19 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener'>trScore algorithm: Learn more.</a>
Score 8.5 out of 100
49 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener'>trScore algorithm: Learn more.</a>
Score 8 out of 100

Attribute Ratings

  • Cisco Secure Network Analytics (Stealthwatch) is rated higher in 2 areas: Likelihood to Recommend, Support Rating

Likelihood to Recommend

8.1

Cisco Secure Network Analytics (Stealthwatch)

81%
10 Ratings
8.0

CyberArk Privileged Access Management

80%
9 Ratings

Likelihood to Renew

8.0

Cisco Secure Network Analytics (Stealthwatch)

80%
1 Rating

CyberArk Privileged Access Management

N/A
0 Ratings

Usability

7.3

Cisco Secure Network Analytics (Stealthwatch)

73%
1 Rating

CyberArk Privileged Access Management

N/A
0 Ratings

Availability

7.0

Cisco Secure Network Analytics (Stealthwatch)

70%
1 Rating

CyberArk Privileged Access Management

N/A
0 Ratings

Support Rating

8.0

Cisco Secure Network Analytics (Stealthwatch)

80%
3 Ratings
7.3

CyberArk Privileged Access Management

73%
7 Ratings

Implementation Rating

8.0

Cisco Secure Network Analytics (Stealthwatch)

80%
1 Rating

CyberArk Privileged Access Management

N/A
0 Ratings

Ease of integration

8.0

Cisco Secure Network Analytics (Stealthwatch)

80%
1 Rating

CyberArk Privileged Access Management

N/A
0 Ratings

Likelihood to Recommend

Cisco

Cisco
Secure Network Analytics is a compulsion to any organization looking to secure their network in silence with a complete record and analysis of the threats. All the critical information of the client is also preserved for instance and assistance for future needs. Cyber-attacks can’t even think to roam about your
network in any case.
Read full review

Cyberark

The system is great for enterprise or larger IT departments or teams where temporary or full access may be given using privileged IDs. Requirements for needing local admin access is also eliminated which can help with specific Windows workstation related tasks. It can be very useful when working with remote teams or contractors who may need temporary access to a system when required.
Read full review

Pros

Cisco

  • Using predefined signatures and scripts to capture and alert us to problems.
  • Built-in tools that automatically watch for suspicious behaviors
  • Integration with our already implemented IPAM services
  • Interfaces with Splunk for our IT security to easy review
Read full review

Cyberark

  • Automatically discover new servers on the network and take control of the local admin password by vaulting it and ensuring nobody knows the password. A different password on every server.
  • Automatically roll the password in a configurable manner - after each use, after a certain period of time, etc.
  • Track and govern sensitive account usage by ensuring only properly authorized users can access the vault and obtain the credentials and then monitor usage.
Read full review

Cons

Cisco

  • As with new technologies, learning curves are a given. On this one, there is a slight curve before you fully grasp it.
  • User interface can be improved to better user experience.
Read full review

Cyberark

  • GUI - right now everything is on one page/dashboard. Some level of folder/Safe type view would be great
  • More options when storing passwords - especially for network based passwords
  • Better integrations with vendors like Cisco so that admins dont need to really get the password from the vault (think Last Pass type add on)
Read full review

Pricing Details

Cisco Secure Network Analytics (Stealthwatch)

Starting Price

Editions & Modules

Cisco Secure Network Analytics (Stealthwatch) editions and modules pricing
EditionModules

Footnotes

    Offerings

    Free Trial
    Free/Freemium Version
    Premium Consulting/Integration Services

    Entry-level set up fee?

    No setup fee

    Additional Details

    Pricing Info

    CyberArk Privileged Access Management

    Starting Price

    Editions & Modules

    CyberArk Privileged Access Management editions and modules pricing
    EditionModules

    Footnotes

      Offerings

      Free Trial
      Free/Freemium Version
      Premium Consulting/Integration Services

      Entry-level set up fee?

      No setup fee

      Additional Details

      CyberArk offers a variety of Identity Security packages for different user types within an organization.

      Likelihood to Renew

      Cisco

      Cisco Secure Network Analytics is a fantastic tool, but does require some setup and upkeep which may turn off smaller IT Security teams. However, once all the flows are set up and the product is functioning with the proper rules, the insight into your network is fantastic. For us, the product has a significant ROI and will be a product we keep up on.
      Read full review

      Cyberark

      No answers on this topic

      Usability

      Cisco

      Strong and complete tool which gives comprehensive methods to discover cyber security incidents and prevent data leakage. In case of common use of Cisco StealthWatch and Cisco ISE, you will receive [the] ability [to] not just discover cyber security incidents but also dynamically respond to them. This makes StealthWatch one of most valuable products through[out] [the] whole Cisco Security product portfolio.
      Read full review

      Cyberark

      No answers on this topic

      Reliability and Availability

      Cisco

      We haven't had too many issues with the uptime and availability of CSNA, but the application does have a lot of dependancies and we have seen issues after an upgrade that caused an outage for several hours.
      Read full review

      Cyberark

      No answers on this topic

      Support Rating

      Cisco

      Overall winner because it exceeds our expectations by answering all our requirements and at the same time empowers our operations thru other built-in capabilities it has. Visibility is a key to security operations and Cisco StealthWatch really gives us a magnifying glass to check all logs in the network for threat intelligence and threat hunting.
      Read full review

      Cyberark

      Customer support and technical support have always been great when we require assistance. Especially when we come across issues that we're not familiar with.
      Read full review

      Implementation Rating

      Cisco

      Implementation of the product can be tedious, especially fine tuning its rules to customize it to your environment. However, after that is done, CSNA is a very useful and flexible product that would enhance the security posture of any corporate network.
      Read full review

      Cyberark

      No answers on this topic

      Alternatives Considered

      Cisco

      In order for Armis to truly provide value, it will require spans and taps at every location. This is not feasible in most places since not all sides have the infrastructure to support this and now you are required to support an additional appliance at every site. Stealthwatch leveraging NetFlow makes it 2nd to none.
      Read full review

      Cyberark

      It is known as one of the safest products in the market. It has good support and is also available as on-premise. You can run it virtually on VMWare (and probably on other hypervisors as well). You can have a second instance on bare metal and that makes it a very safe system.
      Read full review

      Return on Investment

      Cisco

      • It is a little pricey - in my organization, with budget cuts, I eventually had to replace it with an open source product (NTOP). While it works well for visibility, it simply isn't the same. If you can afford it, don't bother looking anywhere else - just get it.
      • Being able to detect, pivot out, and remmediate from one console was awesome.
      Read full review

      Cyberark

      • Decreased the probability of an external cyber attack to privileged accounts..
      • Management can control privileged account life cycle management more effectively
      • Recording privileged sessions allows our organization to play back exactly the point of a breach or malicious behavior
      • Automated system to manage and verify passwords, as privileged accounts are constantly created and deleted
      • Automatic PWD change functionality will substantially decrease probability of PWD theft or misuse.
      Read full review

      Screenshots

      Add comparison