No more typing reviews! Try our Samantha, our new voice AI agent.

Cisco Secure Network Analytics vs Cisco Vulnerability Management (formerly Kenna.VM) comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Network Analytics
Ranking in Cisco Security Portfolio
9th
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
61
Ranking in other categories
Network Monitoring Software (36th), Network Traffic Analysis (NTA) (5th), Network Detection and Response (NDR) (8th)
Cisco Vulnerability Managem...
Ranking in Cisco Security Portfolio
11th
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
1
Ranking in other categories
Risk-Based Vulnerability Management (22nd)
 

Mindshare comparison

As of May 2026, in the Cisco Security Portfolio category, the mindshare of Cisco Secure Network Analytics is 9.6%, down from 10.2% compared to the previous year. The mindshare of Cisco Vulnerability Management (formerly Kenna.VM) is 2.5%, up from 1.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cisco Security Portfolio Mindshare Distribution
ProductMindshare (%)
Cisco Secure Network Analytics9.6%
Cisco Vulnerability Management (formerly Kenna.VM)2.5%
Other87.9%
Cisco Security Portfolio
 

Featured Reviews

Muhammad Harun-Owr-Roshid - PeerSpot reviewer
CEO at BRIGHT-i SYSTEMS LIMITED
Have streamlined network visibility and troubleshooting while seeing benefits from AI integration
In terms of improvements for Cisco Secure Network Analytics, from the implementation point of view, now that AI is in use, some other features need to be upgraded considering AI solutions. Proper management of the database is also important; it should be centralized for easier data collection from a single database. When precise manual analysis is needed, it's sometimes difficult, so having a centralized database will allow network admins to find actual scenarios more effectively, especially since some information may not be visible on the GUI. Cisco should upgrade their hardware part to run the database, because sometimes it cannot handle the load while all features are running in the network. The database management should indeed be centralized because while AI runs behind the systems, central management is essential. For example, in a network with 100 Cisco switches, a few routers, firewalls, and access points, all data generated should be preserved in a central database. This approach simplifies management and analysis for troubleshooting, as GUI interfaces may not always provide visible information. Centralizing the database will allow for better understanding of which information is preserved for each specific device.
AshishPaliwal - PeerSpot reviewer
Self-employed at Self-employed
Offers contextual prioritization and risk-based remediation of vulnerability
An improvement would be some sort of an integration with any GRC suite. There are a lot of GRC suites available, like Archer, MetricStream, Rsam, Protiviti, for example. So how would a solution like this work if my company has already invested thousands or maybe millions in a GRC solution? Do I still need it and how does it fit into an existing SAP environment? There could be interoperability, having more data sources, integrating Splunk, Qualys, FireEye, Rapid7, Carbon Black. I'm sure all that can be done to an extent, with a little more insight and a little more accuracy on the industry numbers and trends. I'd like the solution to offer any sort of assistance in any way with the remediation part, not just identification of vulnerability risk, and that is second.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"There is nothing like it."
"It provides good visibility to the customers, and helps them to take action to remediate and mitigate the issues that are highlighted on the dashboard."
"The most valuable feature of this solution is data hoarding because it catches threats on a frequent basis that we had no idea of."
"I value the feature which enables me to detect devices talking to suspect IPs."
"It works efficiently for encrypted traffic analysis."
"I believe this solution has reduced our incident response time."
"Cisco Stealthwatch has reduced the amount of time to detect an immediate threat."
"Being able to graph and show data to management has improved our organization. We can show the data to the higher-ups. It shows them that it's picking up on these anomalies and doing its job."
"The risk context of any vulnerability is a valuable feature; that is what it is used for and then data from different sources can be fed into it, and they have good dashboards, risk meters, and virtualization."
"The risk context of any vulnerability is a valuable feature."
 

Cons

"I don't really think we really save time while using this solution."
"We are continuing down the road of ACI and ISE with Cisco, so we would like to see the continuation of Stealthwatch integrating into ISE for exchange of information, and also, more into the ACI environment too."
"One thing I would like to see improved is if it could automatically be tied through ISE, instead of you having to manually get notifications and disable it yourself."
"We haven't seen ROI."
"One of the things which bugs me about Lancope is the licensing."
"The overall visibility into the actual device itself would be helpful. I don't just want support-specific data, but also to be able to see information such as CPU and other internal components or usage of the devices."
"Cisco Stealthwatch can improve by having bundled packages for popular add-ons. It would be a lot easier for people implementing it, have let's say a better way to use the product."
"I would like to see it better organized when I'm looking at it."
"An improvement would be some sort of an integration with any GRC suite."
"An improvement would be some sort of an integration with any GRC suite."
 

Pricing and Cost Advice

"We pay for support costs on a yearly basis."
"Today, we are part of the big Cisco ELA, and it is a la carte. We can get orders for whatever we want. At the end of the day, we have to pay for it in one big expense, but that is fine. We are okay with that."
"Licensing is on a yearly basis."
"There are additional licenses needed for the number of so-called network flows. It's hard to plan the number of flows you need in the network, this is a problem. The price of the Cisco Stealthwatch is relatively inexpensive"
"​Licensing is done by flows per second, not including outside (in traffic)."
"Licensing is done by flows per second, not including outside>in traffic."
"It has a subscription model. There is yearly support, and there is also three-year support. It depends on what the customers want."
"It is worth the cost."
"I think the pricing is based on the number of endpoints, so it's more subscription-based."
report
Use our free recommendation engine to learn which Cisco Security Portfolio solutions are best for your needs.
893,244 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
11%
Financial Services Firm
10%
Government
9%
Computer Software Company
9%
Retailer
16%
Computer Software Company
13%
Financial Services Firm
11%
Manufacturing Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business11
Midsize Enterprise7
Large Enterprise52
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Cisco Stealthwatch?
Regarding cost, for the Bangladesh context, Cisco Secure Network Analytics is a little bit high-priced because we are a developing country, making it tough to manage affordable solutions. However, ...
What needs improvement with Cisco Stealthwatch?
In terms of improvements for Cisco Secure Network Analytics, from the implementation point of view, now that AI is in use, some other features need to be upgraded considering AI solutions. Proper m...
What is your primary use case for Cisco Stealthwatch?
Our customers mainly use Cisco Secure Network Analytics to get whole network visibility and easy troubleshooting to find actual problems and also to mitigate loopholes or findings immediately to pr...
Ask a question
Earn 20 points
 

Also Known As

Cisco Stealthwatch, Cisco Stealthwatch Enterprise, Lancope StealthWatch
Kenna.VM, Kenna Security, Kenna, Kenna Security Platform
 

Overview

 

Sample Customers

Edge Web Hosting, Telenor Norway, Ivy Tech Community College of Indiana, Webster Financial Corporation, Westinghouse Electric, VMware, TIAA-CREF
TransUnion
Find out what your peers are saying about Cisco and others in Cisco Security Portfolio. Updated: April 2026.
893,244 professionals have used our research since 2012.