Try our new research platform with insights from 80,000+ expert users

Cisco Secure Network Analytics vs Nmap comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 10, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Network Analytics
Ranking in Network Monitoring Software
30th
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
60
Ranking in other categories
Network Traffic Analysis (NTA) (4th), Network Detection and Response (NDR) (8th), Cisco Security Portfolio (7th)
Nmap
Ranking in Network Monitoring Software
12th
Average Rating
8.6
Reviews Sentiment
7.7
Number of Reviews
22
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2025, in the Network Monitoring Software category, the mindshare of Cisco Secure Network Analytics is 1.2%, down from 1.6% compared to the previous year. The mindshare of Nmap is 0.5%, down from 0.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Network Monitoring Software
 

Featured Reviews

Sudhakar T - PeerSpot reviewer
Strong network security analytics with excellent encrypted traffic analysis features
Improvements are needed on the application layer for complete security analysis. The solution should have the ability to analyze security events not only at the network layer but also at the application and OS layers. There's a need for a more comprehensive licensing model where all necessary licenses are included by default.
Harish (Kumar) - PeerSpot reviewer
Shows useful info on every network endpoint, but has slow scanning speed and no GUI
One of the drawbacks of the standard Nmap utility is that it does not come with a graphical user interface, unlike a number of other open-source alternatives such as Zenmap. A second drawback is that the network scanning process can be very slow. I believe that the developers should improve the scanning speed, or perhaps offer an extra option for quicker scanning. Lastly, even though I can scan the network, the utility doesn't provide any way to fix the network issues that may be discovered. That said, I understand that the tool is not intended for fixing anything, but rather for monitoring and discovery only.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The ability to send data flow from other places and have them all in one place is very valuable for us."
"Most of the engineers I've worked with have been really good. Very knowledgeable and easy to work with."
"The artifacts available in the tool provide better information for analyzing network traffic. It enables a holistic view of network traffic and general packet analysis. It's easy to identify anomalies without the use of signatures. The way in which we implemented Stealthwatch Cloud has enabled my team to analyze traffic behind proxies."
"Most valuable features are the network maps and server and network response time."
"I believe this solution has reduced our incident response time."
"The most valuable feature of this solution is data hoarding because it catches threats on a frequent basis that we had no idea of."
"It is a good application, providing for real-time monitoring of the organization of data. It can basically identify points of peak traffic where possible issues are being caused."
"Cisco Stealthwatch provides the solutions analytics and threat detection capabilities that I am looking for. It has also improved the network visibility of our organization."
"It enables us to delve deeper and identify the services and open ports on the system and visualize this information on a dashboard automatically."
"The real-time reporting feature of Nmap is particularly valuable. It generates detailed reports on the source and destination IP addresses, the protocols used, and the types of traffic."
"From a functionality standpoint, it's robust and straightforward to comprehend."
"The scanning procedure includes UDP ports which sets it apart from competitors."
"The tool's most valuable feature is its scripts. These scripts prove beneficial when security features may obscure or block connections. Nmap helps identify vulnerabilities across different systems, including web servers and various server types."
"The most important function, according to me, is the capability to use some arguments in the scanning. The solution's capability to go figure and do a deep dive, discovering information on specific aspects."
"The most valuable feature of the solution for security audits stems from the fact that it serves as a powerful tool with the ability to scan a large number of ports."
"Nmap is mostly helpful during compliance checks. We run the scanner to see how many devices are on our network and find vulnerabilities in those that aren't compliant. We also use it monthly to scan our network and identify devices that aren't connected properly. This helps us detect any issues related to the operating systems of these devices."
 

Cons

"I think the interface is a little lacking. The interface seems like it just needs to be modernized. It's been the same interface now, ever since I've seen it probably four years ago."
"The initial setup was complex."
"It would be better to let people know, up front, that is doesn't give you nice, clear information, as seen in the demos, without Cisco ISE installed."
"Initially, I felt Cisco Secure Network Analytics lacked integration with Splunk."
"The expensive nature of the tool is an area of concern where improvements are required."
"The visualization could be improved, the GUI is not the best."
"The overall visibility into the actual device itself would be helpful. I don't just want support-specific data, but also to be able to see information such as CPU and other internal components or usage of the devices."
"Stealthwatch is still maturing in AI. It uses artificial intelligence for predictions, but AI still needs to mature. It is in a phase where you get 95% correct detection. As its AI engine learns more, it will become more accurate. This is applicable to all the devices that are using AI because they support both supervised and unsupervised machine learning. The accuracy in the case of supervised machine learning is dependent on the data you feed into the box. The accuracy in the case of unsupervised machine learning is dependent on the algorithm. The algorithm matures depending on retrospective learning, and this is how it is able to detect zero-day attacks."
"There are concerns with the stability of the product, making it an area where improvements are required."
"It takes a bit of time to get familiar with the solution and its options."
"The solution is not that easy for a beginner to learn."
"The challenge often lies in finding suitable courses and professional resources."
"The price is high and could be cheaper."
"The solution should increase the number of features under a free license."
"Customization is not very user-friendly in Nmap."
"Since I started using Nmap, it has been completely based on the command prompt and I think it would help other users if they implemented a decent GUI as well."
 

Pricing and Cost Advice

"Our fees are approximately $3,000 USD."
"The solution is expensive. It costs several hundred thousand dollars per year (depending on how many flows you are collecting)."
"NetFlow is very expensive."
"Pricing is much higher compared to other solutions."
"Today, we are part of the big Cisco ELA, and it is a la carte. We can get orders for whatever we want. At the end of the day, we have to pay for it in one big expense, but that is fine. We are okay with that."
"It has a subscription model. There is yearly support, and there is also three-year support. It depends on what the customers want."
"This is an expensive product. We have quit paying for support because we don't want to have to upgrade it and keep paying for it."
"There are additional licenses needed for the number of so-called network flows. It's hard to plan the number of flows you need in the network, this is a problem. The price of the Cisco Stealthwatch is relatively inexpensive"
"The solution is open source so it is free."
"The product's pricing is fine. The licensing options for Nmap include perpetual licenses and volume-based licenses. For perpetual licenses, once you purchase it, there's no need to invest in renewals. And for volume-based licenses, enterprise companies can use it multiple times based on the number of users or devices they need to scan. It's a pay-as-you-go model, similar to how you pay for what you use."
"It's an open-source solution. Commerically, only the support service is available."
"The solution is free of cost, but there are specific services that we have to buy."
"I am using the standard free version of Nmap."
"It's an open-source product, and I haven't seen any premiums. Options are available for those who purchase, but for my use case, everything I need is available in the community and forums."
"Nmap is an open-source product. You don't need a license to install it."
"Nmap is open source software, which suits us well because we are a manufacturing company and not an IT company, for example. If we were an IT company, we would probably need to pay for extra support or instead go for another software solution. But as it is, we don't have any need for high-end troubleshooting tools."
report
Use our free recommendation engine to learn which Network Monitoring Software solutions are best for your needs.
851,604 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
27%
Financial Services Firm
11%
Government
9%
Manufacturing Company
7%
Retailer
14%
Computer Software Company
12%
Educational Organization
8%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Cisco Stealthwatch?
The most valuable feature of Cisco Secure Network Analytics is the Threat Intelligence integration.
What is your experience regarding pricing and costs for Cisco Stealthwatch?
The organization experienced challenges with licensing as Cisco has multiple licensing factors, and there are concerns about the price. Cisco solutions are considered to be very expensive.
What needs improvement with Cisco Stealthwatch?
Improvements are needed on the application layer for complete security analysis. The solution should have the ability to analyze security events not only at the network layer but also at the applic...
What do you like most about Nmap?
Nmap is mostly helpful during compliance checks. We run the scanner to see how many devices are on our network and find vulnerabilities in those that aren't compliant. We also use it monthly to sca...
What is your primary use case for Nmap?
Nmap is used for network scanning to map the network, identify devices, and assess their status. It helps determine open ports and services running on a particular endpoint or server within an ente...
 

Also Known As

Cisco Stealthwatch, Cisco Stealthwatch Enterprise, Lancope StealthWatch
No data available
 

Overview

 

Sample Customers

Edge Web Hosting, Telenor Norway, Ivy Tech Community College of Indiana, Webster Financial Corporation, Westinghouse Electric, VMware, TIAA-CREF
Lockheed Martin, Eastern Bank Boston, Perspecta, Harris Corporation, Discovery Communication
Find out what your peers are saying about Cisco Secure Network Analytics vs. Nmap and other solutions. Updated: April 2025.
851,604 professionals have used our research since 2012.