Try our new research platform with insights from 80,000+ expert users

Cisco Secure Network Analytics vs Nmap comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 10, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Network Analytics
Ranking in Network Monitoring Software
22nd
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
60
Ranking in other categories
Network Traffic Analysis (NTA) (3rd), Network Detection and Response (NDR) (5th), Cisco Security Portfolio (4th)
Nmap
Ranking in Network Monitoring Software
16th
Average Rating
8.6
Reviews Sentiment
7.7
Number of Reviews
22
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of February 2025, in the Network Monitoring Software category, the mindshare of Cisco Secure Network Analytics is 1.3%, down from 1.7% compared to the previous year. The mindshare of Nmap is 0.5%, down from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Network Monitoring Software
 

Featured Reviews

Sudhakar T - PeerSpot reviewer
Strong network security analytics with excellent encrypted traffic analysis features
Improvements are needed on the application layer for complete security analysis. The solution should have the ability to analyze security events not only at the network layer but also at the application and OS layers. There's a need for a more comprehensive licensing model where all necessary licenses are included by default.
AntoSebastin - PeerSpot reviewer
Scans the network and identifies vulnerabilities on each machine
Nmap is mostly helpful during compliance checks. We run the scanner to see how many devices are on our network and find vulnerabilities in those that aren't compliant. We also use it monthly to scan our network and identify devices that aren't connected properly. This helps us detect any issues related to the operating systems of these devices. The tool's most valuable feature is its vulnerability scanning. It allows us to scan a specific range of IP addresses and discover devices within that range. This makes it easy to identify devices and view their details. Port scanning is crucial for network management tasks. It helps us identify vulnerabilities by finding open ports that may be unused or misconfigured. This tool makes it easy to detect such issues. The OS detection feature is great. Unlike other tools, Nmap provides accurate information about asset vulnerabilities, helping us easily detect and address them. Using Nmap provides value to the company, especially during compliance audits. It helps generate reports on assets, updates on workstations, and insights into network activities and potential attacks. Additionally, Nmap detects vulnerabilities and provides port details, allowing us to close unused ports on the client machines.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable features are encrypted threat analysis and the ability to run jobs on entire flows."
"The solution allowed us to not only get gain insight but also start collaborating with other tools."
"The feature most valuable for us is to gain visibility of what is actually floating through, so we can stop it based on whether it's good or bad traffic."
"Cisco Stealthwatch provides the solutions analytics and threat detection capabilities that I am looking for. It has also improved the network visibility of our organization."
"The solution's analytics and thrust detection capabilities are good. We're still adjusting it. It's a little hypersensitive, but it is working right now."
"The most valuable feature is integration."
"This product alleviates the day-to-day headaches for us, in regards to metrics."
"Ease of deployment, once you get your ducks in a row."
"The solution detects the operating systems, which makes testing the software much easier before making the payload."
"Nmap is mostly helpful during compliance checks. We run the scanner to see how many devices are on our network and find vulnerabilities in those that aren't compliant. We also use it monthly to scan our network and identify devices that aren't connected properly. This helps us detect any issues related to the operating systems of these devices."
"The scanning procedure includes UDP ports which sets it apart from competitors."
"Nmap is easy to use. It's a command-line interface, and the output is quite good."
"The initial setup was simple."
"It helps us secure the network infrastructure."
"The most important function, according to me, is the capability to use some arguments in the scanning. The solution's capability to go figure and do a deep dive, discovering information on specific aspects."
"It is a very user-friendly product."
 

Cons

"We've had problems with element licensing costs so scalability is a concern."
"They should include Citrix VDIs in the next release."
"Cisco could improve the administration for the customers."
"There could be better integration on the programming side, which uses Python. StealthWatch could provide a template for Python to manage the switches. For example, it would be nice if StealthWatch bounced a port automatically it detected something anomalous."
"If there was one improvement I’d suggest it would be that it detect traffic through an intranet. The product requires that traffic flow through a managed network device. The product is designed mostly for enterprise environments and not smaller environments or businesses."
"We haven't seen ROI."
"One area that could be improved in SNA is the integration with Cisco ISE for user and session details, which currently requires additional setup."
"It's too complicated to install, when starting out."
"Nmap major operates through the CLI; there's no GUI component, and that's where the challenge is."
"The price is high and could be cheaper."
"The tool's license limits the number of scans it can perform. Improving the license model could benefit customers by allowing more scans for compliance and other purposes."
"Nmap needs to improve its scanning speed."
"They should deliver Playtech's username and password."
"Since I started using Nmap, it has been completely based on the command prompt and I think it would help other users if they implemented a decent GUI as well."
"The solution's initial setup could be better."
"There are concerns with the stability of the product, making it an area where improvements are required."
 

Pricing and Cost Advice

"Licensing is done by flows per second, not including outside>in traffic."
"​Licensing is done by flows per second, not including outside (in traffic)."
"This is an expensive product. We have quit paying for support because we don't want to have to upgrade it and keep paying for it."
"It is worth the cost."
"The pricing for this solution is good."
"The tool is not cheaply priced."
"Licensing is on a yearly basis."
"It has a subscription model. There is yearly support, and there is also three-year support. It depends on what the customers want."
"I am using the standard free version of Nmap."
"I am using the free version of Nmap."
"It's an open-source solution. Commerically, only the support service is available."
"Nmap is an open-source and free product."
"It's an open-source product, and I haven't seen any premiums. Options are available for those who purchase, but for my use case, everything I need is available in the community and forums."
"The solution is free of cost."
"The product's pricing is fine. The licensing options for Nmap include perpetual licenses and volume-based licenses. For perpetual licenses, once you purchase it, there's no need to invest in renewals. And for volume-based licenses, enterprise companies can use it multiple times based on the number of users or devices they need to scan. It's a pay-as-you-go model, similar to how you pay for what you use."
"The solution is free of cost, but there are specific services that we have to buy."
report
Use our free recommendation engine to learn which Network Monitoring Software solutions are best for your needs.
838,713 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
30%
Financial Services Firm
11%
Government
9%
Manufacturing Company
6%
Educational Organization
14%
Computer Software Company
11%
Retailer
10%
University
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Cisco Stealthwatch?
The most valuable feature of Cisco Secure Network Analytics is the Threat Intelligence integration.
What is your experience regarding pricing and costs for Cisco Stealthwatch?
The tool is not cheaply priced. In cybersecurity, you want an extra layer of security in your organization. Some sectors want NDR solutions, so you cannot deploy such tools everywhere, as they are ...
What needs improvement with Cisco Stealthwatch?
The expensive nature of the tool is an area of concern where improvements are required.
What do you like most about Nmap?
Nmap is mostly helpful during compliance checks. We run the scanner to see how many devices are on our network and find vulnerabilities in those that aren't compliant. We also use it monthly to sca...
What is your primary use case for Nmap?
Nmap is used for network scanning to map the network, identify devices, and assess their status. It helps determine open ports and services running on a particular endpoint or server within an ente...
 

Also Known As

Cisco Stealthwatch, Cisco Stealthwatch Enterprise, Lancope StealthWatch
No data available
 

Overview

 

Sample Customers

Edge Web Hosting, Telenor Norway, Ivy Tech Community College of Indiana, Webster Financial Corporation, Westinghouse Electric, VMware, TIAA-CREF
Lockheed Martin, Eastern Bank Boston, Perspecta, Harris Corporation, Discovery Communication
Find out what your peers are saying about Cisco Secure Network Analytics vs. Nmap and other solutions. Updated: January 2025.
838,713 professionals have used our research since 2012.