Try our new research platform with insights from 80,000+ expert users

Check Point SandBlast Network vs Cisco Secure Network Analytics comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point SandBlast Network
Average Rating
8.4
Reviews Sentiment
7.4
Number of Reviews
36
Ranking in other categories
Advanced Threat Protection (ATP) (10th)
Cisco Secure Network Analytics
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
60
Ranking in other categories
Network Monitoring Software (22nd), Network Traffic Analysis (NTA) (3rd), Network Detection and Response (NDR) (5th), Cisco Security Portfolio (7th)
 

Mindshare comparison

While both are Network Security Systems solutions, they serve different purposes. Check Point SandBlast Network is designed for Advanced Threat Protection (ATP) and holds a mindshare of 6.0%, up 5.1% compared to last year.
Cisco Secure Network Analytics, on the other hand, focuses on Network Monitoring Software, holds 1.2% mindshare, down 1.6% since last year.
Advanced Threat Protection (ATP)
Network Monitoring Software
 

Featured Reviews

GaneshKhutwad - PeerSpot reviewer
Provides advanced threat prevention and utilizes geographic-based policies to mitigate attacks
Check Point offers three types of support: Gold, Platinum, and Diamond. The level of support you receive should be based on the criticality of the issue, not solely on your client's support tier. While there are established support levels, I have experienced instances where the support provided was not categorized as Gold, Platinum, or Diamond but rather a standard support level. In such cases, the response times were slower, and getting support personnel on the call was more difficult.
Sudhakar T - PeerSpot reviewer
Strong network security analytics with excellent encrypted traffic analysis features
Improvements are needed on the application layer for complete security analysis. The solution should have the ability to analyze security events not only at the network layer but also at the application and OS layers. There's a need for a more comprehensive licensing model where all necessary licenses are included by default.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We didn't really have any IPS before. So, Check Point has improved our security posture. People get used to doing things certain ways, which might not be the best or most secure way, and they can't do that now, which just requires more education of the user base. With the endpoint client, we've started to use Check Point for remote access."
"The most valuable thing about this product is that it keeps the network secure against zero-day threats."
"SandBlast updates the threat signatures frequently."
"Preventing zero-day threats and extracting potential threats from incoming files with Threat Extraction is the most valuable feature for us."
"The Check Point SandBlast Network gives us incredibly good features."
"The zero-day protection is its most valuable feature."
"The solution can detect and prevent attacks that may be encrypted."
"You do not need to risk your network by using the in-line sandbox."
"The most valuable feature about this solution is that it gives me insight of my network."
"Great network monitoring, looking at anomaly detection and evaluation."
"The artifacts available in the tool provide better information for analyzing network traffic. It enables a holistic view of network traffic and general packet analysis. It's easy to identify anomalies without the use of signatures. The way in which we implemented Stealthwatch Cloud has enabled my team to analyze traffic behind proxies."
"The most valuable feature is anomaly detection, where it finds things that are not allowed internally."
"The most valuable features provided by this solution are visibility and information."
"The most valuable feature of this solution is data hoarding because it catches threats on a frequent basis that we had no idea of."
"The feature most valuable for us is to gain visibility of what is actually floating through, so we can stop it based on whether it's good or bad traffic."
"The most valuable feature of the solution is that it helps you gain visibility for your application."
 

Cons

"I am very leery right now about the stability. We've had three outages in the last month because of Check Point, not because of something that the customer has done, but because of changes on the Check Point side."
"The cost is a little bit high-end, and you need to get precise performance metrics in order to get the correct size. Improvements are required in both areas of the tool."
"I would like to see some speed improvements, e.g., how quickly you can get through all the menus. It crashes sometimes because we push so much through it. Therefore, I would like to see more small things behind the scenes, such as, back-end stability in terms of the management application."
"The technical support could use some work, but it's okay. It's a little bit of a tedious process to get through."
"In Check Point SandBlast, improvement has to be made with respect to the GUI."
"I imagine there will be improvements in later versions. There are hotfixes that come out all the time."
"I would like to see these solutions being easier to manage from mobile applications - from either iOS or Android - including other operating systems that appear in the future."
"There should be some customized price reductions in the offered packages."
"They should include Citrix VDIs in the next release."
"We determined that Stealthwatch wouldn't provide the machine learning model that we required."
"The overall visibility into the actual device itself would be helpful. I don't just want support-specific data, but also to be able to see information such as CPU and other internal components or usage of the devices."
"The visualization could be improved, the GUI is not the best."
"At my company, we might not be using it enough with other applications that we have that can integrate with it."
"The version with the Dell server had iDRAC problems. Often, it reported iDRAC failure."
"I would like to see more and cleaner reporting. For example, if I pull up Steven and I want to look and maybe compare him to what you've done in the past week, and compare that to the past six months, the point would be to see what the difference in activity looks like over this time. I don't see that capability in reporting to date. You see that trend but you don't really see a straightforward comparison. That right there is key to what we want to see about the normal activity."
"We've had problems with element licensing costs so scalability is a concern."
 

Pricing and Cost Advice

"The cost of Check Point SandBlast Network is annually, and there is only a standard license."
"I think the overall cost for introducing Check Point with SandBlast was reasonable and competitive in the market."
"We have seen ROI."
"The pricing is quite effective, not excessively high. On a scale of one to ten, where ten is the highest price, I rate the pricing a nine."
"The cost is not significantly high and it can be negotiated during any purchase of NGFW."
"We would like to try the Threat Extraction blade, but you need to buy a license. Check Point is expensive. I would like to buy things, but I would need the funding."
"The product's cost is high."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"On a yearly basis, licensing is somewhere around $30,000."
"It has a subscription model. There is yearly support, and there is also three-year support. It depends on what the customers want."
"Licensing is done by flows per second, not including outside>in traffic."
"The pricing for this solution is good."
"Licensing is on a yearly basis."
"The tool is not cheaply priced."
"Our fees are approximately $3,000 USD."
"The solution is expensive. It costs several hundred thousand dollars per year (depending on how many flows you are collecting)."
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
842,767 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
15%
Government
11%
Energy/Utilities Company
6%
Computer Software Company
29%
Financial Services Firm
12%
Government
9%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point SandBlast Network?
The solution can detect and prevent attacks that may be encrypted.
What needs improvement with Check Point SandBlast Network?
The cost is a little bit high-end, and you need to get precise performance metrics in order to get the correct size. Improvements are required in both areas of the tool.
What do you like most about Cisco Stealthwatch?
The most valuable feature of Cisco Secure Network Analytics is the Threat Intelligence integration.
What is your experience regarding pricing and costs for Cisco Stealthwatch?
The organization experienced challenges with licensing as Cisco has multiple licensing factors, and there are concerns about the price. Cisco solutions are considered to be very expensive.
What needs improvement with Cisco Stealthwatch?
Improvements are needed on the application layer for complete security analysis. The solution should have the ability to analyze security events not only at the network layer but also at the applic...
 

Also Known As

No data available
Cisco Stealthwatch, Cisco Stealthwatch Enterprise, Lancope StealthWatch
 

Overview

 

Sample Customers

Edenred, State Transport Leasing Company (STLC), Edel AG, Laurenty, Conseil Départemental du Val de Marne, Koch Media
Edge Web Hosting, Telenor Norway, Ivy Tech Community College of Indiana, Webster Financial Corporation, Westinghouse Electric, VMware, TIAA-CREF
Find out what your peers are saying about Microsoft, Palo Alto Networks, Fortinet and others in Advanced Threat Protection (ATP). Updated: March 2025.
842,767 professionals have used our research since 2012.