Try our new research platform with insights from 80,000+ expert users

Cisco Secure Network Analytics vs Splunk User Behavior Analytics comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Juniper Mist Premium Analytics
Sponsored
Average Rating
8.0
Reviews Sentiment
8.2
Number of Reviews
2
Ranking in other categories
Network Monitoring Software (58th)
Cisco Secure Network Analytics
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
59
Ranking in other categories
Network Monitoring Software (24th), Network Traffic Analysis (NTA) (3rd), Network Detection and Response (NDR) (5th), Cisco Security Portfolio (4th)
Splunk User Behavior Analytics
Average Rating
8.2
Reviews Sentiment
8.7
Number of Reviews
18
Ranking in other categories
Intrusion Detection and Prevention Software (IDPS) (16th), User Entity Behavior Analytics (UEBA) (5th)
 

Mindshare comparison

Network Monitoring Software
User Entity Behavior Analytics (UEBA)
 

Featured Reviews

ALEXANDRE VIANNA - PeerSpot reviewer
Has a single dashboard, but is expensive
We use this solution to manage our mission environment The single dashboard is a valuable feature.  The technical support needs improvement. The initial setup is straightforward. The solution is expensive. I rate the pricing an eight out of ten.  Overall, I rate the solution a seven out of…
Rainier S. - PeerSpot reviewer
You are able to drill down into a center's utilization, then create reports based on it
In the last year or two, we have been working with our Cisco NAS engineers to improve our security posturing. It is more our being proactive rather than reactive. While Stealthwatch and Lancope have this ability to look inside and give you visibility (a great feature), follow-up is the rule. We would like filters that you can put into place to tap onto certain types of behaviors, alerts out, and/or hopefully a block. This is sort of what we are looking for. I might be speaking too early, because we are not down this path yet. We know the feature set is there, we just do not know yet how to achieve it. That is proactive rather than more reactive. For Lancope Stealthwatch, we would like to see it more on the ASA Firewall platform. While this might already be available, this is more a failing of Cisco to inform us if it is there. For example: * Are we on the right or wrong version of the code? * What does the code look like? * Are we are really looking at firewalls? Or is it more about the foundation and route switches that we are seeing? It is about visibility.
Sharath Chander - PeerSpot reviewer
It's more user-friendly than other solutions we tried, but it could use more features like process mining and automation
We want to have an automated system for bot hunting that enables us to detect anomalies predictively based on historical data. It would be helpful if Splunk included process mining as an alternative option. We have a threat workflow, but it would be useful if we could supplement that with some process mining capabilities over time.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The single dashboard is a valuable feature."
"We can manage the entire system across the network and troubleshoot the pain points."
"It's a dependable product that is able to pinpoint where we have vulnerabilities if they occur."
"Most of the engineers I've worked with have been really good. Very knowledgeable and easy to work with."
"Ease of deployment, once you get your ducks in a row."
"Using this solution has helped us to detect and identify viruses or malicious activity in the network early on."
"The solution allowed us to not only get gain insight but also start collaborating with other tools."
"We find that Stealthwatch can detect the unseen."
"The ability to send data flow from other places and have them all in one place is very valuable for us."
"The most valuable feature about this solution is that it gives me insight of my network."
"The solution is extremely scalable. Our customers are regularly scaling up after installing Splunk."
"We are really pleased with Splunk and its features. It would be practically impossible to function without it. To provide a general overview of the system, it's important to note that the standard log files are currently around 250 gigabytes per day. It would be impossible to manually walk through these logs by hand, which is why automation is essential."
"The most valuable features are the indexing and powerful search features."
"It's easily scalable."
"This intelligent user behavior analytics package is easy to configure and use while remaining feature filled."
"The most valuable feature is being able to take data and put it into other systems so that we could see the output, and to see where we need to apply our focus."
"Because of some of the visualizations that we utilize, we are able to understand strange, unusual traffic on our networks."
"It's straightforward in terms of configuration and troubleshooting and log management and monitoring as well. These are the edge points in addition to it being a modular solution where you can capitalize on your current licenses with extra licensing models, which can match the customer's business requirement and it can help the customer to design or to actually plan for their own roadmap."
 

Cons

"The technical support needs improvement."
"The Wi-Fi side needs improvement."
"It's a good solid solution but integration with Network Access Control products with Cisco ISE would be good."
"The initial setup was complex."
"It would be better to let people know, up front, that is doesn't give you nice, clear information, as seen in the demos, without Cisco ISE installed."
"One update that I would like to see is an agent-based client. Currently, Stealthwatch is network-based. A local agent could help manage endpoints."
"Some of our customers find this solution to be a little bit tough because they don't understand how to configure and use it."
"It hasn't really improved our direct detection rate but it has definitely reduced our incident response time as we wouldn't have been able to detect threats or immediate risks without this solution."
"We determined that Stealthwatch wouldn't provide the machine learning model that we required."
"Cisco Stealthwatch needs more integration with device discovery. We have to do a lot of hard work to figure out what things are. Better service integration is required."
"We want to have an automated system for bot hunting that enables us to detect anomalies predictively based on historical data. It would be helpful if Splunk included process mining as an alternative option. We have a threat workflow, but it would be useful if we could supplement that with some process mining capabilities over time."
"The ability to do more complicated data investigation would be a welcome addition for pros, though the functionality now gives most people what they need."
"We'd like the ability to do custom searches."
"I would like improved downward integration with other tools such as McAfee and other GCP solutions."
"The solution is much more expensive than relative competitors like ArcSight or LogRhythm. It makes it hard to sell to customers sometimes."
"The correlation engine should have persistent and definable rules."
"It could be easier to scale the solution if you are using it on-premise, not in the cloud."
"They should work to add more built-in correlation searches and more use cases based on worldwide customer experiences. They need more ready-made use cases."
 

Pricing and Cost Advice

"The solution is expensive."
"One of the things which bugs me about Lancope is the licensing. We understand how licensing works. Our problem is when we bought and purchased most of these Lancope devices, we did so with our sister company. Somewhere within the purchase and distribution, licensing got mixed up. That is all on Cisco, and it is their responsibility. They allotted some of our sister company's equipment to us, and some of our equipment to them. To date, they have never been able to fix it."
"The solution is expensive. It costs several hundred thousand dollars per year (depending on how many flows you are collecting)."
"It has a subscription model. There is yearly support, and there is also three-year support. It depends on what the customers want."
"The licensing costs are outrageous."
"The yearly licensing cost is about $50,000."
"The pricing for this solution is good."
"Pricing is much higher compared to other solutions."
"Licensing is done by flows per second, not including outside>in traffic."
"My biggest complaint is the way they do pricing... You can never know the pricing for next year. Every single time you adjust to something new, the price goes up. It's impossible to truly budget for it. It goes up constantly."
"The licensing costs is around 10,000 dollars."
"Pricing varies based on the packages you choose and the volume of your usage."
"I am not aware of the price, but it is expensive."
"There are additional costs associated with the integrator."
"I hope we can increase the free license to be more than 5 gig a day. This would help people who want to introduce a POC or a demo license for the solution."
report
Use our free recommendation engine to learn which Network Monitoring Software solutions are best for your needs.
816,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
12%
Manufacturing Company
9%
Government
8%
Computer Software Company
31%
Financial Services Firm
11%
Government
8%
Manufacturing Company
6%
Computer Software Company
15%
Financial Services Firm
13%
Government
9%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Juniper Mist Premium Analytics?
We can manage the entire system across the network and troubleshoot the pain points.
What do you like most about Cisco Stealthwatch?
The most valuable feature of Cisco Secure Network Analytics is the Threat Intelligence integration.
What is your experience regarding pricing and costs for Cisco Stealthwatch?
The tool is not cheaply priced. In cybersecurity, you want an extra layer of security in your organization. Some sect...
What needs improvement with Cisco Stealthwatch?
The expensive nature of the tool is an area of concern where improvements are required.
What do you like most about Splunk User Behavior Analytics?
The solution's most valuable feature is Splunk queries, which allow us to query the logs and analyze the attack vectors.
What is your experience regarding pricing and costs for Splunk User Behavior Analytics?
I am not aware of the price, but it is expensive. A rough estimate would be around 150 gigabytes, given the huge amou...
What needs improvement with Splunk User Behavior Analytics?
Sometimes, we need to write explicit queries. It would be good if the solution had an analytics tool that allowed us ...
 

Also Known As

No data available
Cisco Stealthwatch, Cisco Stealthwatch Enterprise, Lancope StealthWatch
Caspida, Splunk UBA
 

Learn More

Video not available
Video not available
 

Overview

 

Sample Customers

Information Not Available
Edge Web Hosting, Telenor Norway, Ivy Tech Community College of Indiana, Webster Financial Corporation, Westinghouse Electric, VMware, TIAA-CREF
8 Securities, AAA Western, AdvancedMD, Amaya, Cerner Corporation, CJ O Shopping, CloudShare, Crossroads Foundation, 7-Eleven Indonesia
Find out what your peers are saying about Cisco Secure Network Analytics vs. Splunk User Behavior Analytics and other solutions. Updated: January 2020.
816,406 professionals have used our research since 2012.