Try our new research platform with insights from 80,000+ expert users

Cisco Secure Network Analytics vs Cisco Vulnerability Management (formerly Kenna.VM) comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Network Analytics
Ranking in Cisco Security Portfolio
8th
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
61
Ranking in other categories
Network Monitoring Software (33rd), Network Traffic Analysis (NTA) (5th), Network Detection and Response (NDR) (7th)
Cisco Vulnerability Managem...
Ranking in Cisco Security Portfolio
11th
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
1
Ranking in other categories
Risk-Based Vulnerability Management (17th)
 

Mindshare comparison

As of August 2025, in the Cisco Security Portfolio category, the mindshare of Cisco Secure Network Analytics is 8.9%, down from 15.8% compared to the previous year. The mindshare of Cisco Vulnerability Management (formerly Kenna.VM) is 1.6%, up from 1.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cisco Security Portfolio
 

Featured Reviews

Muhammad Harun-Owr-Roshid - PeerSpot reviewer
Have streamlined network visibility and troubleshooting while seeing benefits from AI integration
In terms of improvements for Cisco Secure Network Analytics, from the implementation point of view, now that AI is in use, some other features need to be upgraded considering AI solutions. Proper management of the database is also important; it should be centralized for easier data collection from a single database. When precise manual analysis is needed, it's sometimes difficult, so having a centralized database will allow network admins to find actual scenarios more effectively, especially since some information may not be visible on the GUI. Cisco should upgrade their hardware part to run the database, because sometimes it cannot handle the load while all features are running in the network. The database management should indeed be centralized because while AI runs behind the systems, central management is essential. For example, in a network with 100 Cisco switches, a few routers, firewalls, and access points, all data generated should be preserved in a central database. This approach simplifies management and analysis for troubleshooting, as GUI interfaces may not always provide visible information. Centralizing the database will allow for better understanding of which information is preserved for each specific device.
AshishPaliwal - PeerSpot reviewer
Offers contextual prioritization and risk-based remediation of vulnerability
An improvement would be some sort of an integration with any GRC suite. There are a lot of GRC suites available, like Archer, MetricStream, Rsam, Protiviti, for example. So how would a solution like this work if my company has already invested thousands or maybe millions in a GRC solution? Do I still need it and how does it fit into an existing SAP environment? There could be interoperability, having more data sources, integrating Splunk, Qualys, FireEye, Rapid7, Carbon Black. I'm sure all that can be done to an extent, with a little more insight and a little more accuracy on the industry numbers and trends. I'd like the solution to offer any sort of assistance in any way with the remediation part, not just identification of vulnerability risk, and that is second.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"StealthWatch lets me see the ports running in and out and the country. It has excellent reporting, telemetry, and artificial intelligence features. With the telemetry, I can set thresholds to detect sudden changes and the alarms go through the PLC parts. I can see all the ports running on that trunk."
"We find that Stealthwatch can detect the unseen."
"The most valuable feature is integration."
"It has definitely helped us improve our mean time to resolution on network issues."
"Cisco Secure Network Analytics has increased the visibility of what is happening in our network, and I think that's the most important reason to use it. We can see what is really happening instead of just looking at numbers from routers or switches."
"The most valuable feature of the solution is that it helps you gain visibility for your application."
"Being able to identify specific date closed across the network is invaluable."
"It is a good application, providing for real-time monitoring of the organization of data. It can basically identify points of peak traffic where possible issues are being caused."
"The risk context of any vulnerability is a valuable feature."
 

Cons

"The expensive nature of the tool is an area of concern where improvements are required."
"I would like to see more expansion in artificial intelligence and machine learning features."
"If there was one improvement I’d suggest it would be that it detect traffic through an intranet. The product requires that traffic flow through a managed network device. The product is designed mostly for enterprise environments and not smaller environments or businesses."
"It hasn't really improved our direct detection rate but it has definitely reduced our incident response time as we wouldn't have been able to detect threats or immediate risks without this solution."
"Complexity on integration is not so straightforward and you really need an expert to help build it out."
"We haven't seen ROI."
"The usability of this solution needs to be improved."
"I would like to see some improvement when it comes to reporting."
"An improvement would be some sort of an integration with any GRC suite."
 

Pricing and Cost Advice

"This is an expensive product. We have quit paying for support because we don't want to have to upgrade it and keep paying for it."
"It is worth the cost."
"The tool is not cheaply priced."
"We pay for support costs on a yearly basis."
"Licensing is done by flows per second, not including outside>in traffic."
"On a yearly basis, licensing is somewhere around $30,000."
"​Licensing is done by flows per second, not including outside (in traffic)."
"The yearly licensing cost is about $50,000."
"I think the pricing is based on the number of endpoints, so it's more subscription-based."
report
Use our free recommendation engine to learn which Cisco Security Portfolio solutions are best for your needs.
865,295 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
24%
Government
10%
Financial Services Firm
9%
Manufacturing Company
9%
Computer Software Company
20%
Financial Services Firm
12%
Retailer
11%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Cisco Stealthwatch?
The most valuable feature of Cisco Secure Network Analytics is the Threat Intelligence integration.
What is your experience regarding pricing and costs for Cisco Stealthwatch?
Regarding cost, for the Bangladesh context, Cisco Secure Network Analytics is a little bit high-priced because we are a developing country, making it tough to manage affordable solutions. However, ...
What needs improvement with Cisco Stealthwatch?
In terms of improvements for Cisco Secure Network Analytics, from the implementation point of view, now that AI is in use, some other features need to be upgraded considering AI solutions. Proper m...
Ask a question
Earn 20 points
 

Also Known As

Cisco Stealthwatch, Cisco Stealthwatch Enterprise, Lancope StealthWatch
Kenna.VM, Kenna Security, Kenna, Kenna Security Platform
 

Overview

 

Sample Customers

Edge Web Hosting, Telenor Norway, Ivy Tech Community College of Indiana, Webster Financial Corporation, Westinghouse Electric, VMware, TIAA-CREF
TransUnion
Find out what your peers are saying about Cisco and others in Cisco Security Portfolio. Updated: July 2025.
865,295 professionals have used our research since 2012.