Try our new research platform with insights from 80,000+ expert users

Darktrace vs Threat Stack Cloud Security Platform [EOL] comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on May 4, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.3
Users of Darktrace experience high returns and savings, enhanced system visibility, threat detection, and improved cybersecurity cost-effectiveness.
Sentiment score
7.3
Threat Stack Cloud Security boosted compliance and revenue, reduced staffing needs, enhanced security, and expanded infrastructure dramatically.
Using this solution provides financial benefits by securing from server attacks, which offers indirect savings.
 

Customer Service

Sentiment score
7.7
Darktrace's customer support is highly rated for responsiveness and proficiency, with minor improvements suggested for complex deployments and specific regions.
Sentiment score
7.4
Threat Stack Cloud Security Platform's support is praised for responsiveness, precise solutions, and effective communication with technical representatives.
The challenge lies in waiting for a response after logging a ticket.
Darktrace provides excellent technical support with a monthly meeting to review platform incidents, ensuring the system functions as expected.
Any queries I have logged are responded to efficiently.
 

Scalability Issues

Sentiment score
7.6
Darktrace is highly scalable, adaptable to enterprise environments, and supports both cloud-based and on-premise expansion with careful management.
Sentiment score
8.2
Threat Stack Cloud Security Platform is scalable, easy to deploy, and efficient across AWS accounts, with minor configuration concerns.
Since it's cloud-based, it expands easily.
Darktrace has high scalability, and I would rate it a nine out of ten.
For scalability, I would rate it an eight out of ten because they integrate with many technologies.
 

Stability Issues

Sentiment score
8.5
Darktrace is highly stable, reliable, with 99.9% uptime, efficient performance, and excellent monitoring, rated favorably by users.
Sentiment score
7.5
Threat Stack Cloud Security Platform [EOL] is stable and efficient, with minor GUI and agent issues for some users.
The stability of Darktrace is excellent, rated ten out of ten.
The appliance itself has never let me down.
For stability, I would rate Darktrace an eight out of ten.
 

Room For Improvement

Darktrace needs better integration, interface, pricing, reporting, user-friendliness, automation, documentation, and collaboration to reduce false positives and improve protection.
Threat Stack Cloud Security Platform needs UI improvements, better API alignment, and enhanced integrations, especially for serverless and container environments.
They say they can integrate with most firewalls, but when we did an integration with Meraki MX firewalls, that integration didn't work and still doesn't work to this day.
There is no dedicated salesperson in Egypt, and having one would help to improve focus on this market.
The intelligence section and the incident view should be seamlessly connected in one view to avoid jumping between pages.
 

Setup Cost

Enterprise buyers have mixed pricing perceptions of Darktrace, with costs up to $350,000 annually and flexible payment options.
Threat Stack Cloud Security Platform offers value with transparent pricing, ranging $15-$20 monthly, seen as competitively priced by users.
The pricing is costly in USD, and they charge based on device counts.
The product is considered expensive compared to others.
The licensing cost is approximately eight dollars a year.
 

Valuable Features

Darktrace provides AI-driven threat detection and autonomous response, offering real-time monitoring, high visibility, and minimal human intervention.
Threat Stack Cloud Security platform is esteemed for its configurability, integration, monitoring capabilities, and effective alert management.
If more than 2.5 gigabytes of data have been pulled in a few minutes, it engages by blocking for one-hour intervals, alerts, and extends the block until it goes into full isolation if the violation continues.
I do not need to manually process incidents as Darktrace provides an incident summary, potential detection paths, and other details, all exportable with just a click.
If I am in a data center where I don't have layer two, it becomes an issue because the autonomous response is reliant on sending spoofed TCP resets to my core switch to block traffic, which is a major issue.
 

Categories and Ranking

Darktrace
Average Rating
8.2
Reviews Sentiment
7.2
Number of Reviews
80
Ranking in other categories
Email Security (9th), Intrusion Detection and Prevention Software (IDPS) (1st), Network Traffic Analysis (NTA) (1st), Network Detection and Response (NDR) (1st), Extended Detection and Response (XDR) (6th), AI-Powered Chatbots (2nd), Cloud Security Posture Management (CSPM) (15th), Cloud-Native Application Protection Platforms (CNAPP) (11th), Attack Surface Management (ASM) (3rd), AI-Powered Cybersecurity Platforms (2nd)
Threat Stack Cloud Security...
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
8
Ranking in other categories
No ranking in other categories
 

Q&A Highlights

CW
Feb 11, 2020
 

Featured Reviews

Malebo Lethoba Group - PeerSpot reviewer
Have found the AI analyst and detection functions highly valuable for network operations while managing complexity in initial setup
The functions I find most valuable in Darktrace ( /products/darktrace-reviews ) are the AI analyst as well as the detection.The autonomous response capabilities of Darktrace are not crucial for me because it doesn't work in a network where there are no core switches. In a modern network, the autonomous response doesn't work, especially when sitting in a shared data center.If I'm running a traditional network where I am not in a shared data center with a layer two dedicated for my resources, then it can work for me. However, if I am in a data center where I don't have layer two, it becomes an issue because the autonomous response is reliant on sending spoofed TCP resets to my core switch to block traffic, which is a major issue.
SC
SecOps program for us, as a smaller company, is amazing; they know what to look for
They could give a few more insights into security groups and recommendations on how to be more effective. That's getting more into the AWS environment, specifically. I'm not sure if that's Threat Stack's plan or not, but I would like them to help us be efficient about how we're setting up security groups. They could recommend separation of VPCs and the like - really dig into our architecture. I haven't seen a whole lot of that and I think that's something that, right off the bat, could have made us smarter. Even as part of the SecOps Program, that could be helpful; a quick analysis. They're analyzing our whole infrastructure and saying, "You have one VPC and that doesn't make a lot of sense, that should be multiple VPCs and here's why." The architecture of the servers in whatever cloud-hosting provider you're on could be helpful. Other than that, they should continue to expand on their notifications and on what's a vulnerability. They do a great job of that and we want them to continue to do that. It would be cool, since the agent is already deployed and they know about the server, they know the IP address, and they know what vulnerability is there, for them to test the vulnerability and see if they can actually exploit it. Or, once we patch it, they could double-check that it can't be. I don't know how hard that would be to build. Thinking on it off the top off my head, it could be a little challenging but it could also be highly interesting. It would also be great if we could test a couple of other features like hammering a server with 100 login attempts and see what happens. Real test scenarios could be really helpful. That is probably more something close to what they do with the SOC 2 audit or the report. But more visualization of that, being able to test things out on our infrastructure to make sure we can or can't hit this box could be interesting.
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
851,604 professionals have used our research since 2012.
 

Answers from the Community

CW
Feb 11, 2020
Feb 11, 2020
I that feel there are two old problems still there in the market: 1-Vendors don't talk to each other. 2-Whoever is focusing on endpoint is missing the network and human side and the opposite is also true. I love, for example, what Darktrace is doing in the network side and the playback option to know what happened in my network during a long holiday, for example, things will never be caught by...
2 out of 9 answers
reviewer973458 - PeerSpot reviewer
Aug 26, 2019
Raffael Marty, Vice President, Forcepoint Research and Intelligence, said: "There is no artificial intelligence in the field of information security, and it is unlikely to be developed in 2019." Most of unsupervised machine learning-based network anomaly detection solution does not provide why the anomaly has been aroused and whether the anomaly is malicious or not. Most of such solution's pricing model is based on number of endpoints but I prefer to have flat fee subscription-based.
IT
Aug 26, 2019
I that feel there are two old problems still there in the market: 1-Vendors don't talk to each other. 2-Whoever is focusing on endpoint is missing the network and human side and the opposite is also true. I love, for example, what Darktrace is doing in the network side and the playback option to know what happened in my network during a long holiday, for example, things will never be caught by a second-generation AV but I need to have a solid 2nd gen. AV besides the total high cost of Darktrace which by the way is worth it for IT pros but not for business owners. We need to have something like virus total but for risks and threats beyond viruses where all vendors work on this and all endpoint customers with different vendors connect to it to be secured.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Manufacturing Company
8%
Financial Services Firm
8%
Government
7%
Computer Software Company
22%
Real Estate/Law Firm
12%
Financial Services Firm
8%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Crowdstrike Falcon compare with Darktrace?
Both of these products perform similarly and have many outstanding attributes. CrowdStrike Falcon offers an amazing user interface that makes setup easy and seamless. CrowdStrike Falcon offers a cl...
Which is better - SentinelOne or Darktrace?
Which solution is better depends on which is more suitable specifically for your company. Darktrace, for example, is meant for smaller to medium-sized businesses. It is also a good option for organ...
What do you like most about Darktrace?
A very useful feature in Darktrace for real-time threat analysis is the packet inspection that analyzes the packet traffic in real time.
Ask a question
Earn 20 points
 

Also Known As

No data available
Threat Stack, CSP,
 

Overview

 

Sample Customers

Irwin Mitchell, Open Energi, Wellcome Trust, FirstGroup plc, Virgin Trains, Drax, QUI! Group, DNK, CreaCard, Macrosynergy, Sisley, William Hill plc, Toyota Canada, Royal British Legion, Vitol, Allianz, KKR, AIRBUS, dpd, Billabong, Mclaren Group.
StatusPage.io, Walkbase, Spanning, DNAnexus, Jobcase, Nextcapital, Smartling, Veracode, 6sense
Find out what your peers are saying about Darktrace, Check Point Software Technologies, Vectra AI and others in Intrusion Detection and Prevention Software (IDPS). Updated: May 2025.
851,604 professionals have used our research since 2012.