020.
430,376 professionals have used our research since 2012.

See our list of best Advanced Threat Protection vendors.

We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.