Likelihood to Recommend Few products operate off the Netflow or RAP/SPAN traffic versus the endpoint. Of those products, many operate from the aggregate traffic of uplinks/downlinks, whereas Secure Network Analytics focuses on viewing all traffic to give per-endpoint comprehensive data analytics. SNA is a great product for network visibility and detection, and to preserve that focus, other options such as remediation or quarantined are deferred to other products in the security ecosystem. SNA uses Machine Learning models to determine traffic behavioral compliance, which is a double-edged sword. On one hand, it mitigates zero day attacks changing traffic patterns, but conversely, it requires training to know acceptable traffic patterns. Unfortunately, many adopters of SNA do not spend the time giving it the user input and so the ML models never gets the correct weights and parameters to work from.
Read full review The system is great for enterprise or larger IT departments or teams where temporary or full access may be given using privileged IDs. Requirements for needing local admin access is also eliminated which can help with specific Windows workstation related tasks. It can be very useful when working with remote teams or contractors who may need temporary access to a system when required.
Read full review Pros A silent tool. A great way to get visibility of all the conversations of the network. Easy to find out the internal and the external threats. Easy to track performance. Network monitoring is very easy to understand and control. Attacks can be easily detected along with encrypted traffic. Historic records of the attack and reports make it even better. Read full review Automatically discover new servers on the network and take control of the local admin password by vaulting it and ensuring nobody knows the password. A different password on every server. Automatically roll the password in a configurable manner - after each use, after a certain period of time, etc. Track and govern sensitive account usage by ensuring only properly authorized users can access the vault and obtain the credentials and then monitor usage. Read full review Cons There are things that you can search for a particular type of traffic, but you cannot create an alert to alert on that type of traffic. An example of that is a particular encryption type. So like RC4 encryption is prohibited within DHS. I can search for traffic using it, but I can't create a rule alerting on that traffic type. Read full review GUI - right now everything is on one page/dashboard. Some level of folder/Safe type view would be great More options when storing passwords - especially for network based passwords Better integrations with vendors like Cisco so that admins dont need to really get the password from the vault (think Last Pass type add on) Read full review Likelihood to Renew Cisco Secure Network Analytics is a fantastic tool, but does require some setup and upkeep which may turn off smaller IT Security teams. However, once all the flows are set up and the product is functioning with the proper rules, the insight into your network is fantastic. For us, the product has a significant ROI and will be a product we keep up on.
Read full review Usability Strong and complete tool which gives comprehensive methods to discover cyber security incidents and prevent data leakage. In case of common use of Cisco StealthWatch and Cisco ISE, you will receive [the] ability [to] not just discover cyber security incidents but also dynamically respond to them. This makes StealthWatch one of most valuable products through[out] [the] whole Cisco Security product portfolio.
Read full review Reliability and Availability We haven't had too many issues with the uptime and availability of CSNA, but the application does have a lot of dependancies and we have seen issues after an upgrade that caused an outage for several hours.
Read full review Support Rating Overall winner because it exceeds our expectations by answering all our requirements and at the same time empowers our operations thru other built-in capabilities it has. Visibility is a key to security operations and Cisco StealthWatch really gives us a magnifying glass to check all logs in the network for threat intelligence and threat hunting.
Read full review Customer support and technical support have always been great when we require assistance. Especially when we come across issues that we're not familiar with.
Read full review Implementation Rating Implementation of the product can be tedious, especially fine tuning its rules to customize it to your environment. However, after that is done, CSNA is a very useful and flexible product that would enhance the security posture of any corporate network.
Read full review Alternatives Considered After integrating and developing a lot of security features in MF NNM, we were not able to meet the requirements from the customer. After the alternative research, we got to know about this Cisco Secure Network Analytics tool and after implementing the same, we finally were able to win CSAT. MF NNM had a support-related issue as well. It took more than a month to solve for couple of issues frequently. Whenever there is a problem or need their support, reaching out to them has always been a challenge.
Read full review It is known as one of the safest products in the market. It has good support and is also available as on-premise. You can run it virtually on VMWare (and probably on other hypervisors as well). You can have a second instance on bare metal and that makes it a very safe system.
Read full review Return on Investment It is a little pricey - in my organization, with budget cuts, I eventually had to replace it with an open source product (NTOP). While it works well for visibility, it simply isn't the same. If you can afford it, don't bother looking anywhere else - just get it. Being able to detect, pivot out, and remmediate from one console was awesome. Read full review Decreased the probability of an external cyber attack to privileged accounts.. Management can control privileged account life cycle management more effectively Recording privileged sessions allows our organization to play back exactly the point of a breach or malicious behavior Automated system to manage and verify passwords, as privileged accounts are constantly created and deleted Automatic PWD change functionality will substantially decrease probability of PWD theft or misuse. Read full review ScreenShots CyberArk Privileged Access Management Screenshots