Try our new research platform with insights from 80,000+ expert users

Cisco Secure Network Analytics vs Palo Alto Networks Advanced Threat Prevention comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Network Analytics
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
60
Ranking in other categories
Network Monitoring Software (22nd), Network Traffic Analysis (NTA) (3rd), Network Detection and Response (NDR) (5th), Cisco Security Portfolio (7th)
Palo Alto Networks Advanced...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
26
Ranking in other categories
Intrusion Detection and Prevention Software (IDPS) (6th)
 

Mindshare comparison

While both are Network Security Systems solutions, they serve different purposes. Cisco Secure Network Analytics is designed for Network Monitoring Software and holds a mindshare of 1.2%, down 1.6% compared to last year.
Palo Alto Networks Advanced Threat Prevention, on the other hand, focuses on Intrusion Detection and Prevention Software (IDPS), holds 7.4% mindshare, down 8.0% since last year.
Network Monitoring Software
Intrusion Detection and Prevention Software (IDPS)
 

Featured Reviews

Sudhakar T - PeerSpot reviewer
Strong network security analytics with excellent encrypted traffic analysis features
Improvements are needed on the application layer for complete security analysis. The solution should have the ability to analyze security events not only at the network layer but also at the application and OS layers. There's a need for a more comprehensive licensing model where all necessary licenses are included by default.
Carlos Bracamonte - PeerSpot reviewer
Robust, reliable, simple to install and good technical support
We are attempting to improve the use of URL filtering beyond threat protection. I'm not sure what the remaining threat protection features are off the top of my head. But beyond that, we use URL filtering. We have three approved cases for using external dynamic lists that are stored in a bucket repository. Then, for each URL site that needs to be whitelisted, we add it to the external dynamic list in order to gain access to this email. I would like Wildfire to be implemented. We use the equivalent in Cisco is the integration policies. We have the Wildfire but we are not currently implementing it. We don't have the license to use it, but we are not currently implementing it until we present the use cases that the company gives some value to and they approve the use of it.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The artifacts available in the tool provide better information for analyzing network traffic. It enables a holistic view of network traffic and general packet analysis. It's easy to identify anomalies without the use of signatures. The way in which we implemented Stealthwatch Cloud has enabled my team to analyze traffic behind proxies."
"The solution allowed us to not only get gain insight but also start collaborating with other tools."
"From a security standpoint, it is just seeing pockets as well. Visibility is very key for us."
"We find that Stealthwatch can detect the unseen."
"Using the Cognitive Analytics feature, we have complete visibility that we didn’t have before."
"The ability to send data flow from other places and have them all in one place is very valuable for us."
"Being able to graph and show data to management has improved our organization. We can show the data to the higher-ups. It shows them that it's picking up on these anomalies and doing its job."
"The most valuable features provided by this solution are visibility and information."
"You can scale the product."
"I like the solution's interface."
"We are currently using the URL filtering feature, which is the most popular."
"The application control and vulnerability protection are the most valuable features."
"One of the most valuable features is the anti-malware protection."
"The most valuable feature of Palo Alto Threat Prevention for our company is the next generation firewall."
"The sandboxing tools offer great prevention for cloud feeds."
"The initial setup was straightforward. It's quite easy. Deployment took one to two weeks."
 

Cons

"I would like to see some improvement when it comes to reporting."
"If they can make this product more web-based, that would be amazing."
"I would like to see interoperability with other Cisco products because we have ThousandEyes, Cisco Prime, and others. The interaction among these is important to us."
"It's a good solid solution but integration with Network Access Control products with Cisco ISE would be good."
"Many of these tools require extensive on-premises hardware to run."
"The initial setup is complex, as there is a lot to configure."
"We would like the solution to make more advances in the way that Extreme Networks has been doing."
"The ability to be natively integrated into Port Aggregator would be beneficial because it would reduce just one more component that's needed in order to have that type of view."
"Mission learning techniques should continue to expand and detect unknown threats on the fly."
"In Africa, the technical support is probably not as good as in Europe and the USA because it's a specific premium support, partner-enabled premium support and all of that. But it's really good, I don't really have any complaints, it's fairly good. I'll give them 80%."
"There is a potential drawback with the lack of support for the ICAP protocol."
"The solution could benefit from improved AI analytics to predict potential attacks before they occur, similar to NDR systems."
"In terms of what needs improvement, the only thing I don't like is the support."
"The organization mail security solutions could be improved. There is no mail security solution available."
"The installation was complicated."
"Palo Alto's maintenance needs to be improved."
 

Pricing and Cost Advice

"Today, we are part of the big Cisco ELA, and it is a la carte. We can get orders for whatever we want. At the end of the day, we have to pay for it in one big expense, but that is fine. We are okay with that."
"We pay for support costs on a yearly basis."
"There are additional licenses needed for the number of so-called network flows. It's hard to plan the number of flows you need in the network, this is a problem. The price of the Cisco Stealthwatch is relatively inexpensive"
"It is worth the cost."
"The licensing costs are outrageous."
"It has a subscription model. There is yearly support, and there is also three-year support. It depends on what the customers want."
"Licensing is done by flows per second, not including outside>in traffic."
"On a yearly basis, licensing is somewhere around $30,000."
"It's not too expensive."
"Palo Alto Networks Threat Prevention could improve by having consistent pricing at system levels."
"The pricing has improved with the newer generation of their Firewalls, but the price could always be lower."
"The pricing and the licensing are pretty competitive at this stage. As a reseller, I would like to see the price come down a little bit so I can compete better against other firewalls because we do that all the time."
"Palo Alto Networks Advanced Threat Prevention is quite competitive, offering extensive threat detection and prevention capabilities, though it is priced higher than some alternatives."
"There is an initial, expensive investment but the return is good."
"If you want to have all of the good features then you have to pay extra for licensing."
"The product’s pricing is expensive for small companies."
report
Use our free recommendation engine to learn which Network Monitoring Software solutions are best for your needs.
848,396 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
29%
Financial Services Firm
11%
Government
9%
Manufacturing Company
7%
Computer Software Company
17%
Financial Services Firm
10%
Manufacturing Company
10%
Government
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Cisco Stealthwatch?
The most valuable feature of Cisco Secure Network Analytics is the Threat Intelligence integration.
What is your experience regarding pricing and costs for Cisco Stealthwatch?
The organization experienced challenges with licensing as Cisco has multiple licensing factors, and there are concerns about the price. Cisco solutions are considered to be very expensive.
What needs improvement with Cisco Stealthwatch?
Improvements are needed on the application layer for complete security analysis. The solution should have the ability to analyze security events not only at the network layer but also at the applic...
Which is the best DDoS protection solution for a big ISP for monitoring and mitigating?
Arbor would be the best bid, apart from Arbor, Palo Alto and Fortinet have good solutions. As this is an ISP, I would prefer Arbor.
What is your experience regarding pricing and costs for Palo Alto Networks Threat Prevention?
The pricing is competitive, and with current campaigns and discounts, it provides an excellent device for a reasonable price.
 

Also Known As

Cisco Stealthwatch, Cisco Stealthwatch Enterprise, Lancope StealthWatch
No data available
 

Overview

 

Sample Customers

Edge Web Hosting, Telenor Norway, Ivy Tech Community College of Indiana, Webster Financial Corporation, Westinghouse Electric, VMware, TIAA-CREF
University of Arkansas, JBG SMITH, SkiStar AB, TRI-AD, Temple University, Telkom Indonesia
Find out what your peers are saying about Cisco Secure Network Analytics vs. Palo Alto Networks Advanced Threat Prevention and other solutions. Updated: January 2020.
848,396 professionals have used our research since 2012.