Try our new research platform with insights from 80,000+ expert users
AyoubAkhtar - PeerSpot reviewer
Cyber Security Engineer at a tech services company with 1,001-5,000 employees
Real User
Top 5Leaderboard
Enhances our overall security posture and helps us gain deeper insights into our network traffic
Pros and Cons
  • "Another notable feature of Cisco Secure Network Analytics is its Layer 7 visibility, which allows us to monitor and analyze network communications at the application layer."
  • "One area that could be improved in SNA is the integration with Cisco ISE for user and session details, which currently requires additional setup."

What is our primary use case?

Our main use case for Cisco Secure Network Analytics is its ability to monitor encrypted traffic without requiring decryption. This is a unique selling point, allowing us to analyze encrypted traffic securely. While this capability is highlighted by Cisco, it's not exclusive to their solution, as other vendors also offer similar functionalities for monitoring encrypted traffic.

What is most valuable?

Another notable feature of Cisco Secure Network Analytics is its Layer 7 visibility, which allows us to monitor and analyze network communications at the application layer. This provides insights into which protocols are being used and how they communicate within the environment. To achieve this level of visibility, we integrate a flow sensor component within the Cisco SNA solution, which gathers traffic data and forwards it to the Cisco collectors for analysis. This integration enhances our overall security posture and helps us gain deeper insights into our network traffic.

What needs improvement?

One area that could be improved in SNA is the integration with Cisco ISE for user and session details, which currently requires additional setup.

For how long have I used the solution?


Buyer's Guide
Cisco Secure Network Analytics
January 2025
Learn what your peers think about Cisco Secure Network Analytics. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,265 professionals have used our research since 2012.

What do I think about the stability of the solution?

The stability of the solution has been good, with minimal downtime or issues encountered during operation.

What do I think about the scalability of the solution?

The scalability of Cisco SNA is impressive, allowing for seamless expansion and handling of large volumes of network traffic. 

How are customer service and support?

I worked with a vendor team, and their level of expertise was satisfactory. Customer service and support from Cisco have been responsive and helpful.

How would you rate customer service and support?

Positive

How was the initial setup?

My experience with setting up SNA was straightforward as I followed Cisco's guidelines and instructions. Additionally, I compared SNA with FortiNDR as per my customer's request to understand the differences between the two solutions.

What was our ROI?

ROI has been positive due to improved network visibility and security incident detection.

What other advice do I have?

I would rate Cisco Secure Network Analytics around eight out of 10. It provides a smooth experience with minimal bugs, yet there are some features, such as username and session details integration, that could be enhanced in future iterations.

Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
Flag as inappropriate
PeerSpot user
reviewer1467678 - PeerSpot reviewer
Enterprise Information Security Architect at a agriculture with 5,001-10,000 employees
Real User
Provides valuable security knowledge and helps us improve network performance
Pros and Cons
  • "It has definitely helped us improve our mean time to resolution on network issues."
  • "Many of these tools require extensive on-premises hardware to run."

What is our primary use case?

From a security perspective, we are watching for behind the scenes data exfiltration, or tubulous, or malicious network traffic, that our other tools may not be detecting at a basic network layer.

We are also using it for performance issues in trying to figure out if a site is experiencing issues with slowness. Also, we try to determine things like whether we are exceeding the bandwidth of the link or whether there is a bottleneck or something that's not negotiating correctly on the network.

Also, we use it for TAP to try and do inline network traffic analysis from a security perspective or from a performance perspective as well.

How has it helped my organization?

It has definitely helped us improve our mean time to resolution on network issues.

From a security perspective, I think they've been good as far as giving us knowledge.

I wouldn't say it's really transformed what we do. It's just another tool that gives us the information we need or helps alarms for us. But it only alarms on a handful of things. I think there are six or eight alerts that we've deemed critical.

Beyond that, it's just mostly the performance where I think it helps out. But that's like any NetFlow performance tool. Having insight into what's going across your network is critical for any huge network to function correctly.

What is most valuable?

The most valuable feature of this solution is the ability to do TAPs because we have a distributed network.

The ability to set up one tool to stream that data over to us has been helpful because that way, we don't have to have other infrastructure and be really close to where the activity is. 

The security features have been good for helping create some correlation. For example, when you tap in, what else happens from the network perspective. 

Otherwise, just the general network performance monitoring is probably the number one thing that gets used. If we're having slowness issues then it can tell us what the bandwidth and usage are. We can find things like what is using up all the bandwidth and then find out how can we break that apart or route that differently, through a different WAN connection or internet connection.

What needs improvement?

An issue that we are having is that people have tools to do a security analysis of network traffic and people have tools that do NetFlow analysis, but typically the security tools do the NetFlow as well. We need the security piece and there are many good NetFlow tools out there, but they don't have that. I feel like they didn't segregate the product classes enough.

When you're doing research, you are looking for network traffic analysis, not NetFlow tools or network performance monitoring. This is the type of thing that I have been running into. You have to search for something that sounds very much like the other things, but it's not.

Many of these tools require extensive on-premises hardware to run. It is for their own performance and to support their own tools, including machine learning. It's as though you have to buy this hardware stack, and I feel that contributes to the price. This is versus having my collected data and then feeding it up into the cloud. I feel like a lot of monitoring tools or a lot of analysis tools are going that route. I don't think that StealthWatch is there, yet. It isn't good when you get to the point where you need to buy a huge stack of hardware. Instead, I just pay a license for how much data I send to the cloud. It is maintained there and that way, year after year I don't have to buy new hardware when it goes end-of-life.

For how long have I used the solution?

The company has been using Cisco Stealthwatch for a couple of years, but I have only been with the company for less than one year.

What do I think about the stability of the solution?

I have not been made aware of any stability issues with the tool. 

What do I think about the scalability of the solution?

My understanding is that it has been easy to scale, although I was not around for it. We have not had astronomical growth, but it sounds like it runs stable and there haven't been any performance issues with it.

We have 10 to 20 threat prevention engineers and network engineers of various levels who use it.

How are customer service and technical support?

I have not been in contact with technical support.

Which solution did I use previously and why did I switch?

I have not used another similar solution in the past. I think the only thing that would even come close was using Azure Advanced Threat Analytics, but that only really analyzes network traffic coming to the domain. It checks, for example, if there is sketchy network traffic hitting your domain controllers.

In my previous jobs, I used network performance tools, but nothing that was the same as StealthWatch where it combines that performance and security analysis together.

What's my experience with pricing, setup cost, and licensing?

This is an expensive product. We have quit paying for support because we don't want to have to upgrade it and keep paying for it.

Which other solutions did I evaluate?

I looked at the capabilities of SolarWinds NetFlow and realized that it can't replace our Cisco StealthWatch.

What other advice do I have?

We are using the previous version.

Our situation was that it was really expensive to keep up maintenance and the hardware was about to go end of life, which meant that we had to purchase a new hardware stack. Also, we were trying to get out of the data center business, so keeping StealthWatch is not really an option.

It doesn't fit where our company wants to go, but at the same time, it's one of three products out there that actually does what it does. Otherwise, you have to start linking NetFlow into the UEBA space.

My advice for anybody who is considering StealthWatch is that if you're going to maintain an on-prem network, I think it's a good solution. That is if you want to feed the bill and have something that is top of the line. But if you have a cloud journey underway and you're trying to downsize your data centers, it's going to add a big hardware footprint. This is just something to consider.

Overall, this is a good product but it would be better if it were cheaper and it fit our future plans better. Everybody had been happy with it, and the major reasons we're getting away from it are the footprint and the costs.

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Cisco Secure Network Analytics
January 2025
Learn what your peers think about Cisco Secure Network Analytics. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,265 professionals have used our research since 2012.
Director7b47 - PeerSpot reviewer
Director of Operations at a manufacturing company with 1,001-5,000 employees
Real User
Has significantly increased our network visibility and threat detection rate
Pros and Cons
  • "The most valuable features of this solution are the logging, keeping threats under control, and keeping our data and environment secure."
  • "It is time-consuming to set it up and understand how the tool works."

What is our primary use case?

Our primary uses for this solution are threat management and traffic management.

How has it helped my organization?

Our network visibility is pretty significant right now, where we use it within our data centers and even on the OT side of the house. It’s given us pretty good visibility.

This solution has increased our threat detection rate by forty to sixty percent.

Using this solution has helped us to improve threat-remediation timeframe.

It has reduced your incident response time. We use the solution's encrypted traffic analytics. It has significantly improved our capabilities. 

What is most valuable?

The most valuable features of this solution are the logging, keeping threats under control, and keeping our data and environment secure.

What needs improvement?

It is time-consuming to set it up and understand how the tool works.

For how long have I used the solution?

Still implementing.

What do I think about the stability of the solution?

In our environment, the way we've implemented in phases, the stability is good.

What do I think about the scalability of the solution?

We're going to be looking at this, and I'm hoping that it is scalable across our environment.

How are customer service and technical support?

I would rate the technical support for this solution extremely well. The professional services have been really good for us.

Which solution did I use previously and why did I switch?

We did not use another solution prior to this one, and we choose this solution based on Cisco's recommendation after they reviewed our requirements.

How was the initial setup?

The initial setup of this solution is complex. it wasn't necessarily the tool that was complex, but the environment. It had to do with the way our network is and the requirements that we needed to be implemented. This is where the complexity came from.

What about the implementation team?

We had a partner to assist us with the deployment.

Which other solutions did I evaluate?

Cisco was the only vendor that we considered for this solution.

What other advice do I have?

My advice for anybody who is implementing this solution is to have your requirements identified very clearly before you start.

The analytics and threat detection capabilities are pretty extensive. We still need to use other tools and mechanisms to analyze data, but it does the job that we’re looking for.

I would rate this solution an eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Security Analysist at Amwins Group
Real User
Improved our internal knowledge of what's going on with the network but the reporting should be cleaner
Pros and Cons
  • "It has improved our internal knowledge of what's going on with the network, and that's helpful."
  • "I would like to see more and cleaner reporting. For example, if I pull up Steven and I want to look and maybe compare him to what you've done in the past week, and compare that to the past six months, the point would be to see what the difference in activity looks like over this time. I don't see that capability in reporting to date. You see that trend but you don't really see a straightforward comparison. That right there is key to what we want to see about the normal activity."

What is our primary use case?

We really just use the product for behavior analytics of our employees. When we have issues or when there is some type of an investigation from a security perspective, we pull up Stealthwatch and start trying to see what that user was doing. If there are any anomalies in their activities we have to take action to correct it.

We don't need to monitor every device. The reports show everything that person's doing and what device they're running, et cetera, and we really only need specific things.

That was one of our problems in the initial deployment. We tried to overcome that by redeploying. I'm not sure exactly sure that it helped a lot. We're getting more data, but I'm not really sure it gives us a true picture.

How has it helped my organization?

It has improved our internal knowledge of what's going on with the network, and that's helpful. Overall we like the product, I'm just not sure it's giving us everything that we can really get out of it right now.

What is most valuable?

The ability to see a real-time picture of the network is the most valuable for us.

What needs improvement?

I would like to see more and cleaner reporting. For example, if I pull up Steven and I want to look and maybe compare him to what you've done in the past week, and compare that to the past six months, the point would be to see what the difference in activity looks like over this time. I don't see that capability in reporting to date. You see that trend but you don't really see a straightforward comparison. That right there is key to what we want to see about the normal activity.

What do I think about the stability of the solution?

The product is very stable. No problems at all.

How are customer service and technical support?

I can't really comment on the customer service as that is not part of my turf. That's in the neck of the engineering team.

Which solution did I use previously and why did I switch?

There wasn't really a big decision making effort. The product came with the big suite of things that we purchased, so we decided to take advantage of it and deployed it.

How was the initial setup?

I was involved in the deployment. The initial setup should have been easier than it was — fairly easy overall. I think my engineering department made it more difficult. We should have deployed it based on the exact specifications of the vendor. On our team, we've got people who think they know more than the vendor. Any trouble goes back to our entire team not following the directions to the letter during the setup. They should have made sure they followed the exact steps to get everything running, and then actually go dig into any other need they're trying to solve for specifically. After that make sure to get reporting to match issues that are important to solve for because that's what makes it useful.

What about the implementation team?

We dealt directly with Cisco for the implementation.

What other advice do I have?

Overall the product is good. I'd give it a seven out of ten. That's mostly because of the deployment and then the reporting and trying to get the stuff out of it in a way that we want it.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Engineer at Charter Communications, Inc.
Real User
Shows the actual data flow transiting the network but scalability is a concern
Pros and Cons
  • "Being able to identify specific date closed across the network is invaluable."
  • "We've had problems with element licensing costs so scalability is a concern."

What is our primary use case?

We mainly use this solution for diagnostic information.

How has it helped my organization?

Being able to see the actual data flows transiting the network versus what we had planned is a great sanity check for our overall design planning. It is also useful to be able to make sure that we track the load that we anticipate.

The core reason we purchased this product was to increase our visibility of where the traffic sources and destinations were, as opposed to just raw data that is on the interface.

Stealthwatch has also reduced 10% of false positives. We're kind of limited to the deployment of Stealthwatch right now.

It saves us administrative work and design. 

What is most valuable?

Being able to identify specific data closed across the network is invaluable.

Their analytics and threat detection capabilities are good. We're able to pick out the individual traffic flows for specific users and even individual sessions across the network and reconstruct timelines of activity after the fact, if needed, or use the data in real time to plan out network capacity and growth.

What do I think about the stability of the solution?

Stealthwatch is a very stable solution.

What do I think about the scalability of the solution?

We've had problems with element licensing costs so scalability is a concern.

How are customer service and technical support?

The technical support provided is excellent.

Which solution did I use previously and why did I switch?

We used NetFlow before, so Stealthwatch was pretty much the only game in town for getting the level of detail that we were looking for out of the transport network. It was a natural choice.

What about the implementation team?

We used a vendor for the implementation. 

What's my experience with pricing, setup cost, and licensing?

Licensing is on a yearly basis, but I have no idea what the costs are.

Which other solutions did I evaluate?

We work very closely with Cisco directly and therefore we really just looked at Stealthwatch, because it was Cisco's product and they said this is what we do.

What other advice do I have?

You definitely need something to do flow level analysis.

The biggest lesson I learned is that it's important to be able to see the individual traffic flows across the network, as opposed to the massive aggregate data.

I would rate this solution as seven out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Network Engineer at Oracle Corporation
Real User
Deploying this solution has shown us how poor our previous network monitoring coverage was
Pros and Cons
  • "It has been pretty stable since we deployed it, and everything seems to be working fine."
  • "We had some trouble with the installation as we migrated from our previous solution."

What is our primary use case?

This is a security solution for us and our customers. We use it for port monitoring aggregation and doing captures.

What needs improvement?

We had some trouble with the installation as we migrated from our previous solution.

For how long have I used the solution?

Three months.

What do I think about the stability of the solution?

It has been pretty stable since we deployed it, and everything seems to be working fine.

What do I think about the scalability of the solution?

That scalability seems to be ok, although we did have some concerns. Potentially, we are going to be looking at 100-gigabit links, and the version of the solution that we deployed does not support that. That is a long-term concern, rather than an immediate one.

How are customer service and technical support?

We had some technical questions when we were doing the initial deployment, and they were very good in helping us with that.

Which solution did I use previously and why did I switch?

Prior to this solution, we used an ad-hoc, internal system. We knew that it had to be replaced because it was not passing the audit as per our set standards. Ultimately, that drove us to look for a more standardized solution.

How was the initial setup?

The initial setup for this solution was fairly complex. This was, in part, because of where we placed it in our network and the removal of our old system. It involved mapping it from the old to new so that it will be able to maintain the same functionality in our network.

What about the implementation team?

We used an integrator to assist with the implementation.

Which other solutions did I evaluate?

Cisco is our biggest primary vendor, so it was an easy go-to for this solution.

What other advice do I have?

My advice for anybody who is implementing this solution is to engage with an integrator or somebody who is familiar with it, or deploying it. This will make everything easier in terms of setting it up.

This solution is doing everything that we want, and my only complaint is in regards to the quirks during installation.

I would rate this solution an eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
IT Network Engineer at a logistics company with 10,001+ employees
Real User
Easy to investigate flow and has improved the processes for mitigating any risks
Pros and Cons
  • "The feature most valuable for us is to gain visibility of what is actually floating through, so we can stop it based on whether it's good or bad traffic."
  • "The initial setup was complex."

What is our primary use case?

Our primary use for Stealthwatch is to provide insights into what traffic is flowing through the network for our security operations center. With that, they can go and enforce security.

How has it helped my organization?

It has improved the processes for mitigating any risk that might be. So when we find traffic that we don't want to allow, then it makes it easy to actually investigate where the traffic was and then we have the history as well.

This solution has improved network visibility a lot. We have a thousand sites around the world. So trying to figure out how the users are using the network is not an easy job. By using Stealthwatch, we are actually able to get the visibility of what they're using and also to get some kind of insights into patterns that they are having. For example, browsing YouTube, Facebook, and so forth.

Stealthwatch increased the threat detection rate, but not our incident response time.

It has also reduced the amount of time it takes us to detect and remediate threats, by about 20%.

What is most valuable?

The feature most valuable for us is to gain visibility of what is actually floating through, so we can stop it based on whether it's good or bad traffic.

Their analytics and threat detection capabilities are good, too.

What do I think about the stability of the solution?

We haven't had any stability issues so far, but we have only been running it for half a year.

What do I think about the scalability of the solution?

The scalability is good, seen from a license perspective, as well.

How are customer service and technical support?

We haven't really used the technical support yet, but in general, they are good.

How was the initial setup?

The initial setup was complex. Lancope was the owner of Stealthwatch until Cisco acquired them and there are still a lot of dependencies on Lancope, which makes the overview a bit difficult to get.

What about the implementation team?

We deployed it ourselves.

What was our ROI?

I don't think we have saved money, to be honest. But you cannot measure security and money.

Which other solutions did I evaluate?

We looked into Darktrace, but we chose Stealthwatch because we have an ELA agreement, and that makes the product available to us already. But also in relation to actually the threat intelligence that Cisco has, they are fitting nicely in with the rest of our products.

What other advice do I have?

Implement it, because it will give a lot of insights together with ISE and so forth, so it's really good.

I would rate this as an eight out of ten because there is still room for documentation and so forth, to be more streamlined.

I don't know if there's a lesson I have learned. What we have really learned from this exercise is how our users are working.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
SrNetworbb7a - PeerSpot reviewer
Sr Network Engineer at a insurance company with 5,001-10,000 employees
Real User
Tracks anomalies in real time but is challenging to scale to the size of our environment
Pros and Cons
  • "Being able to graph and show data to management has improved our organization. We can show the data to the higher-ups. It shows them that it's picking up on these anomalies and doing its job."
  • "They should include Citrix VDIs in the next release."

What is our primary use case?

Our primary use case for Stealthwatch is endpoint security.

How has it helped my organization?

Being able to graph and show data to management has improved our organization. We can show the data to the higher-ups. It shows them that it's picking up on these anomalies and doing its job.

It has reduced our incidence response time by around 30%. The solution has improved our efficiency in operations around 30% through basic cost-cutting. It has reduced the amount of admin support time by around 15%.

What is most valuable?

The most valuable feature is its ability to track anomalies in real time. It increases our time-to-value ratios.

What needs improvement?

They should include Citrix VDIs in the next release.

What do I think about the stability of the solution?

It's stable.

What do I think about the scalability of the solution?

It's challenging to scale as big as our environment.

How are customer service and technical support?

I highly recommend their technical support.

Which solution did I use previously and why did I switch?

We knew we needed to switch because we had a gap in visibility. We picked this solution because we're a Cisco shop.

How was the initial setup?

The setup was of moderate complexity because of the Citrix environment.

What about the implementation team?

We used a reseller for the deployment called Presidio. We had a good deployment with them.

Which other solutions did I evaluate?

We also looked at FortiGate.

What other advice do I have?

On a scale from one to ten, I would rate Cisco HyperFlex HX a six only because of the challenges we had with Citrix.

You need a dedicated team to manage all of these products and their integration together.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Cisco Secure Network Analytics Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2025
Buyer's Guide
Download our free Cisco Secure Network Analytics Report and get advice and tips from experienced pros sharing their opinions.