

Find out in this report how the two Network Monitoring Software solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
The solution can save costs by improving incident resolution times and reducing security incident costs.
There is a lack of adequate local support from the Indian side.
For technical support of Cisco, the support they provide depends on how the client procures it, and so far, it's understandable.
Mission-critical offering a dedicated team, proactive monitoring, and fast resolution.
From the responsiveness perspective, Splunk is very responsive with SLA-bound support for premium tiers.
I would rate their technical support as 8.5 out of 10.
Splunk User Behavior Analytics is highly scalable, designed for enterprise scalability, allowing expansion of data ingestion, indexing, and search capabilities as log volumes grow.
Cisco products are incredibly stable, boasting a 200% stability.
Once resolved, the system works well, and overall I think it's good.
With built-in redundancy across zones and regions, 99.9% uptime is achievable.
Splunk User Behavior Analytics is a one hundred percent stable solution.
Splunk User Behavior Analytics is highly stable and reliable, even in large-scale enterprise environments with high log injection rates.
The solution should have the ability to analyze security events not only at the network layer but also at the application and OS layers.
Proper management of the database is also important; it should be centralized for easier data collection from a single database.
Global reach allows deployment of apps and services closer to users worldwide, but data sovereignty concerns exist and region selection must align with compliance requirements.
I encountered several issues while trying to create solutions for this advanced version, which seem unrelated to query or data issues.
High data ingestion costs can be an issue, especially for large enterprises, as Splunk charges based on the amount of data processed.
Cisco solutions are considered to be very expensive.
Regarding cost, for the Bangladesh context, Cisco Secure Network Analytics is a little bit high-priced because we are a developing country, making it tough to manage affordable solutions.
Reserved instances with one or three-year commitments offer lower rates, providing up to 70% savings.
Compared to all other products in the market, it is the most expensive one in all aspects including professional service and licenses, even the cloud version.
Comparing with the competitors, it's a bit expensive.
The most valuable features include encrypted traffic analytics and the ability to fulfill requirements at the network level.
Every solution is gradually integrated with AI, and Cisco has already implemented AI building features in their solution.
I also utilize it for anomaly detection and behavior analysis, particularly using Splunk's machine learning environment.
The dashboards themselves are nice, very good, and very helpful, but the accuracy of the data or the information that will be presented on the dashboard is something that needs to be questioned.
Features like alerts and auto report generation are valuable.
| Product | Mindshare (%) |
|---|---|
| Cisco Secure Network Analytics | 0.9% |
| Zabbix | 4.1% |
| SolarWinds NPM | 3.7% |
| Other | 91.3% |
| Product | Mindshare (%) |
|---|---|
| Splunk User Behavior Analytics | 5.2% |
| Exabeam | 8.7% |
| IBM Security QRadar | 7.0% |
| Other | 79.1% |

| Company Size | Count |
|---|---|
| Small Business | 11 |
| Midsize Enterprise | 7 |
| Large Enterprise | 52 |
| Company Size | Count |
|---|---|
| Small Business | 7 |
| Midsize Enterprise | 6 |
| Large Enterprise | 12 |
Cisco Secure Network Analytics enhances network security through integrated threat detection and detailed traffic visibility, optimizing performance with AI analytics and strong platform integrations.
Cisco Secure Network Analytics offers deep visibility into network traffic, with tools like network maps and server response times. Its AI-driven analytics help detect threats, focusing on east-west traffic. Integration with platforms such as pxGrid and ISE complements its capabilities. Reporting and telemetry help in identifying bandwidth issues, yet improvements are desired in AI for better data organization. Installation complexity and false positives present challenges, and managing network loads effectively is a recognized need.
What are the key features of Cisco Secure Network Analytics?Industries such as banking, defense, and police rely on Cisco Secure Network Analytics for securing networks against threats. Its capability to provide insights into encrypted traffic and facilitate device auditing makes it a sought-after choice for those requiring extensive network visibility. Users appreciate its application for threat prevention and response in demanding sectors.
Splunk User Behavior Analytics focuses on data aggregation and threat detection with automation, deepening insights into user behavior. It offers usability, stability, and strong integration capabilities, making it a preferred choice for organizations needing comprehensive security management.
This platform enhances security management through customizable dashboards and real-time updates. Advanced analytics for anomaly detection and behavioral profiling, coupled with powerful indexing and search capabilities, enable thorough user behavior analysis. Users experience streamlined integration with Active Directory and other monitoring tools. However, improvements are needed in dashboard customization, customer support, and analytics tools to boost user experience. Organizations use Splunk User Behavior Analytics primarily for monitoring and analyzing user behavior, integrating various data sources for effective threat detection while maintaining governance.
What are the key features of Splunk User Behavior Analytics?Splunk User Behavior Analytics is widely implemented across industries for threat detection and insider threat identification. By integrating with tools like Active Directory for monitoring and anomaly detection, organizations benefit from robust security management and effective log analysis. It underpins efforts in security, data indexing, and combining data for comprehensive threat prevention.
We monitor all Network Monitoring Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.