We performed a comparison between Cisco Secure Network Analytics and Meraki Dashboard based on real PeerSpot user reviews.
Find out in this report how the two Network Monitoring Software solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We can manage the entire system across the network and troubleshoot the pain points."
"The artifacts available in the tool provide better information for analyzing network traffic. It enables a holistic view of network traffic and general packet analysis. It's easy to identify anomalies without the use of signatures. The way in which we implemented Stealthwatch Cloud has enabled my team to analyze traffic behind proxies."
"It works efficiently for encrypted traffic analysis."
"The most valuable feature is its alerts and dashboard."
"The solution allowed us to not only get gain insight but also start collaborating with other tools."
"The ability to send data flow from other places and have them all in one place is very valuable for us."
"The most valuable feature of Cisco Secure Network Analytics is the Threat Intelligence integration."
"The most valuable feature of this solution is data hoarding because it catches threats on a frequent basis that we had no idea of."
"The solution has increased our threat detection rate. Cisco Stealthwatch has not reduced our incident response times. It has not reduced the amount of time it takes us to detect immediate threats. It has reduced false positives."
"It is a reliable product. It provides a lot of information that is easy to read."
"It is very stable and we have been using it for five years."
"I would say the ease of use is the most valuable feature. It's very easy to set up and get up and running."
"Scalability is one of Meraki Dashboard's strongest features. We have thousands of users if we're counting the end-users on our clients' network, but we have hundreds of clients."
"The most valuable feature is knowing the wireless and switch are healthy."
"The most valuable feature is its simplicity in navigating through the dashboard. It's well set out, and the layout is nice and user friendly. A lot of clients enjoy seeing layer 7 visibility. They get a good indication and insight into what is happening in their network and what applications are being used the most. They can then customize and give preference to business-critical applications."
"It can analyze the traffic that it is picking up from what may be a rogue access point, and it is able to identify those and send relevant notifications."
"The initial setup process is quite simple."
"The Wi-Fi side needs improvement."
"Reliance on Java. Get away from that."
"The initial setup is complex, as there is a lot to configure."
"One update that I would like to see is an agent-based client. Currently, Stealthwatch is network-based. A local agent could help manage endpoints."
"I would like the search page available with Cisco Stealthwatch to be more intuitive. The previous release was better than the current one for the UI."
"It's not great as a standalone solution."
"The visualization could be improved, the GUI is not the best."
"The ability to be natively integrated into Port Aggregator would be beneficial because it would reduce just one more component that's needed in order to have that type of view."
"At my company, we might not be using it enough with other applications that we have that can integrate with it."
"The tool needs to incorporate more integration platforms. Integrating technical support features directly into the dashboard would be highly beneficial. This would allow technicians to troubleshoot issues more efficiently."
"An area for improvement in Meraki Dashboard is licensing management because it's a little complex. Product licensing can be made a little bit easier through license concurrency and a more straightforward approach to applying the license to products and services."
"You can't really clone or replicate a device, that sort of feature would be useful. You can clone the site but you cannot clone the device."
"Meraki Dashboard's pricing could be improved."
"It's a very complex system. Customers have told me that sometimes there are lots of advanced features that are available and that you can change in the dashboard, but sometimes it's very hard to know what they are."
"It is not appropriate for large, enterprise businesses."
"The wait time to speak with a Meraki support engineer is always long, but they get the job done."
"They can improve the landing page in Meraki Dashboard. When I go into an organization, they can include a lot more infographics. They can also simplify it a bit and consolidate it. For example, if I've got five branches and I go into customer A's profile or organization, I'd like to see an infographic on the landing page providing a snippet of the entire network layout, that is, all branches in one snapshot. From there, I would like to go into the network that I want to work on or view."
More Cisco Secure Network Analytics Pricing and Cost Advice →
Cisco Secure Network Analytics is ranked 24th in Network Monitoring Software with 57 reviews while Meraki Dashboard is ranked 9th in Network Monitoring Software with 51 reviews. Cisco Secure Network Analytics is rated 8.2, while Meraki Dashboard is rated 8.6. The top reviewer of Cisco Secure Network Analytics writes "Increased the visibility of what is happening in our network". On the other hand, the top reviewer of Meraki Dashboard writes "Incredibly easy to use, great troubleshooting and prevention of malicious events". Cisco Secure Network Analytics is most compared with Darktrace, Cisco Secure Cloud Analytics, ThousandEyes, Vectra AI and Arista NDR, whereas Meraki Dashboard is most compared with Cisco DNA Center, SolarWinds NPM, ThousandEyes, Mist AI and Cloud and Auvik Network Management (ANM). See our Cisco Secure Network Analytics vs. Meraki Dashboard report.
See our list of best Network Monitoring Software vendors.
We monitor all Network Monitoring Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.