Try our new research platform with insights from 80,000+ expert users
NetworkAcb23 - PeerSpot reviewer
Network Administrator at a mining and metals company with 1,001-5,000 employees
Real User
Jul 9, 2019
Improved our organization's analytics and threat protection capabilities by catching threats early on
Pros and Cons
  • "The most valuable feature of this solution is data hoarding because it catches threats on a frequent basis that we had no idea of."
  • "One thing I would like to see improved is if it could automatically be tied through ISE, instead of you having to manually get notifications and disable it yourself."

What is our primary use case?

Our primary use case for this solution is to monitor east, west, north, and south traffic so that we can see what's going on in the network internally. You don't get that granularity with anything else. We have an ASA that gets north and south traffic. So we're just really interested in this one by itself.

How has it helped my organization?

Cisco Stealthwatch has improved our organization's analytics and threat protection capabilities by catching threats early on. We are still at the baselining stage, but I can also say that our organization improved dramatically when we found out that a host was constantly talking to an FTP server. It turned out to be an employee that was going to be terminated and he was trying to pull data from the FTP server constantly. He pulled three or four GBs and we caught it with this tool. It saved us a net fortune.

The solution has also increased our threat detection rate dramatically and that gives us time to remediate those threats.

What is most valuable?

The most valuable feature of this solution is data hoarding because it catches threats on a frequent basis that we had no idea of. Like if certain hosts were talking to certain hosts. With this tool, we got that kind of information and it allows us to see when two hosts are talking when they shouldn't be talking at all.

What needs improvement?

One thing I would like to see improved is if it could automatically be tied through ISE, instead of you having to manually get notifications and disable it yourself. I am the only network admin at my facility, and when I'm on vacation for a week and there is an attack, I'm the only individual that gets alerts. Essentially there's a push button that you click to implement the policy through ISE to block that host or some other network essentially segregated from your internal network. I would like to see an automatic block function.
I haven't noticed any downfall as far as CPU usage or any congestion, but it is still too early to say. Once I get a better understanding of it and get past the baselining, I can probably answer better and in more depth, because I don't know everything about it. I just understand the fundamental idea of it and what I can do from the dashboard. 

Buyer's Guide
Cisco Secure Network Analytics
February 2026
Learn what your peers think about Cisco Secure Network Analytics. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
881,733 professionals have used our research since 2012.

What do I think about the stability of the solution?

It is extremely stable. I haven't had a crash since installing it.

What do I think about the scalability of the solution?

It is very scalable. You only have to purchase more licensing. As far as I understand, it can become as big as you want it to become and how many net flows you can afford.

How are customer service and support?

The technical support is awesome. Anytime I call Cisco Tech, they call me back within thirty minutes or an hour with an answer to solve the problem. The guides that they have within the product itself are pretty self-explanatory. As long as you're willing to sit down and read it, you don't even need to call tech.

Which solution did I use previously and why did I switch?

My superior asked what this host was doing within our network, what data he was pulling and why he had it on this PC. We couldn't answer to say that he wasn't pulling data from that server or what data he was in fact pulling. So we had to find a solution to answer those questions. We are a Cisco shop so we kind of just went for this solution.

How was the initial setup?

The initial setup was straightforward. They explained the steps that they were going to do and they had it deployed within about two hours. It didn't take long and now we're just doing the baseline, which takes about three months.

What about the implementation team?

Yes, we used Network Center and they were good.

What was our ROI?

I can foresee that this solution will save us an immense lot of work in the future. Instead of having 20 people looking at logs and sifting through logs, you could have one individual simply sifting through this. It will be a lot easier and less time-consuming.
So the time to value of this solution is great. For every person you're going to pay about $70 or $80,000 a year, you would now only have to pay one individual instead of 20.

What's my experience with pricing, setup cost, and licensing?

This solution is a little expensive. Open-source is obviously a key to victory in some people's eyes but with open-source, you can't pay anybody. So it could be a little cheaper, but it has great functionality. 

What other advice do I have?

One thing I've learned from this solution is that there's a lot of stuff happening within internal networks that we weren't aware of. I am really satisfied with this solution and I will rate it a ten out of ten. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Architect at a tech services company with 1,001-5,000 employees
Real User
Jul 9, 2019
Provides important visibility needed to detect and take precautions against threats
Pros and Cons
  • "The most valuable features provided by this solution are visibility and information."
  • "Some of our customers find this solution to be a little bit tough because they don't understand how to configure and use it."

What is our primary use case?

We provide this solution to our customers to give them visibility into their network.

How has it helped my organization?

This solution gives our customers better visibility. They have a large infrastructure and they don't know what is going on in the individual locations, so we're using Stealthwatch for that.

It has reduced our incident response time by around forty percent.

It saves time, money and administrative work for our customers.

What is most valuable?

The most valuable features provided by this solution are visibility and information.

The solution's analytics and threat detection capabilities are good. Network visibility is also really good. 

The encrypted traffic analytics work well, I don't see any problem with it.

The time to value is very good, and it is based on visibility. For example, one of our customers was locked by Ransomware and it cost them two million Danish Krones (approximately $300,000 USD). The shipper was not able to send anything until we got everything working.

It has reduced the amount of time it takes to detect and remediate threats, although it is hard to tell by how much. If you’re under attack and you get visibility then you know it, and you can take precautions as fast as possible.

What needs improvement?

Some of our customers find this solution to be a little bit tough because they don't understand how to configure and use it. It may have to do with a need for more education when installing the product.

Speed is an issue because the faster you have visibility, the better the solution.

What do I think about the stability of the solution?

I would say that the stability of this solution could be better.

What do I think about the scalability of the solution?

The scalability is okay.

How are customer service and technical support?

Technical support for this solution could be better. It's ok. It is sometimes a case of having to find the right tech engineer before you get the real answers. Not everybody knows Stealthwatch, which is the problem.

Which solution did I use previously and why did I switch?

Previously, my customer had a large router and switching network with a lot of perimeter security, but they didn't have any security or visibility on their internal network. That is why they are using Stealthwatch now.

How was the initial setup?

The initial setup of this solution is complex. The most important thing is that the customer has good guidelines.

What about the implementation team?

I performed the deployment myself.

Which other solutions did I evaluate?

We did not evaluate other options before choosing this solution.

What other advice do I have?

In summary, this product provides good visibility into the internal network, but it is difficult for some people to install and configure.

I would rate this solution an eight out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Cisco Secure Network Analytics
February 2026
Learn what your peers think about Cisco Secure Network Analytics. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
881,733 professionals have used our research since 2012.
Directorb5e9 - PeerSpot reviewer
Director Network Services at a consultancy with 1,001-5,000 employees
Real User
Jul 9, 2019
Provides never-before-seen data and intelligence using the encrypted traffic analysis feature
Pros and Cons
  • "The most valuable feature is having visibility into the data segments throughout our network."
  • "I would like to see more expansion in artificial intelligence and machine learning features."

What is our primary use case?

Our primary use for this solution is to help protect against threats on our network.

How has it helped my organization?

This solution has helped to save us against threats, and issues. Regarding threats, we have been able to go out and mitigate some of them.

Ironically, if we consider it from the standpoint of “searching for an issue”, while it does save us time, it also provides us with more threats and issues that we would not be able to see without the product. In this regard, it also increases the work. With more threats being detected, it takes longer to examine them.

In terms of detection rate improvement, we have a lot more visibility than we’ve had in the past.

It has reduced the amount of time it takes to detect and remediate threats. It has also reduced false positives.

What is most valuable?

The most valuable feature is having visibility into the data segments throughout our network.

Using the encrypted traffic analysis has given us more intelligence on the data that we're seeing, and provides us with even greater visibility. We can now see stuff that we haven't been able to see.

There is an encrypted analytics feature that gives us visibility into some of the encrypted traffic.

What needs improvement?

I would like to see more expansion in artificial intelligence and machine learning features.

There does not seem to be much available in terms of training for the product. We use several training institutions, and this solution is not on any of their lists.

What do I think about the stability of the solution?

There are no stability issues with the product.

What do I think about the scalability of the solution?

I think that the solution is very scalable. I believe that if we had to expand, we can easily add port collectors to our environment across the enterprise, and use the same management system to view the data.

We have not yet had to scale the solution.

How are customer service and technical support?

Only five of our engineers have been in contact with technical support. Because I don't work with the product day to day, I don't have any feedback.

Which solution did I use previously and why did I switch?

We did not have a solution like Stealthwatch. We heard about the product and the value it was able to give to companies regarding threats, and we thought it would be the right solution for us.

How was the initial setup?

Installing the solution is straightforward, although the tuning can be complex. In our case, we didn't have any pre-training or the skills required before deploying it. So, tuning was a little complex.

What about the implementation team?

We deployed the product with the assistance of our Cisco account engineers. We have a great engineering team assigned to our account.

What's my experience with pricing, setup cost, and licensing?

We pay for support costs on a yearly basis.

Which other solutions did I evaluate?

We evaluated Darktrace after the fact. The Cisco Stealthwatch solution tied in well with our other Cisco products, so we decided that this was the way to go, for now.

What other advice do I have?

This is a very good tool, although it is just one piece of our security. We have other security tools that we use to help detect threats.

The amount of information that this product gives us for detecting threats is very valuable, and we don't have another product like this in our environment. Threats can take down a company, so this is something that we like, and need.

All companies should have a solution like this. Firewalls and IPS systems, along with other security tools are valuable, but they do not have the particular functionality of this one.

My advice for anybody implementing this solution is to get training on it before their deployment.

I would rate this solution a nine out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
LeadNetwd213 - PeerSpot reviewer
Lead Network Engineer at a retailer with 1,001-5,000 employees
Real User
Jul 9, 2019
Enables us to be proactive with security analysis but the interface is sluggish
Pros and Cons
  • "The ability to send data flow from other places and have them all in one place is very valuable for us."
  • "I think the interface is a little lacking. The interface seems like it just needs to be modernized. It's been the same interface now, ever since I've seen it probably four years ago."

What is our primary use case?

The security team uses it more than we do. I don't work on it that much. We have a couple uses for Stealthwatch: gathering security data and sending logs. I believe there is a gatherer that we have that has all of our logs sitting there. That's basically all we use them for.

How has it helped my organization?

Stealthwatch improved our organization by providing more information so we can be proactive with security analysis.

It's made our network visibility better. The more information that we can give is all for the best. Just allowing us to get more information and visibility is also helpful.

I would say it has increased our threat detection rate. We use it to count employees and we have some new places we use it, so this may have increased.

It may have reduced the time to detect and remedy threats a little.

It has reduced false positives, by around 15%. That would be the security numbers, I'm not aware of the exact numbers.

I'm sure Stealthwatch saves us time, money, and administrative work.

What is most valuable?

The ability to send data flow from other places and have them all in one place is very valuable for us.

What needs improvement?

I think the interface is a little lacking. The interface seems like it just needs to be modernized. It's been the same interface now, ever since I've seen it probably four years ago.

For how long have I used the solution?

We've had Stealthwatch in production for a year and half.

What do I think about the stability of the solution?

It's stable now. I wouldn't say it was stable when we first had the solution, but now it's stable. In the beginning, we had the standard first-time turn-up stuff, like issues with the code, etc. We tried to give them a better solution to work with our company well. The way we have things set up is complicated.

What do I think about the scalability of the solution?

We only use it for certain subsets so we're not really dependent on how scalable it is. It does what we need it to do and that's all we could ever let it do.

How are customer service and technical support?

I didn't work much with technical support. We had to get a license. That was our only hangup in the beginning. I think their support is as expected.

What was our ROI?

In terms of time to value, I think that would be better, from my standpoint. I would say it's definitely helped, but I wouldn't consider it the only tool that we depend on.

I would say they are getting a return on investment if it's doing what they want it to do and they're getting information. Also, it helps to be proactive on things like Stealthwatch.

What other advice do I have?

The biggest lesson I learned is if it's not getting the flow data, it's not helping you. You have to just get your appointment inside the data. That's not really a tool, that's just if you don't send it, it can't see it.

In terms of advice, be sure of what traffic you want to send it, or it's useless. Have that ready, so that you can get your data back immediately instead of trying to fight with it a long time. Just have your information ready to configure.

I would rate Stealthwatch as a six out of ten. The interface is sluggish and not updated. The whole thing is a little sluggish when you're trying to do stuff, too. In my experience, it does what we expect it to do and from that standpoint, we don't really expect any more.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
NetworkM6238 - PeerSpot reviewer
Network Manager at a financial services firm with 1,001-5,000 employees
Real User
Jul 9, 2019
Decreased troubleshooting steps to resolve issues and saves us time, money, and administrative work
Pros and Cons
  • "The most valuable feature we got out of Stealthwatch is to be able to, while troubleshooting, go deep into one of our interfaces and verify what the bandwidth is and if there's any activity there that's causing problems."
  • "The overall visibility into the actual device itself would be helpful. I don't just want support-specific data, but also to be able to see information such as CPU and other internal components or usage of the devices."

What is our primary use case?

Our primary use is to monitor our network, especially our remote branches.

How has it helped my organization?

Stealthwatch has decreased our troubleshooting steps and also cut down on the amount of time it takes us to resolve an issue.

We're able to map out our environment using Stealthwatch and we can see where our data is going, throughout our network.

Stealthwatch reduced our incident response rate, as well as the amount of time it takes to detect and remediate threats by about 25%.

This solution saves us time, money, and administrative work.

What is most valuable?

The most valuable feature we got out of Stealthwatch is to be able to, while troubleshooting, go deep into one of our interfaces and verify what the bandwidth is and if there's any activity there that's causing problems.

In terms of their analytics, we use the stats that we get from the tool itself to see that we're using a high utilization of the tool. As far as troubleshooting, it helps us to analyze some of the effects that our customers are seeing.

What needs improvement?

The overall visibility into the actual device itself would be helpful. I don't just want support-specific data, but also to be able to see information such as CPU and other internal components or usage of the devices.

What do I think about the stability of the solution?

The solution's very stable. Even through the upgrades after Cisco's acquisition, it has proved to be very stable.

What do I think about the scalability of the solution?

It scales very well.

How are customer service and technical support?

We haven't had to use it much. When we have, it's been similar to most Cisco technical support, which is very knowledgeable and helpful.

Which solution did I use previously and why did I switch?

We previously used SolarWinds. The version of SolarWinds that we were using didn't give us the visibility that we needed, so we switched to Stealthwatch.

How was the initial setup?

The initial setup was straightforward.

What was our ROI?

We have seen a return on investment, from the fact that we now take less time to resolve an issue because we have Stealthwatch. We can capture some data in real time, or we can actually go back in the history base if we have to, to see where the issues may have started, and we also have baselines.

Their time to value is very good. We've upgraded and we just relicensed, so this is definitely a product that we use.

What's my experience with pricing, setup cost, and licensing?

The yearly licensing cost is about $50,000.

Which other solutions did I evaluate?

We evaluated SolarWinds, WhatsUp Gold, and a couple of others that I can't think of right now.

What other advice do I have?

My biggest lesson learned was how easy it is to use and to what extent it decreased our troubleshooting time. My advice is to buy Stealthwatch.

I would probably rate this as a nine out of ten. It gives us most of what we need. The one thing that's missing is probably being able to view a little deeper into the devices themselves, not just the port but the actual health of the devices.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Infosec Manager at a energy/utilities company with 1,001-5,000 employees
Real User
Jul 9, 2019
Enables us to have visibility but it needs improvement when it comes to speed
Pros and Cons
  • "Stability is the most valuable feature we have seen in this solution."
  • "Stealthwatch needs improvement when it comes to speed."

What is our primary use case?

Our main reason for using Stealthwatch is it gives us visibility.

What is most valuable?

Stability is the most valuable feature we have seen in this solution.

What needs improvement?

Stealthwatch needs improvement when it comes to speed.

What do I think about the stability of the solution?

The solution's stability is good.

What do I think about the scalability of the solution?

I think this solution is okay with scale.

How are customer service and technical support?

I think their technical support is great.

How was the initial setup?

The initial setup was straightforward.

What was our ROI?

Time to value is very good for Stealthwatch.

What other advice do I have?

I would rate Stealthwatch as an eight or nine out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
SrNetworab58 - PeerSpot reviewer
Sr. Network Engineer at a tech services company with 10,001+ employees
Real User
Jul 9, 2019
We have seen improved network visibility of our organization but the setup is complex
Pros and Cons
  • "Cisco Stealthwatch provides the solutions analytics and threat detection capabilities that I am looking for. It has also improved the network visibility of our organization."
  • "The configuration of the solution was quite complex."

What is our primary use case?

Our primary use case for Cisco Stealthwatch is to ensure net flow.

How has it helped my organization?

Cisco Stealthwatch provides the solutions analytics and threat detection capabilities that I am looking for. It has also improved the network visibility of our organization. 

What is most valuable?

The most valuable feature of this solution is that it give us insight into what's happening in our network. 

What needs improvement?

I don't really think we really save time while using this solution.

What do I think about the stability of the solution?

Cisco Stealthwatch is quite stable.

What do I think about the scalability of the solution?

It all depends on the platform you are using, but I think it is pretty scalable.

How was the initial setup?

The configuration of the solution was quite complex so I won't say that it is straightforward to set everything up.

What about the implementation team?

We used a vendor, Cisco, for implementation. 

What was our ROI?

I believe ROI will take around a year.

Which other solutions did I evaluate?

We also look at Red Hat.

What other advice do I have?

I will rate this solution a five or six out of ten because I do believe it is beneficial to our organization. I will recommend others to use endpoint management.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
ServiceE8f27 - PeerSpot reviewer
Service Engineer at a tech company with 10,001+ employees
Real User
Jul 9, 2019
Our protection rate has doubled and we can monitor our bandwidth or any other issues on our networks
Pros and Cons
  • "Using this solution has helped us to detect and identify viruses or malicious activity in the network early on."
  • "We haven't seen ROI."

What is our primary use case?

We mainly use Cisco Stealthwatch in our organization for bandwidth monitoring and other issues we experience on our networks. When someone reports an issue, this solution helps us to determine what's going on in the network by checking the cell blocks and see if there are any issues.

How has it helped my organization?

Using this solution has helped us to detect and identify viruses or malicious activity in the network early on. It has definitely given us more insight because it's a lot easier to check Stealthwatch's logs than to log into a router and do a bunch of show commands. I would say that it has at least doubled our protection rate. 

Since we started using this solution, we've been saving time, money and administration work. It is now much easier to log into Stealthwatch and see what I want to see rather than logging into a router and checking everything out. The administration is also much less because everything's right there for me.

What do I think about the stability of the solution?

I haven't experienced any problems or downtime with Cisco Stealthwatch, so the stability is really good.

What do I think about the scalability of the solution?

The scalability of this solution is good. We don't have a very large network that we use it on. I support only around 200 routers or so. But for what we use it for, it is scalable.

How are customer service and technical support?

I never had to use technical support before.

How was the initial setup?

The initial setup was straightforward. We simply followed the instructions on how to use it, and so far everything is working great. 

What was our ROI?

We haven't seen ROI.

What other advice do I have?

I will never rate a product ten, so my rating for this solution is eight out of ten. I highly recommend this solution.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Cisco Secure Network Analytics Report and get advice and tips from experienced pros sharing their opinions.
Updated: February 2026
Buyer's Guide
Download our free Cisco Secure Network Analytics Report and get advice and tips from experienced pros sharing their opinions.