There is room for improvement in mitigation and reporting, and better integration between Cisco Secure Network Analytics and Cisco Secure Workload would be beneficial.
Initially, I felt Cisco Secure Network Analytics lacked integration with Splunk. However, with Cisco's recent acquisition of Splunk, it seems this gap will be addressed. If this integration happens quickly, it could complete the circle, making the platform more robust and offering a comprehensive solution for our network security.
Development Manager at a healthcare company with 10,001+ employees
Real User
Top 20
2023-02-20T13:55:00Z
Feb 20, 2023
I would like to see interoperability with other Cisco products because we have ThousandEyes, Cisco Prime, and others. The interaction among these is important to us.
Learn what your peers think about Cisco Secure Network Analytics. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Senior Cyber Scientist at a government with 10,001+ employees
Real User
Top 10
2023-02-13T14:17:00Z
Feb 13, 2023
The customizability of the UI should improve. With Splunk and other SIEM tools, you have the ability to create custom dashboards and manipulate the data in a way that works for you. Cisco gives you some creative ability, but you are very much locked into their train of thought. It would be helpful if they went more down the Splunk and Elastic route. We found flaws in Stealthwatch, but thankfully it has the ability to interconnect with Splunk and other such tools. This enabled us to plug the information over where it falls flat and then start working on other platforms. The solution falls down but tries to make up for it. I would also like to have greater insight into how it works under the hood. I appreciate that that might not be possible due to commercial confidentiality. However, having that greater insight would allow us to covey a level of trust to the people who use it.
IT Operations Supervisor at Aboitiz Equity Ventures, Inc.
Real User
2022-05-26T10:57:00Z
May 26, 2022
There could be better integration on the programming side, which uses Python. StealthWatch could provide a template for Python to manage the switches. For example, it would be nice if StealthWatch bounced a port automatically it detected something anomalous.
PMO Department at a comms service provider with 1,001-5,000 employees
Real User
2022-02-17T13:00:00Z
Feb 17, 2022
Stealthwatch is still maturing in AI. It uses artificial intelligence for predictions, but AI still needs to mature. It is in a phase where you get 95% correct detection. As its AI engine learns more, it will become more accurate. This is applicable to all the devices that are using AI because they support both supervised and unsupervised machine learning. The accuracy in the case of supervised machine learning is dependent on the data you feed into the box. The accuracy in the case of unsupervised machine learning is dependent on the algorithm. The algorithm matures depending on retrospective learning, and this is how it is able to detect zero-day attacks.
Chief Technology Officer at a tech services company with 51-200 employees
MSP
2021-06-25T19:18:40Z
Jun 25, 2021
The visualization could be improved, the GUI is not the best. Stealthwatch was purchased from a company called Lancope and the look and feel of the tool is a little different from some of Cisco's other security tools. There could be a little bit more machine learning type capability built into it. Some competitors are coming out with material in that area and there's a significant amount of competition moving to AI that could potentially give the competition an edge if Cisco doesn't maintain investment.
National Offering Lead - Security Practice at a computer software company with 501-1,000 employees
MSP
2021-02-11T14:58:47Z
Feb 11, 2021
Their response capability and the ability to push out responses along with changes in the network is important. This is something lacking, they don't have a lot of that, it's a passive tool. Cisco Stealthwatch is reliant on NetFlow and IT6. If this platform could integrate with other sources of knowledge and true threat intelligence it would help them. It's a good solid solution but integration with Network Access Control products with Cisco ISE would be good. Cisco's ISE NAC is more of a detection and analytics tool. There are several pivots where it allows you to push policy, but those integrations are not very strong. It's an area that needs some improvement or attention. Anything that they could do that would be a more action-oriented process out of Stealthwatch and pushing into the network program would be valuable. The interface is an area that needs a bit more work, it's always been clunky.
Ingenieria at a tech services company with 11-50 employees
Real User
2021-02-07T11:03:51Z
Feb 7, 2021
We don't really see any limitations on the product. Overall, it's been good. We would like the solution to make more advances in the way that Extreme Networks has been doing.
Enterprise Information Security Architect at a agriculture with 5,001-10,000 employees
Real User
2021-01-14T23:25:17Z
Jan 14, 2021
An issue that we are having is that people have tools to do a security analysis of network traffic and people have tools that do NetFlow analysis, but typically the security tools do the NetFlow as well. We need the security piece and there are many good NetFlow tools out there, but they don't have that. I feel like they didn't segregate the product classes enough. When you're doing research, you are looking for network traffic analysis, not NetFlow tools or network performance monitoring. This is the type of thing that I have been running into. You have to search for something that sounds very much like the other things, but it's not. Many of these tools require extensive on-premises hardware to run. It is for their own performance and to support their own tools, including machine learning. It's as though you have to buy this hardware stack, and I feel that contributes to the price. This is versus having my collected data and then feeding it up into the cloud. I feel like a lot of monitoring tools or a lot of analysis tools are going that route. I don't think that StealthWatch is there, yet. It isn't good when you get to the point where you need to buy a huge stack of hardware. Instead, I just pay a license for how much data I send to the cloud. It is maintained there and that way, year after year I don't have to buy new hardware when it goes end-of-life.
Director Network Services at a consultancy with 1,001-5,000 employees
Real User
2019-06-17T08:46:00Z
Jun 17, 2019
I would like to see more expansion in artificial intelligence and machine learning features. There does not seem to be much available in terms of training for the product. We use several training institutions, and this solution is not on any of their lists.
Network Operations Manager at Symantec Corporation
Real User
2019-06-17T08:46:00Z
Jun 17, 2019
There is room for this solution to mature because there are still things that we want to see. The reporting of day-to-day metrics still has room for improvement.
Technical Consultant at a tech services company with 501-1,000 employees
Consultant
2019-06-17T08:46:00Z
Jun 17, 2019
I would like this product to have better integration with Cisco Firepower. That is the easiest way to pair. Eliminating Java from the SMC would improve this solution. It would be better to let people know, upfront, that is doesn't give you nice, clear information, as seen in the demos, without Cisco ISE installed. Most of my customers are ISE-based so it doesn't matter, but I have to break the news to the ones who are not.
Some of our customers find this solution to be a little bit tough because they don't understand how to configure and use it. It may have to do with a need for more education when installing the product. Speed is an issue because the faster you have visibility, the better the solution.
I would like to see more and cleaner reporting. For example, if I pull up Steven and I want to look and maybe compare him to what you've done in the past week, and compare that to the past six months, the point would be to see what the difference in activity looks like over this time. I don't see that capability in reporting to date. You see that trend but you don't really see a straightforward comparison. That right there is key to what we want to see about the normal activity.
Lead Network Engineer at a retailer with 1,001-5,000 employees
Real User
2019-06-17T08:46:00Z
Jun 17, 2019
I think the interface is a little lacking. The interface seems like it just needs to be modernized. It's been the same interface now, ever since I've seen it probably four years ago.
Network Administrator at a mining and metals company with 1,001-5,000 employees
Real User
2019-06-17T08:46:00Z
Jun 17, 2019
One thing I would like to see improved is if it could automatically be tied through ISE, instead of you having to manually get notifications and disable it yourself. I am the only network admin at my facility, and when I'm on vacation for a week and there is an attack, I'm the only individual that gets alerts. Essentially there's a push button that you click to implement the policy through ISE to block that host or some other network essentially segregated from your internal network. I would like to see an automatic block function. I haven't noticed any downfall as far as CPU usage or any congestion, but it is still too early to say. Once I get a better understanding of it and get past the baselining, I can probably answer better and in more depth, because I don't know everything about it. I just understand the fundamental idea of it and what I can do from the dashboard.
Network Manager at a financial services firm with 1,001-5,000 employees
Real User
2019-06-17T08:46:00Z
Jun 17, 2019
The overall visibility into the actual device itself would be helpful. I don't just want support-specific data, but also to be able to see information such as CPU and other internal components or usage of the devices.
Network Engineer at a government with 1,001-5,000 employees
Real User
2019-06-17T08:45:00Z
Jun 17, 2019
We don't use Cisco Stealthwatch for threat detection. We use it more for information gathering. We use better options for threat detection, i.e. Palo Alto firewalls for our security. I would like the search page available with Cisco Stealthwatch to be more intuitive. The previous release was better than the current one for the UI. We moved to the latest UI a couple of months ago, maybe like six months ago. I'm not a fan. I wish the search options were easier.
Network Section Chief at a government with 1,001-5,000 employees
Real User
2019-06-17T08:45:00Z
Jun 17, 2019
We're still gathering numbers about our increased threat detection rate. Anything we can improve with security patches to the network greatly improves the product. There's a lot of traffic on our network that we don't see sometimes.
Manager of Digital Communications at Memorial Hermann Healthcare System
Real User
2019-06-17T08:45:00Z
Jun 17, 2019
The ability to be natively integrated into Port Aggregator would be beneficial because it would reduce just one more component that's needed in order to have that type of view.
Senior Director of Architecture and Engineering at Trace3
Real User
2019-06-17T08:45:00Z
Jun 17, 2019
I don't have a specific feature request, but my big push with Cisco has always been to make it easier for the administrators to use it. If you look at other products that they've been really successful within software space like Meraki, it's because a customer can jump right in and use it on day one and feel like they're accomplishing something with it. They don't have to have a Ph.D. Anything that we can do to make the customer experience better makes it easier for them to use it, which is what we want, and it also makes it easier for us to sell it. Obviously usability, but given the space that it plays in, any way that we can continue to increase the security vector coverage is always going to be a net gain for a product like that.
Network Engineer at a university with 10,001+ employees
Real User
2019-06-17T08:45:00Z
Jun 17, 2019
We are continuing down the road of ACI and ISE with Cisco, so we would like to see the continuation of Stealthwatch integrating into ISE for exchange of information, and also, more into the ACI environment too.
Cisco Stealthwatch needs more integration with device discovery. We have to do a lot of hard work to figure out what things are. Better service integration is required.
Considering all the data on the network, I believe that the analytics of Cisco Stealthwatch are pretty decent. I would like to see it better organized when I'm looking at it. If I hand it to another NOC engineer, they may not know what they're looking at, so I would prefer it to be more clean and structured, making it easier to use.
Associate Director Network Services at a pharma/biotech company with 10,001+ employees
Real User
2019-06-17T08:45:00Z
Jun 17, 2019
It's too complicated to install when starting out. Also, we have actually seen an increase in false positives with Stealthwatch. A few of the false positives were too early to detect. Availability is another issue. You need a couple of days to get it to work.
Network Manager Administrator at a financial services firm with 501-1,000 employees
Real User
2019-06-17T08:45:00Z
Jun 17, 2019
At my company, we might not be using it enough with other applications that we have that can integrate with it. We need integration between ISE and Stealthwatch. I know my company is trying to get it to work. I don't know if they actually got it yet.
Senior Consultant at a manufacturing company with 10,001+ employees
Real User
2019-06-17T08:45:00Z
Jun 17, 2019
I would like to see a hybrid solution that can work without being connected directly to the internet for those destinations. A business case would be manufacturing floors that are not, or still not, connected to the internet permanently. In terms of the user interface, navigating through the drill down windows needs to be improved.
Cisco Secure Network Analytics is a highly effective network traffic analysis (NTA) solution that enables users to find threats in their network traffic even if those threats are encrypted. It turns an organization’s network telemetry into a tool that creates a complete field of vision for the organization’s administrators. Users can find threats that may have infiltrated their systems and stop them before they can do irreparable harm.
Cisco Secure Network Analytics Benefits
A few ways that...
The expensive nature of the tool is an area of concern where improvements are required.
One area that could be improved in SNA is the integration with Cisco ISE for user and session details, which currently requires additional setup.
There is room for improvement in mitigation and reporting, and better integration between Cisco Secure Network Analytics and Cisco Secure Workload would be beneficial.
Initially, I felt Cisco Secure Network Analytics lacked integration with Splunk. However, with Cisco's recent acquisition of Splunk, it seems this gap will be addressed. If this integration happens quickly, it could complete the circle, making the platform more robust and offering a comprehensive solution for our network security.
The solution's cost could be better. Also, its granularity for RBAC roles-based access control needs improvement.
I would like to see interoperability with other Cisco products because we have ThousandEyes, Cisco Prime, and others. The interaction among these is important to us.
The customizability of the UI should improve. With Splunk and other SIEM tools, you have the ability to create custom dashboards and manipulate the data in a way that works for you. Cisco gives you some creative ability, but you are very much locked into their train of thought. It would be helpful if they went more down the Splunk and Elastic route. We found flaws in Stealthwatch, but thankfully it has the ability to interconnect with Splunk and other such tools. This enabled us to plug the information over where it falls flat and then start working on other platforms. The solution falls down but tries to make up for it. I would also like to have greater insight into how it works under the hood. I appreciate that that might not be possible due to commercial confidentiality. However, having that greater insight would allow us to covey a level of trust to the people who use it.
There could be better integration on the programming side, which uses Python. StealthWatch could provide a template for Python to manage the switches. For example, it would be nice if StealthWatch bounced a port automatically it detected something anomalous.
Stealthwatch is still maturing in AI. It uses artificial intelligence for predictions, but AI still needs to mature. It is in a phase where you get 95% correct detection. As its AI engine learns more, it will become more accurate. This is applicable to all the devices that are using AI because they support both supervised and unsupervised machine learning. The accuracy in the case of supervised machine learning is dependent on the data you feed into the box. The accuracy in the case of unsupervised machine learning is dependent on the algorithm. The algorithm matures depending on retrospective learning, and this is how it is able to detect zero-day attacks.
The visualization could be improved, the GUI is not the best. Stealthwatch was purchased from a company called Lancope and the look and feel of the tool is a little different from some of Cisco's other security tools. There could be a little bit more machine learning type capability built into it. Some competitors are coming out with material in that area and there's a significant amount of competition moving to AI that could potentially give the competition an edge if Cisco doesn't maintain investment.
Their response capability and the ability to push out responses along with changes in the network is important. This is something lacking, they don't have a lot of that, it's a passive tool. Cisco Stealthwatch is reliant on NetFlow and IT6. If this platform could integrate with other sources of knowledge and true threat intelligence it would help them. It's a good solid solution but integration with Network Access Control products with Cisco ISE would be good. Cisco's ISE NAC is more of a detection and analytics tool. There are several pivots where it allows you to push policy, but those integrations are not very strong. It's an area that needs some improvement or attention. Anything that they could do that would be a more action-oriented process out of Stealthwatch and pushing into the network program would be valuable. The interface is an area that needs a bit more work, it's always been clunky.
We don't really see any limitations on the product. Overall, it's been good. We would like the solution to make more advances in the way that Extreme Networks has been doing.
An issue that we are having is that people have tools to do a security analysis of network traffic and people have tools that do NetFlow analysis, but typically the security tools do the NetFlow as well. We need the security piece and there are many good NetFlow tools out there, but they don't have that. I feel like they didn't segregate the product classes enough. When you're doing research, you are looking for network traffic analysis, not NetFlow tools or network performance monitoring. This is the type of thing that I have been running into. You have to search for something that sounds very much like the other things, but it's not. Many of these tools require extensive on-premises hardware to run. It is for their own performance and to support their own tools, including machine learning. It's as though you have to buy this hardware stack, and I feel that contributes to the price. This is versus having my collected data and then feeding it up into the cloud. I feel like a lot of monitoring tools or a lot of analysis tools are going that route. I don't think that StealthWatch is there, yet. It isn't good when you get to the point where you need to buy a huge stack of hardware. Instead, I just pay a license for how much data I send to the cloud. It is maintained there and that way, year after year I don't have to buy new hardware when it goes end-of-life.
Cisco could improve the administration for the customers.
The usability of this solution needs to be improved. The initial setup of this solution can be simplified.
We're trying to upgrade to the newest release. We're running a version that's three versions behind.
I would like to see better filters. You should be able to filter the data out to more rapidly find what you're looking for.
There are already many functionalities, so I don't think there is anything to improve. Its the best one on the market I have seen.
I would like to see more expansion in artificial intelligence and machine learning features. There does not seem to be much available in terms of training for the product. We use several training institutions, and this solution is not on any of their lists.
The initial setup is complex, as there is a lot to configure.
The GUI could use some improvement. Being able to find features more easily would be a great improvement if it was simplified.
There is room for this solution to mature because there are still things that we want to see. The reporting of day-to-day metrics still has room for improvement.
It is time-consuming to set it up and understand how the tool works.
I would like this product to have better integration with Cisco Firepower. That is the easiest way to pair. Eliminating Java from the SMC would improve this solution. It would be better to let people know, upfront, that is doesn't give you nice, clear information, as seen in the demos, without Cisco ISE installed. Most of my customers are ISE-based so it doesn't matter, but I have to break the news to the ones who are not.
Some of our customers find this solution to be a little bit tough because they don't understand how to configure and use it. It may have to do with a need for more education when installing the product. Speed is an issue because the faster you have visibility, the better the solution.
I would like to see more and cleaner reporting. For example, if I pull up Steven and I want to look and maybe compare him to what you've done in the past week, and compare that to the past six months, the point would be to see what the difference in activity looks like over this time. I don't see that capability in reporting to date. You see that trend but you don't really see a straightforward comparison. That right there is key to what we want to see about the normal activity.
I think the interface is a little lacking. The interface seems like it just needs to be modernized. It's been the same interface now, ever since I've seen it probably four years ago.
One thing I would like to see improved is if it could automatically be tied through ISE, instead of you having to manually get notifications and disable it yourself. I am the only network admin at my facility, and when I'm on vacation for a week and there is an attack, I'm the only individual that gets alerts. Essentially there's a push button that you click to implement the policy through ISE to block that host or some other network essentially segregated from your internal network. I would like to see an automatic block function. I haven't noticed any downfall as far as CPU usage or any congestion, but it is still too early to say. Once I get a better understanding of it and get past the baselining, I can probably answer better and in more depth, because I don't know everything about it. I just understand the fundamental idea of it and what I can do from the dashboard.
Complexity on integration is not so straightforward and you really need an expert to help build it out.
The overall visibility into the actual device itself would be helpful. I don't just want support-specific data, but also to be able to see information such as CPU and other internal components or usage of the devices.
Stealthwatch needs improvement when it comes to speed.
I don't really think we really save time while using this solution.
We don't use Cisco Stealthwatch for threat detection. We use it more for information gathering. We use better options for threat detection, i.e. Palo Alto firewalls for our security. I would like the search page available with Cisco Stealthwatch to be more intuitive. The previous release was better than the current one for the UI. We moved to the latest UI a couple of months ago, maybe like six months ago. I'm not a fan. I wish the search options were easier.
We're still gathering numbers about our increased threat detection rate. Anything we can improve with security patches to the network greatly improves the product. There's a lot of traffic on our network that we don't see sometimes.
The ability to be natively integrated into Port Aggregator would be beneficial because it would reduce just one more component that's needed in order to have that type of view.
I don't have a specific feature request, but my big push with Cisco has always been to make it easier for the administrators to use it. If you look at other products that they've been really successful within software space like Meraki, it's because a customer can jump right in and use it on day one and feel like they're accomplishing something with it. They don't have to have a Ph.D. Anything that we can do to make the customer experience better makes it easier for them to use it, which is what we want, and it also makes it easier for us to sell it. Obviously usability, but given the space that it plays in, any way that we can continue to increase the security vector coverage is always going to be a net gain for a product like that.
We are continuing down the road of ACI and ISE with Cisco, so we would like to see the continuation of Stealthwatch integrating into ISE for exchange of information, and also, more into the ACI environment too.
Cisco Stealthwatch needs more integration with device discovery. We have to do a lot of hard work to figure out what things are. Better service integration is required.
Considering all the data on the network, I believe that the analytics of Cisco Stealthwatch are pretty decent. I would like to see it better organized when I'm looking at it. If I hand it to another NOC engineer, they may not know what they're looking at, so I would prefer it to be more clean and structured, making it easier to use.
It's too complicated to install when starting out. Also, we have actually seen an increase in false positives with Stealthwatch. A few of the false positives were too early to detect. Availability is another issue. You need a couple of days to get it to work.
At my company, we might not be using it enough with other applications that we have that can integrate with it. We need integration between ISE and Stealthwatch. I know my company is trying to get it to work. I don't know if they actually got it yet.
We had some trouble with the installation as we migrated from our previous solution.
They should include Citrix VDIs in the next release.
I would like to see a hybrid solution that can work without being connected directly to the internet for those destinations. A business case would be manufacturing floors that are not, or still not, connected to the internet permanently. In terms of the user interface, navigating through the drill down windows needs to be improved.
I would like to see some improvement when it comes to reporting.