Try our new research platform with insights from 80,000+ expert users

Cisco Secure Network Analytics vs Gigamon Deep Observability Pipeline comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Network Analytics
Ranking in Network Detection and Response (NDR)
4th
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
59
Ranking in other categories
Network Monitoring Software (23rd), Network Traffic Analysis (NTA) (3rd), Cisco Security Portfolio (4th)
Gigamon Deep Observability ...
Ranking in Network Detection and Response (NDR)
11th
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
8
Ranking in other categories
Application Performance Monitoring (APM) and Observability (25th), Event Monitoring (10th), Data Loss Prevention (DLP) (18th), Security Information and Event Management (SIEM) (26th), Web Application Firewall (WAF) (19th), Advanced Threat Protection (ATP) (22nd), Network Packet Broker (NPB) (1st)
 

Featured Reviews

Rainier S. - PeerSpot reviewer
You are able to drill down into a center's utilization, then create reports based on it
In the last year or two, we have been working with our Cisco NAS engineers to improve our security posturing. It is more our being proactive rather than reactive. While Stealthwatch and Lancope have this ability to look inside and give you visibility (a great feature), follow-up is the rule. We would like filters that you can put into place to tap onto certain types of behaviors, alerts out, and/or hopefully a block. This is sort of what we are looking for. I might be speaking too early, because we are not down this path yet. We know the feature set is there, we just do not know yet how to achieve it. That is proactive rather than more reactive. For Lancope Stealthwatch, we would like to see it more on the ASA Firewall platform. While this might already be available, this is more a failing of Cisco to inform us if it is there. For example: * Are we on the right or wrong version of the code? * What does the code look like? * Are we are really looking at firewalls? Or is it more about the foundation and route switches that we are seeing? It is about visibility.
LeonardoAlves - PeerSpot reviewer
Improved the capability to analyze the environment and network problems with easy setup
It improved the capability to analyze the environment and network problems. It also helped streamline your security and performance monitoring The application I use is a script. My environment is a mix of technologies. I have many passionate people in my network who are on a journey in…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It has improved our internal knowledge of what's going on with the network, and that's helpful."
"Cisco Stealthwatch has predefined alerts for different types of security issues that might happen in the network. Whether it's PCs or servers that are used for botnets or Bitcoin mining we receive the alerts automatically. This functionality is what we receive from the solution out of the box."
"From a security standpoint, it is just seeing pockets as well. Visibility is very key for us."
"The most valuable feature is its alerts and dashboard."
"It's easy to set up. The deployment takes one or two days. You need to collect the data from a device and then direct it to the portal."
"The most valuable feature of the solution is that it helps you gain visibility for your application."
"Most of the engineers I've worked with have been really good. Very knowledgeable and easy to work with."
"Overall, the implementation is very good."
"The solution is straightforward to set up."
"It is a good product. It provides network visibility, which is important. Gigamon can bring some optimizations to my network. It is helpful for security inspection, and it makes my firewall work fast because my firewall doesn't have to do the inspection of the SSL connections, for example."
"The tool's most valuable feature is the encryption feature. From a security perspective, the solution hasn't significantly strengthened our security posture. However, it has greatly improved performance by streamlining encryption processes and avoiding encryption at multiple layers. This has also simplified troubleshooting, as we can whitelist certain processes."
"It has high stability."
"It offers straightforward integration."
"The most valuable feature for improving network visibility with Gigamon is the packet filtering capability."
"The most valuable feature is NetFlow."
 

Cons

"We determined that Stealthwatch wouldn't provide the machine learning model that we required."
"One area that could be improved in SNA is the integration with Cisco ISE for user and session details, which currently requires additional setup."
"The configuration of the solution was quite complex."
"I think the interface is a little lacking. The interface seems like it just needs to be modernized. It's been the same interface now, ever since I've seen it probably four years ago."
"The version with the Dell server had iDRAC problems. Often, it reported iDRAC failure."
"Cisco Stealthwatch needs more integration with device discovery. We have to do a lot of hard work to figure out what things are. Better service integration is required."
"It is time-consuming to set it up and understand how the tool works."
"Stealthwatch is still maturing in AI. It uses artificial intelligence for predictions, but AI still needs to mature. It is in a phase where you get 95% correct detection. As its AI engine learns more, it will become more accurate. This is applicable to all the devices that are using AI because they support both supervised and unsupervised machine learning. The accuracy in the case of supervised machine learning is dependent on the data you feed into the box. The accuracy in the case of unsupervised machine learning is dependent on the algorithm. The algorithm matures depending on retrospective learning, and this is how it is able to detect zero-day attacks."
"Its filtering feature needs improvement."
"In terms of improvement, while the initial setup is not overly complicated, we did encounter a few issues."
"The Gigamon Deep Observability Pipeline should have a feature showing the traffic flow within its platform. Currently, customers have to use separate tools for monitoring, which is inconvenient. If it had its visibility feature, it would make monitoring easier and more complete without needing extra tools."
"The graphical user interface could be improved."
"The security should be improved."
"It only inspects a specific kind of traffic. There should be different kinds of use cases."
"They should increase the solution's cluster capacity."
 

Pricing and Cost Advice

"Today, we are part of the big Cisco ELA, and it is a la carte. We can get orders for whatever we want. At the end of the day, we have to pay for it in one big expense, but that is fine. We are okay with that."
"The yearly licensing cost is about $50,000."
"It has a subscription model. There is yearly support, and there is also three-year support. It depends on what the customers want."
"We pay for support costs on a yearly basis."
"It is worth the cost."
"The solution is expensive. It costs several hundred thousand dollars per year (depending on how many flows you are collecting)."
"This is an expensive product. We have quit paying for support because we don't want to have to upgrade it and keep paying for it."
"On a yearly basis, licensing is somewhere around $30,000."
"The solution is highly-priced."
"I would rate the solution as expensive, around an eight or nine out of ten. There are other competitive solutions available."
"The solution's price is reasonable."
report
Use our free recommendation engine to learn which Network Detection and Response (NDR) solutions are best for your needs.
831,265 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
30%
Financial Services Firm
11%
Government
9%
Manufacturing Company
6%
Computer Software Company
17%
Financial Services Firm
17%
Manufacturing Company
8%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Cisco Stealthwatch?
The most valuable feature of Cisco Secure Network Analytics is the Threat Intelligence integration.
What is your experience regarding pricing and costs for Cisco Stealthwatch?
The tool is not cheaply priced. In cybersecurity, you want an extra layer of security in your organization. Some sectors want NDR solutions, so you cannot deploy such tools everywhere, as they are ...
What needs improvement with Cisco Stealthwatch?
The expensive nature of the tool is an area of concern where improvements are required.
What do you like most about Gigamon Deep Observability Pipeline?
The most valuable feature for improving network visibility with Gigamon is the packet filtering capability.
What needs improvement with Gigamon Deep Observability Pipeline?
The challenge is monitoring the cloud network. In on-premises environments, monitoring is straightforward, as I can verify all packets and communications. However, due to the way access tools and p...
What is your primary use case for Gigamon Deep Observability Pipeline?
It improved the capability to analyze the environment and network problems. It also helped streamline your security and performance monitoring.
 

Also Known As

Cisco Stealthwatch, Cisco Stealthwatch Enterprise, Lancope StealthWatch
Gigamon, GigaSecure
 

Learn More

Video not available
 

Overview

 

Sample Customers

Edge Web Hosting, Telenor Norway, Ivy Tech Community College of Indiana, Webster Financial Corporation, Westinghouse Electric, VMware, TIAA-CREF
Amica Insurance, College of William & Mary, Gamma, IntercontinentalExchange, OppenheimerFunds
Find out what your peers are saying about Cisco Secure Network Analytics vs. Gigamon Deep Observability Pipeline and other solutions. Updated: January 2025.
831,265 professionals have used our research since 2012.