We performed a comparison between Cisco Secure Network Analytics and Cloudflare based on real PeerSpot user reviews.
Find out what your peers are saying about Zabbix, Datadog, Auvik and others in Network Monitoring Software."The single dashboard is a valuable feature."
"We can manage the entire system across the network and troubleshoot the pain points."
"It is a good application, providing for real-time monitoring of the organization of data. It can basically identify points of peak traffic where possible issues are being caused."
"The most valuable feature is integration."
"Stealthwatch has greatly improved our network visibility, in terms of bandwidth, malware, and PCI violations."
"There are already many functionalities, so I don't think there is anything to improve."
"Cisco Stealthwatch provides the solutions analytics and threat detection capabilities that I am looking for. It has also improved the network visibility of our organization."
"It provides good visibility to the customers. People are still evaluating it, but it provides visibility and helps them to take action to remediate and mitigate the issues that are highlighted on the dashboard. It has good integration with the Cisco switching platform."
"Using this solution has helped us to detect and identify viruses or malicious activity in the network early on."
"Visibility. The ability to look East and West. To see what is passing through your circuits, where it is coming from, and how big it is."
"Cloudflare is a security SaaS provider that provides security and protects us from any application layer attack."
"The web application firewall brought us good security and a view of the accesses/blocks of the entire domain and subdomain that were accessed both by region (country) and IPs."
"New and innovative way to protect the client's data."
"It's very user-friendly."
"Generally, I am satisfied with this product."
"The most valuable feature of Cloudflare is the GUI. You are able to control the solution very well through the interface. There is a lot of functionality that is embedded in the service."
"DDoS attacks target unprotected machines. Cloudflare detects and stops these attacks using internal systems. It identifies incoming DDoS attacks, issuing challenges or blocking them immediately."
"The UI is good."
"The technical support needs improvement."
"The Wi-Fi side needs improvement."
"It's too complicated to install, when starting out."
"We would like the solution to make more advances in the way that Extreme Networks has been doing."
"At my company, we might not be using it enough with other applications that we have that can integrate with it."
"The initial setup is complex, as there is a lot to configure."
"We determined that Stealthwatch wouldn't provide the machine learning model that we required."
"The GUI could use some improvement. Being able to find features more easily would be a great improvement if it was simplified."
"There could be better integration on the programming side, which uses Python. StealthWatch could provide a template for Python to manage the switches. For example, it would be nice if StealthWatch bounced a port automatically it detected something anomalous."
"Many of these tools require extensive on-premises hardware to run."
"Cloudflare does not have an on-premise solution. If they had different approaches they could be better suited to accommodate more customers, such as on-premise and hybrid deployments. For example, hybrid deployments would be useful where you could move the traffic from the enterprise to the cloud."
"We're facing challenges due to an upgrade in the machine learning model. The problem arises from some users abusing the APIs, resulting in an influx of suspicious traffic. Cloudflare's learning model mistakenly identifies this traffic as human. Consequently, it assigns it a higher trust score, akin to legitimate human traffic, causing complications in our architecture. Previously, such traffic would have been categorized as suspicious, enabling us to apply appropriate blocking rules. However, we encounter difficulties distinguishing between genuine and suspicious traffic with the new categorization. Despite these challenges, overall, Cloudflare remains the preferred solution compared to Azure, AWS CloudFront, and Google Cloud Armor."
"The product needs to improve its automation."
"The reporting can definitely be improved to offer a lot more explanation on something that may have happened or has actually happened."
"There should be a specific price list for enterprise-level customers."
"It should be easier to collect the logs with companies like Sumo. However, based on my discussions with the salespeople, I understand that's how they make their money. With the enterprise product, they want people doing those kinds of enterprise features to do the logging. They want them to pay a lot of money, and that's where I have an issue with them. That should be a default. You should be able to get the log no matter what. The logging should be universal."
"Sometimes their more advanced caching tools can cause higher first-byte times and problems with JavaScript."
"There are some issues with the CDN services."
More Juniper Mist Premium Analytics Pricing and Cost Advice →
More Cisco Secure Network Analytics Pricing and Cost Advice →
Cisco Secure Network Analytics is ranked 24th in Network Monitoring Software with 57 reviews while Cloudflare is ranked 1st in Distributed Denial of Service (DDOS) Protection with 56 reviews. Cisco Secure Network Analytics is rated 8.2, while Cloudflare is rated 8.4. The top reviewer of Cisco Secure Network Analytics writes "Increased the visibility of what is happening in our network". On the other hand, the top reviewer of Cloudflare writes "It's easy to set up because you point the DNS to it, and it's working in under 15 minutes". Cisco Secure Network Analytics is most compared with Darktrace, Cisco Secure Cloud Analytics, ThousandEyes, Vectra AI and Arista NDR, whereas Cloudflare is most compared with Akamai, Azure Front Door, Imperva DDoS, AWS Shield and Microsoft Azure Application Gateway.
We monitor all Network Monitoring Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.