We performed a comparison between Cisco Secure Network Analytics and vRealize Network Insight based on real PeerSpot user reviews.
Find out in this report how the two Network Monitoring Software solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We can manage the entire system across the network and troubleshoot the pain points."
"The single dashboard is a valuable feature."
"The most valuable feature of this solution is data hoarding because it catches threats on a frequent basis that we had no idea of."
"It's a dependable product that is able to pinpoint where we have vulnerabilities if they occur."
"StealthWatch lets me see the ports running in and out and the country. It has excellent reporting, telemetry, and artificial intelligence features. With the telemetry, I can set thresholds to detect sudden changes and the alarms go through the PLC parts. I can see all the ports running on that trunk."
"The most valuable feature we got out of Stealthwatch is to be able to, while troubleshooting, go deep into one of our interfaces and verify what the bandwidth is and if there's any activity there that's causing problems."
"Overall, the implementation is very good."
"The most valuable feature of Cisco Secure Network Analytics is the Threat Intelligence integration."
"The deployment was a breeze. It is a very innovative and robust platform that allows us to bi-directionally stitch together data elements from Netflow-enabled devices to provide a context for network utilization."
"The most valuable feature is having visibility into the data segments throughout our network."
"The most valuable feture is NetFlow to help us understand how VMs communicate with each other over ports that are known and ports that are also unknown to us. Our company is a security company, so it's very important for us to know exactly which VMs are doing what at all times."
"It helps a lot because, until now, we didn't have the tools to figure out the micro level, VM-to-VM kind of traffic; that was not in the current environment. We could not figure out VM-to-VM communication from the other tools. This is the tool which gives us end-to-end transparency."
"The best feature of this application is its ability to capture everything within the same application, as well as capture all the traffic."
"By doing dependency mapping, it makes migrations more efficient. There are less outages that require engineers to spend additional hours troubleshooting the migration failures."
"It has definitely helped us to meet compliance rules by assuring that all traffic is going to where it's supposed to go. It can be used to report that you are in compliance, as well as helping you get into compliance."
"It especially helps with deploying NSX, that you're not having to manually chase down and figure out what you need to do to microsegment VMs. This gives a nice option where you can say, "Hey, this VM, show me what flows are there." I can export it out and then import it as an NSX rule and job done."
"The solution helps reduce time to value, increase performance, provide deep visibility, and easily manage networks."
"We're a smaller company so it automates a lot of the tasks and lets us focus in on building out our own solution. It's quicker, there is less building of manual solutions, and less downtime. It allows our developers to quickly develop, get provisioning done, de-provisioning, etc; the stuff that you would expect to be able to make it streamlined."
"The Wi-Fi side needs improvement."
"The technical support needs improvement."
"Many of these tools require extensive on-premises hardware to run."
"We need to be able to filter out internal IPs as non-threats."
"The GUI could use some improvement. Being able to find features more easily would be a great improvement if it was simplified."
"Stealthwatch is still maturing in AI. It uses artificial intelligence for predictions, but AI still needs to mature. It is in a phase where you get 95% correct detection. As its AI engine learns more, it will become more accurate. This is applicable to all the devices that are using AI because they support both supervised and unsupervised machine learning. The accuracy in the case of supervised machine learning is dependent on the data you feed into the box. The accuracy in the case of unsupervised machine learning is dependent on the algorithm. The algorithm matures depending on retrospective learning, and this is how it is able to detect zero-day attacks."
"We had some trouble with the installation as we migrated from our previous solution."
"Initially, I felt Cisco Secure Network Analytics lacked integration with Splunk."
"The customizability of the UI should improve."
"We've had problems with element licensing costs so scalability is a concern."
"The only issue we have is that the solution does not always capture the host names."
"The IT infrastructure industry is expected to evolve towards a hybrid cloud model in the next five to ten years. In this model, most of the customer's resources reside on-premise within a private cloud setup, such as VMware. Another segment operates within public cloud environments like Azure and AWS, and a portion remains in traditional data centers. There should be seamless interoperability between public and private clouds. AWS and VMware need to work together to make it possible. Whether users interact with on-premise infrastructure or configure resources in the public cloud, the user experience must be seamless."
"The solution can be improved by making it more compatible with other brands, allowing for better integration."
"It just needs to be more reliable and more accurate. At some point, there are some things where it does not match properly."
"vRNI needs more remediation where it hooks into NSX."
"In a very general way, I would like to see an improvement in interoperability with third-party product, from other vendors."
"I would like to see them expand the capabilities to infrastructure types other than just VMware."
"I would like to see more interoperability on the firewall and low balancer sides."
More Juniper Mist Premium Analytics Pricing and Cost Advice →
More Cisco Secure Network Analytics Pricing and Cost Advice →
Cisco Secure Network Analytics is ranked 24th in Network Monitoring Software with 58 reviews while vRealize Network Insight is ranked 23rd in Network Monitoring Software with 44 reviews. Cisco Secure Network Analytics is rated 8.2, while vRealize Network Insight is rated 8.6. The top reviewer of Cisco Secure Network Analytics writes "Increased the visibility of what is happening in our network". On the other hand, the top reviewer of vRealize Network Insight writes "Provides deep analytical insights and makes migrations efficient with dependency mapping". Cisco Secure Network Analytics is most compared with Darktrace, Cisco Secure Cloud Analytics, ThousandEyes, Vectra AI and Arista NDR, whereas vRealize Network Insight is most compared with ThousandEyes, NETSCOUT vSTREAM, AppNeta by Broadcom, Zabbix and LogicMonitor. See our Cisco Secure Network Analytics vs. vRealize Network Insight report.
See our list of best Network Monitoring Software vendors.
We monitor all Network Monitoring Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.