Cyber Vision Review
February 09, 2024

Cyber Vision Review

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Cisco Cyber Vision

We use this product to understand how our assets are working, what the communication is, and to set up a kind of asset list in hardware and software perspective.
  • It learns which software the hardware is using and which communication is wanted and which communication is bad, stuff like this.
  • We use it and this product is made especially for OT environment. So everything you can find inside of a production, PLC, robotics, stuff like this.
  • As freshly announced last Friday, it was pain by being forced to use SSD in Catalyst switches, but with the version it's no longer needed. So for here now I'm happy.
  • Neither nor, I would say no.
Absolutely had and is still doing it. It spots some extra tasks for the OT stuff as we now see some non fulfilled homeworks when doing updates, vulnerability management and housekeeping in end of life components.
Yeah, absolutely. Hopefully we are more secure now and be better prepared in case of syntax.
Because you can use components you already have, you don't have to add extra components in comparison to competitors. So adding devices automatically means adding switches and all the switches you're adding are able to provide the cyber vision solution. So with the same amount of switches you need when you scale, you automatically scale the foundation of cyber vision. So it grows together hand in hand.
You can't compare it one by one. There are even some pros at Nozomi, but the main decision making point was that we don't need extra hardware.

Do you think Cisco Cyber Vision delivers good value for the price?

Yes

Are you happy with Cisco Cyber Vision's feature set?

Yes

Did Cisco Cyber Vision live up to sales and marketing promises?

Yes

Did implementation of Cisco Cyber Vision go as expected?

No

Would you buy Cisco Cyber Vision again?

Yes

To do a reactive scan of devices to have the possibility to isolate fraudulent devices or attacking devices.