We use Cisco Stealthwatch for device compliance and device auditing. It's part of our overall strategy. We have been consolidating down. Our security team is over-packed. We're trying to leverage what we have and move the blame away from us on the network side.
Network Architect at Henry Ford health system
Saves us time, money, and administrative work but scaling is a little difficult
Pros and Cons
- "The solution's analytics and thrust detection capabilities are good. We're still adjusting it. It's a little hypersensitive, but it is working right now."
- "Cisco Stealthwatch needs more integration with device discovery. We have to do a lot of hard work to figure out what things are. Better service integration is required."
What is our primary use case?
How has it helped my organization?
The solution's analytics and thrust detection capabilities are good. We're still adjusting it. It's a little hypersensitive, but it is working right now.
We use cloud threat analytics. We don't use the cloud engine. Intrusion detection and analytics have been good so far. We haven't caught anything crazy yet. We're still eyeing it.
What is most valuable?
The most valuable feature is the level of visibility and the automation behind it. We don't have to go chasing things down.
What needs improvement?
Cisco Stealthwatch needs more integration with device discovery. We have to do a lot of hard work to figure out what things are. Better service integration is required.
Buyer's Guide
Cisco Secure Network Analytics
January 2025
Learn what your peers think about Cisco Secure Network Analytics. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,265 professionals have used our research since 2012.
What do I think about the stability of the solution?
Stability is what we're looking for in production. Stability is everything.
The stability of the solution seems fine. It hasn't crashed yet.
What do I think about the scalability of the solution?
Scaling with Cisco Stealthwatch is a little bit difficult. At our scale, we need a lot of boxes to make it work. The hardware is something else. Some of the devices seem a little bit outdated in how they're built.
For the scalability, other than some of the interesting things like the blow sensors, the actual analytics engine is solid so far.
How are customer service and support?
The customer service has been fine, normal. It meets our expectations.
Which solution did I use previously and why did I switch?
We did not have a different solution in this specific use case. We had some solutions that would cover pieces of it but nothing ever did the whole job.
How was the initial setup?
We deployed it ourselves. It was easy enough. The instructions were clear enough for us to be able to roll it out straightforward.
Which other solutions did I evaluate?
We were looking at NetScout and ThousandEyes, plus a couple of other similar solutions. We have a lot of NetScout products. We're trying to get into that space but we're not there yet. We're still too early.
There are not a lot of products currently available for that specific function. There are a lot of half-solutions on the market.
What other advice do I have?
Cisco Stealthwatch has not reduced our response times yet, it probably will though. The solution is perfect in traffic analytics. We've started that roll out. The new sites that we have will be doing that.
Right now we have a lot of false positives, but that's just Cisco Stealthwatch still in its adjusting phase.
The solution saves us time, money, and administrative work. It is a lot of administrative work on its own but it's going to help out other teams.
In the long run, it's going to help save money. For the time to value, it's going to take a long time. It's probably a year or two-year process.
On a scale of one to ten, I would rate Cisco Stealthwatch with a seven. It's a solid product. It's very useful, but it takes an incredibly long time. There's a lot of hard work.
A lot more integration of automation tools like inventory systems would be helpful, i.e. where we can pull the data instead of having to look ourselves.
Cisco Stealthwatch is part of our narrow transformation. We're looking at campus fabric, DNA centers, etc. It helps that we can see what's going on.
Deploying the virtual machines made our storage have artifacts. But that was expected.
Make sure you resource it correctly because it's going to use more than you expect.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Former Employee of Orange Business Services as Head of Security Engineering at a comms service provider with 5,001-10,000 employees
Comprehensive solution with a good technical support team
Pros and Cons
- "It works efficiently for encrypted traffic analysis."
- "Its granularity for RBAC roles-based access control needs improvement."
What is our primary use case?
We use the solution to improve the security of private hosting and network management systems. We can detect data exfiltration by analyzing statistics and identifying obsolete protocols and applications. It also helps us graph traffic metrics with valuable insights into routing and flows.
What is most valuable?
The solution's most valuable feature is its ability to detect potential endpoint threats.
What needs improvement?
The solution's cost could be better. Also, its granularity for RBAC roles-based access control needs improvement.
For how long have I used the solution?
I have been using the solution for four years.
What do I think about the stability of the solution?
The solution is very stable.
What do I think about the scalability of the solution?
The solution is expensive to scale up commercially.
How are customer service and support?
The solution's technical support is good.
How would you rate customer service and support?
Positive
How was the initial setup?
The complexity of the solution's deployment depends on the specific network infrastructure.
What about the implementation team?
We have two executives to handle the implementation of the solution.
What's my experience with pricing, setup cost, and licensing?
The solution is expensive. It costs several hundred thousand dollars per year (depending on how many flows you are collecting).
What other advice do I have?
I rate the solution as a nine. It is very comprehensive and promising in encrypted traffic analysis. It is very well supported and documented as well.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Cisco Secure Network Analytics
January 2025
Learn what your peers think about Cisco Secure Network Analytics. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,265 professionals have used our research since 2012.
Lead Network Engineer at a retailer with 1,001-5,000 employees
Enables us to be proactive with security analysis but the interface is sluggish
Pros and Cons
- "The ability to send data flow from other places and have them all in one place is very valuable for us."
- "I think the interface is a little lacking. The interface seems like it just needs to be modernized. It's been the same interface now, ever since I've seen it probably four years ago."
What is our primary use case?
The security team uses it more than we do. I don't work on it that much. We have a couple uses for Stealthwatch: gathering security data and sending logs. I believe there is a gatherer that we have that has all of our logs sitting there. That's basically all we use them for.
How has it helped my organization?
Stealthwatch improved our organization by providing more information so we can be proactive with security analysis.
It's made our network visibility better. The more information that we can give is all for the best. Just allowing us to get more information and visibility is also helpful.
I would say it has increased our threat detection rate. We use it to count employees and we have some new places we use it, so this may have increased.
It may have reduced the time to detect and remedy threats a little.
It has reduced false positives, by around 15%. That would be the security numbers, I'm not aware of the exact numbers.
I'm sure Stealthwatch saves us time, money, and administrative work.
What is most valuable?
The ability to send data flow from other places and have them all in one place is very valuable for us.
What needs improvement?
I think the interface is a little lacking. The interface seems like it just needs to be modernized. It's been the same interface now, ever since I've seen it probably four years ago.
For how long have I used the solution?
We've had Stealthwatch in production for a year and half.
What do I think about the stability of the solution?
It's stable now. I wouldn't say it was stable when we first had the solution, but now it's stable. In the beginning, we had the standard first-time turn-up stuff, like issues with the code, etc. We tried to give them a better solution to work with our company well. The way we have things set up is complicated.
What do I think about the scalability of the solution?
We only use it for certain subsets so we're not really dependent on how scalable it is. It does what we need it to do and that's all we could ever let it do.
How are customer service and technical support?
I didn't work much with technical support. We had to get a license. That was our only hangup in the beginning. I think their support is as expected.
What was our ROI?
In terms of time to value, I think that would be better, from my standpoint. I would say it's definitely helped, but I wouldn't consider it the only tool that we depend on.
I would say they are getting a return on investment if it's doing what they want it to do and they're getting information. Also, it helps to be proactive on things like Stealthwatch.
What other advice do I have?
The biggest lesson I learned is if it's not getting the flow data, it's not helping you. You have to just get your appointment inside the data. That's not really a tool, that's just if you don't send it, it can't see it.
In terms of advice, be sure of what traffic you want to send it, or it's useless. Have that ready, so that you can get your data back immediately instead of trying to fight with it a long time. Just have your information ready to configure.
I would rate Stealthwatch as a six out of ten. The interface is sluggish and not updated. The whole thing is a little sluggish when you're trying to do stuff, too. In my experience, it does what we expect it to do and from that standpoint, we don't really expect any more.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Manager of Digital Communications at Memorial Hermann Healthcare System
Good for analyzing security threats and as a general network performance diagnostic tool
Pros and Cons
- "The solution has increased our threat detection rate. Cisco Stealthwatch has not reduced our incident response times. It has not reduced the amount of time it takes us to detect immediate threats. It has reduced false positives."
- "The ability to be natively integrated into Port Aggregator would be beneficial because it would reduce just one more component that's needed in order to have that type of view."
What is our primary use case?
We use Cisco Stealthwatch for security and network analytics. The solution saves you time, money, and administrative work. If we have the device support, it means that I don't have to send someone in a car to go to be local on the site and look at whatever the issue is.
How has it helped my organization?
Our limitation is that Cisco Stealthwatch doesn't have visibility over everything. When we can use it, it gives us direct information. We use this information not only for analyzing security threats but as well as just for general network performance in the places it has view of.
The solution affected network visibility in our organization fairly well. Without it, I have almost no visibility. It requires me to send people to different sites to manually get captured or to look at the network.
The solution has increased our threat detection rate. Cisco Stealthwatch has not reduced our incident response times. It has not reduced the amount of time it takes us to detect immediate threats. It has reduced false positives.
What is most valuable?
The analytics and threat detection capabilities of Cisco Stealthwatch are pretty good. It gives us good visibility of the information. It is easy to use and to the point.
What needs improvement?
The ability to be natively integrated into Port Aggregator would be beneficial because it would reduce just one more component that's needed in order to have that type of view.
What do I think about the stability of the solution?
I've never known it to go down or have availability issues.
What do I think about the scalability of the solution?
Cisco Stealthwatch is scalable with money. It's expensive.
How are customer service and technical support?
I haven't dealt with Cisco customer service directly.
How was the initial setup?
The initial setup was before I was at the company. It was over six years ago.
What about the implementation team?
We used an integrated reseller for the deployment called Set Solutions. Our experience with them was pretty good.
What other advice do I have?
On a scale from 1 to 10, I would rate this product an 8. Whenever we've used it, it has been effective. It does come with a large price tag.
The biggest lesson I learned from using this solution is that when the initial intent to deploy Stealthwatch was put in, it was the security team. They were working completely independent of the network, voice, and data center restructure teams.
It wasn't a cohesive effort for everyone who might use the tool. Maybe it didn't get implemented in a way that would have maximized the benefit for the organization as a whole.
Think holistically and view the big picture. Start small, but begin with the end in mind of having the final vision of where you want to get to.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Operations Consultant at NNIT
User-friendly with an excellent reporting system
Pros and Cons
- "The most valuable features of this solution are its reporting and mitigation capabilities."
- "Better integration between Cisco Secure Network Analytics and Cisco Secure Workload would be beneficial."
What is our primary use case?
We use Cisco Secure Network Analytics to collect network data, which we then send to our cybersecurity team for analysis. It is a basic use case that focuses on monitoring network traffic for potential security threats and providing our team with the information they need to detect and respond to issues.
What is most valuable?
The most valuable features of this solution are its reporting and mitigation capabilities.
What needs improvement?
There is room for improvement in mitigation and reporting, and better integration between Cisco Secure Network Analytics and Cisco Secure Workload would be beneficial.
For how long have I used the solution?
I have been working with Cisco Secure Network Analytics for almost four years.
What do I think about the stability of the solution?
Cisco Secure Network Analytics is extremely stable. I would give it a ten out of ten for stability.
What do I think about the scalability of the solution?
The solution is fairly scalable. Our clients are primarily enterprise-level businesses.
How are customer service and support?
I would rate the technical support as a seven out of ten. We have not had any major issues with the solution and it works well.
How would you rate customer service and support?
Neutral
How was the initial setup?
The initial setup is quite easy. The deployment takes around two to three hours.
What other advice do I have?
I would strongly recommend this solution to others. It is user-friendly, with an excellent reporting system. Moreover, it offers seamless integration for mitigation, which is a very valuable feature. Overall, I would rate Cisco Secure Network Analytics as a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Implementer
Network Manager Administrator at a financial services firm with 501-1,000 employees
Provides real-time monitoring to identify peak traffic and possible issues
Pros and Cons
- "It is a good application, providing for real-time monitoring of the organization of data. It can basically identify points of peak traffic where possible issues are being caused."
- "At my company, we might not be using it enough with other applications that we have that can integrate with it."
What is our primary use case?
Stealthwatch is primarily a network monitoring tool.
How has it helped my organization?
Let's say a certain service is functioning properly and then out of nowhere this morning we started getting a lot of user complaints from the customers. We basically run the analytics against some specific goals and check what host and course the traffic is being processed through. We can monitor the traffic in real time from the moment of the issue to past months in order to see the flow of data and when exactly it spiked. We can then drill down to the root cause of the spike.
Network visibility also affected our organization in a positive manner. We wanted to track down traffic for specific goals. We just type it in the search bar and drill down to the top conversations of the period. We can see what ports are being utilized and whether there were clients and hosts that were talking to each other.
This solution has also increased our threat detection rate, by around 25-30%. An example would be that it provided a better posture in our internal network.
Stealthwatch has definitely reduced the incident response time. Whenever there's an issue, before we got Stealthwatch, we would have to go into multiple applications and gather data to pinpoint the issue. But with Stealthwatch, it's really up to us to pinpoint a time frame, specific host, or something like that. The response time is now about 50% faster.
Troubleshooting is now only minutes instead of a couple of hours that it took before we used this solution.
We also reduced a good amount of false positives and saved some time. It used to take a couple of hours to identify what the issue was, but with Stealthwatch we can find it within minutes.
What is most valuable?
It is a good application, providing for real-time monitoring of the organization of data. It can basically identify points of peak traffic where possible issues are being caused.
What needs improvement?
At my company, we might not be using it enough with other applications that we have that can integrate with it.
We need integration between ISE and Stealthwatch. I know my company is trying to get it to work. I don't know if they actually got it yet.
For how long have I used the solution?
My company has been using Stealthwatch for the past four to five years.
What do I think about the stability of the solution?
Stability is really good. I don't think we ever had an issue with it.
How was the initial setup?
The initial setup was straightforward. It wasn't difficult.
What was our ROI?
I would say a ten in terms of return on investment because it improved our recovery time and resolved many issues.
What other advice do I have?
Take the time to look into it. It could be worth the cost. I think Stealthwatch has a very good time to value. I think it's one of the best out there. If a company is looking for a solution, I would definitely recommend Stealthwatch. Originally, it was recommended to us by a Cisco partner.
The biggest lesson I've learned is to trust your applications. Believe that it works, because it does work.
I would rate this solution as a nine out of ten, just because I don't know everything I could know about it yet.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Operations Supervisor at Aboitiz Equity Ventures, Inc.
I can set thresholds to detect sudden changes and the alarms go through the PLC parts
Pros and Cons
- "StealthWatch lets me see the ports running in and out and the country. It has excellent reporting, telemetry, and artificial intelligence features. With the telemetry, I can set thresholds to detect sudden changes and the alarms go through the PLC parts. I can see all the ports running on that trunk."
- "There could be better integration on the programming side, which uses Python. StealthWatch could provide a template for Python to manage the switches. For example, it would be nice if StealthWatch bounced a port automatically it detected something anomalous."
What is our primary use case?
We use StealthWatch for telemetry on the cybersecurity side. It's also used for CCTV, IoT, and all the other stuff that isn't connected to the network. There is a cloud version of StealthWatch, but we use the on-prem solution.
What is most valuable?
StealthWatch lets me see the ports running in and out and the country. It has excellent reporting, telemetry, and artificial intelligence features. With the telemetry, I can set thresholds to detect sudden changes and the alarms go through the PLC parts. I can see all the ports running on that trunk.
What needs improvement?
There could be better integration on the programming side, which uses Python. StealthWatch could provide a template for Python to manage the switches. For example, it would be nice if StealthWatch bounced a port automatically it detected something anomalous.
For how long have I used the solution?
We've been using StealthWatch for almost two years. We were the first ones to adopt it in the Philippines.
What do I think about the stability of the solution?
StealthWatch is a stable product. I haven't seen a technology that could match it aside from the Chinese brand Huawei. Cisco is a US brand, so I haven't seen some of these products outside of this market.
Who knows? Tomorrow, some company may build a newer, more stable solution, more stable one, but Cisco Stealthwatch has the most stable services today.
What do I think about the scalability of the solution?
The scalability is limited only by the license type. It's not a problem as long as you purchase enough licenses and the necessary services. We have 300 users.
How are customer service and support?
We have a service agreement with Cisco, but we haven't had that many problems with StealthWatch except for a few bugs in newly released versions. Those bugs were a bottleneck for about a year and a half, but we stabilized it about three or four months ago.
Which solution did I use previously and why did I switch?
We switched to StealthWatch for the orchestration features.
How was the initial setup?
Setting up StealthWatch is straightforward, but you may need some specialists to integrate it with software solutions like pxGrid, DNAC, and ISE. It took us about two weeks to deploy StealthWatch, but that includes the staffing limitations due to pandemic protocols. In total, it took two months to integrate Cisco ISE, DNAC, and all our other services.
The deployment includes about five engineers—six including me.
What about the implementation team?
We used some integrators, including a consultant from Cisco.
What's my experience with pricing, setup cost, and licensing?
We have a three-year contract with Cisco, including 24/7 online support. There are no additional costs.
What other advice do I have?
I rate StealthWatch eight out of 10 overall, but I would rate it six for engineers because this is a relatively new technology with a steep learning curve for in-house and third-party engineers.
Whether StealthWatch is a suitable solution depends on the use case and industry, but I recommend it for a company that wants solid telemetry on their end.
If you're just segregating and creating a sensor firewall on the switch side, you'll save money going with Cisco instead of buying a lot of firewalls to to provide segregation. It's better to use Cisco to centrally manage everything.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Engineer at a university with 10,001+ employees
Enables us to detect and remediate threats much faster
Pros and Cons
- "The most valuable feature of this solution is the way the net flow is being merged together in a single pane. That's been extremely useful for us, because can see what's going on with traffic in one single place."
- "We are continuing down the road of ACI and ISE with Cisco, so we would like to see the continuation of Stealthwatch integrating into ISE for exchange of information, and also, more into the ACI environment too."
What is our primary use case?
For our organization, Cisco Stealthwatch is more of a confirmation of what is happening on our network, or compliance. And in addition to that, it helps us to troubleshoot issues. We get to see where traffic is flowing and it helps us figure out problems.
How has it helped my organization?
Cisco Stealthwatch helps us in finding unknown traffic, allowing us to audit the network and make sure things that are happening that we are expecting to happen.
I am a little versed about the solution's analytic and threat detection capabilities, even though it is pretty good. I know that we use it to validate that there's no east/west traffic. So that's been beneficial to us because we have things in place preventing that, and it's our way of proving it has actually happened. We haven't started using it for cloud protection or any analysis yet.
This solution has definitely also reduced our incident response time because we had no visibility before. We can detect and remediate threats much faster now.
What is most valuable?
The most valuable feature of this solution is the way the net flow is being merged together in a single pane. That's been extremely useful for us because we can see what's going on with traffic in one single place.
I also believe the solution has increased our organization's threat protection rate. The actual threat reports are run by our Infosec security person, but we are actually using this solution for that too. We're having reports generated so that our network engineering doesn't have to do the review. That team is responsible for reviewing reports and then we work with them to locate and do the next steps.
What needs improvement?
We are continuing down the road of ACI and ISE with Cisco, so we would like to see the continuation of Stealthwatch integrating into ISE for exchange of information, and also, more into the ACI environment too.
What do I think about the stability of the solution?
The solution is very stable and we haven't had any crashes yet.
What do I think about the scalability of the solution?
Based on what we've used it so far, it looks like it's scaling. We're growing and it's growing with us, so it's doing what we need it to do.
How are customer service and technical support?
I do know we have used the support before and it was good enough to get our problems fixed.
Which solution did I use previously and why did I switch?
We switched to Cisco Stealthwatch for operational reasons. The solution we used before was very clunky, so it was clear that we needed a better solution. So we started looking around and this solution came to the top quickly.
How was the initial setup?
The initial setup was pretty straightforward and sufficient. It's good.
What other advice do I have?
I believe this solution has saved our organization a lot of time, money, and administrative work. It allows us to see what's going on as far as traffic flows in a single, very short period. That is the biggest value to us on the networking side. The security team uses the implications of that for auditing and clearing out, whether we have good or bad traffic going on.
Operationally, using it as a tool, it can definitely be rated up there at a nine out of ten. It's very good, easy to use, I can get into it and find out what I want.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Cisco Secure Network Analytics Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2025
Product Categories
Network Monitoring Software Network Traffic Analysis (NTA) Network Detection and Response (NDR) Cisco Security PortfolioPopular Comparisons
SolarWinds NPM
PRTG Network Monitor
ThousandEyes
LogicMonitor
NETSCOUT nGeniusONE
Meraki Dashboard
IBM SevOne Network Performance Management (NPM)
Cisco Provider Connectivity Assurance
vRealize Network Insight
LiveAction LiveNX
AppNeta by Broadcom
Buyer's Guide
Download our free Cisco Secure Network Analytics Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- I'm building a next-gen AI powered threat intelligence platform. What's missing from existing solutions?
- When evaluating Network Performance Monitoring, what aspect do you think is the most important to look for?
- What is the best network monitoring software for large enterprises?
- What Questions Should I Ask Before Buying a Network Monitoring Tool?
- UIM OnPrem - SaaS
- Anyone switching from SolarWinds NPM? What is a good alternative and why?
- What is the best tool for SQL monitoring in a large enterprise?
- What tool do you recommend using for VoIP monitoring for a mid-sized enterprise?
- Should we choose Nagios or PRTG?
- Which is the best network monitoring tool: Zabbix or Solarwinds? Pros and Cons?