Try our new research platform with insights from 80,000+ expert users

Cisco Secure Network Analytics vs Hillstone Cloud Sandbox comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Network Analytics
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
60
Ranking in other categories
Network Monitoring Software (22nd), Network Traffic Analysis (NTA) (3rd), Network Detection and Response (NDR) (5th), Cisco Security Portfolio (7th)
Hillstone Cloud Sandbox
Average Rating
0.0
Reviews Sentiment
7.9
Number of Reviews
1
Ranking in other categories
Advanced Threat Protection (ATP) (36th)
 

Mindshare comparison

While both are Network Security Systems solutions, they serve different purposes. Cisco Secure Network Analytics is designed for Network Monitoring Software and holds a mindshare of 1.2%, down 1.6% compared to last year.
Hillstone Cloud Sandbox, on the other hand, focuses on Advanced Threat Protection (ATP), holds 0.3% mindshare, down 0.5% since last year.
Network Monitoring Software
Advanced Threat Protection (ATP)
 

Featured Reviews

Sudhakar T - PeerSpot reviewer
Strong network security analytics with excellent encrypted traffic analysis features
Improvements are needed on the application layer for complete security analysis. The solution should have the ability to analyze security events not only at the network layer but also at the application and OS layers. There's a need for a more comprehensive licensing model where all necessary licenses are included by default.
Albert-Wang - PeerSpot reviewer
Dynamic file analysis enhances threat detection capabilities
Cloud sandbox allows customers to analyze email and text documents without purchasing any hardware. The system analyzes files dynamically and provides feedback on the impact of the file. Cloud sandbox manages the analysis using Hillstone on the cloud, offering a service to detect unknown threats. It's easy to integrate and offers dynamic analysis supporting many types of files.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"From what I understand, you can encrypt and unencrypt traffic moving in transit. This is one of the features that we liked about it."
"The feature most valuable for us is to gain visibility of what is actually floating through, so we can stop it based on whether it's good or bad traffic."
"The most valuable feature is anomaly detection, where it finds things that are not allowed internally."
"I value the feature which enables me to detect devices talking to suspect IPs."
"The ability to send data flow from other places and have them all in one place is very valuable for us."
"The most valuable features of this solution are the logging, keeping threats under control, and keeping our data and environment secure."
"There are already many functionalities, so I don't think there is anything to improve."
"Using the Cognitive Analytics feature, we have complete visibility that we didn’t have before."
"Cloud sandbox allows customers to analyze email and text documents without purchasing any hardware."
 

Cons

"Complexity on integration is not so straightforward and you really need an expert to help build it out."
"Some of our customers find this solution to be a little bit tough because they don't understand how to configure and use it."
"Cisco Stealthwatch needs more integration with device discovery. We have to do a lot of hard work to figure out what things are. Better service integration is required."
"The solution should have the ability to analyze security events not only at the network layer but also at the application and OS layers."
"The visualization could be improved, the GUI is not the best."
"Stealthwatch is still maturing in AI. It uses artificial intelligence for predictions, but AI still needs to mature. It is in a phase where you get 95% correct detection. As its AI engine learns more, it will become more accurate. This is applicable to all the devices that are using AI because they support both supervised and unsupervised machine learning. The accuracy in the case of supervised machine learning is dependent on the data you feed into the box. The accuracy in the case of unsupervised machine learning is dependent on the algorithm. The algorithm matures depending on retrospective learning, and this is how it is able to detect zero-day attacks."
"One thing I would like to see improved is if it could automatically be tied through ISE, instead of you having to manually get notifications and disable it yourself."
"I would like to see some improvement when it comes to reporting."
"For implementation, if the system can improve or provide more training, it would be better."
 

Pricing and Cost Advice

"The pricing for this solution is good."
"We pay for support costs on a yearly basis."
"Pricing is much higher compared to other solutions."
"The yearly licensing cost is about $50,000."
"One of the things which bugs me about Lancope is the licensing. We understand how licensing works. Our problem is when we bought and purchased most of these Lancope devices, we did so with our sister company. Somewhere within the purchase and distribution, licensing got mixed up. That is all on Cisco, and it is their responsibility. They allotted some of our sister company's equipment to us, and some of our equipment to them. To date, they have never been able to fix it."
"The solution is expensive. It costs several hundred thousand dollars per year (depending on how many flows you are collecting)."
"​Licensing is done by flows per second, not including outside (in traffic)."
"There are additional licenses needed for the number of so-called network flows. It's hard to plan the number of flows you need in the network, this is a problem. The price of the Cisco Stealthwatch is relatively inexpensive"
Information not available
report
Use our free recommendation engine to learn which Network Monitoring Software solutions are best for your needs.
848,989 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
28%
Financial Services Firm
11%
Government
9%
Manufacturing Company
7%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Cisco Stealthwatch?
The most valuable feature of Cisco Secure Network Analytics is the Threat Intelligence integration.
What is your experience regarding pricing and costs for Cisco Stealthwatch?
The organization experienced challenges with licensing as Cisco has multiple licensing factors, and there are concerns about the price. Cisco solutions are considered to be very expensive.
What needs improvement with Cisco Stealthwatch?
Improvements are needed on the application layer for complete security analysis. The solution should have the ability to analyze security events not only at the network layer but also at the applic...
What needs improvement with Hillstone Cloud Sandbox?
For implementation, if the system can improve or provide more training, it would be better. Additionally, for scalability, the performance does not have challenges, as users generally don't upload ...
What is your primary use case for Hillstone Cloud Sandbox?
Cloud them both is a very feature and it is used to detect unknown threats by analyzing files. Customers typically use Hillstone on the cloud to do the analysis.
 

Also Known As

Cisco Stealthwatch, Cisco Stealthwatch Enterprise, Lancope StealthWatch
No data available
 

Overview

 

Sample Customers

Edge Web Hosting, Telenor Norway, Ivy Tech Community College of Indiana, Webster Financial Corporation, Westinghouse Electric, VMware, TIAA-CREF
Information Not Available
Find out what your peers are saying about Zabbix, Auvik, Datadog and others in Network Monitoring Software. Updated: March 2025.
848,989 professionals have used our research since 2012.