We performed a comparison between Arbor DDoS and Cisco Secure Network Analytics based on real PeerSpot user reviews.
Find out what your peers are saying about Cloudflare, NETSCOUT, Akamai and others in Distributed Denial of Service (DDOS) Protection."The solution provides good protection against volumetric DDoS attacks."
"We use it not only for DDoS detection and protection, but we also use it for traffic analysis and capacity planning as well. We've also been able to extend the use of it to other security measures within our company, the front-line defense, not only for DDoS, but for any kind of scanning malware that may be picked up. It's also used for outbound attacks, which has helped us mitigate those and lower our bandwidth costs..."
"The most valuable feature is mitigation, which can blackhole the IP."
"Arbor has the ability to learn and self-create the appropriate profile for each customer."
"Reporting is quite good. There are several pages of reporting on DDoS attacks, and you can find all the details that you need."
"The artificial intelligence feature is most appreciated. This solution can lower the throughput and clear the traffic, which is something really important for us. It also provides good protection. It is user-friendly, and its integration has also been really fast. We have many critical applications, and it was easy to integrate Arbor DDoS with our website, mobile application, and web banking."
"Our customers are very happy when we provide them with the interface... They can check how many attacks they have faced and how many attacks have been blocked."
"The stability is okay and we have not encountered problems with the solution."
"The deployment was a breeze. It is a very innovative and robust platform that allows us to bi-directionally stitch together data elements from Netflow-enabled devices to provide a context for network utilization."
"Being able to identify specific date closed across the network is invaluable."
"The most valuable feature of this solution is the way the net flow is being merged together in a single pane. That's been extremely useful for us, because can see what's going on with traffic in one single place."
"The most valuable features of this solution are its reporting and mitigation capabilities."
"The solution allowed us to not only get gain insight but also start collaborating with other tools."
"This product alleviates the day-to-day headaches for us, in regards to metrics."
"Cisco Stealthwatch has predefined alerts for different types of security issues that might happen in the network. Whether it's PCs or servers that are used for botnets or Bitcoin mining we receive the alerts automatically. This functionality is what we receive from the solution out of the box."
"We find that Stealthwatch can detect the unseen."
"We need a SaaS model for the solution."
"On the application layer, they could have a better distributed traffic flow. They could improve that a bit. For network data it is very effective, but the application layer can be improved."
"The following areas need improvement: opening and tracking support tickets, online support resources, software upgrades/updates and replacement media, and event management guidelines."
"The implementation should be made easier."
"On the main page there are alerts that we are unable to clear, even though the issue has been resolved."
"It is an expensive product, so there is room for improvement in terms of pricing."
"A small improvement could be a better reporting system."
"Because we had some routers that were somewhat old, they were not integrated with Arbor. They did not support the NetFlow version that Arbor was running. That was a challenge. We had to upgrade the routers. Some backward-compatibility would be helpful."
"If there was one improvement I’d suggest it would be that it detect traffic through an intranet. The product requires that traffic flow through a managed network device. The product is designed mostly for enterprise environments and not smaller environments or businesses."
"The usability of this solution needs to be improved."
"I would like Cisco to make it easier for the administrators to use it."
"One update I would like to see is an agent-based client. Currently StealthWatch is network based."
"I would like the search page available with Cisco Stealthwatch to be more intuitive. The previous release was better than the current one for the UI."
"Its granularity for RBAC roles-based access control needs improvement."
"Stealthwatch is still maturing in AI. It uses artificial intelligence for predictions, but AI still needs to mature. It is in a phase where you get 95% correct detection. As its AI engine learns more, it will become more accurate. This is applicable to all the devices that are using AI because they support both supervised and unsupervised machine learning. The accuracy in the case of supervised machine learning is dependent on the data you feed into the box. The accuracy in the case of unsupervised machine learning is dependent on the algorithm. The algorithm matures depending on retrospective learning, and this is how it is able to detect zero-day attacks."
"We had some trouble with the installation as we migrated from our previous solution."
More Cisco Secure Network Analytics Pricing and Cost Advice →
Arbor DDoS is ranked 2nd in Distributed Denial of Service (DDOS) Protection with 46 reviews while Cisco Secure Network Analytics is ranked 24th in Network Monitoring Software with 58 reviews. Arbor DDoS is rated 8.6, while Cisco Secure Network Analytics is rated 8.2. The top reviewer of Arbor DDoS writes "A critical solution for security, as it includes features that can automatically detect and prevent DDoS attacks". On the other hand, the top reviewer of Cisco Secure Network Analytics writes "Increased the visibility of what is happening in our network". Arbor DDoS is most compared with Radware DefensePro, Cloudflare, Corero, Imperva DDoS and A10 Thunder TPS, whereas Cisco Secure Network Analytics is most compared with Darktrace, Cisco Secure Cloud Analytics, ThousandEyes, Vectra AI and Arista NDR.
We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.