Try our new research platform with insights from 80,000+ expert users

Sangfor Cyber Command vs Vectra AI comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Sangfor Cyber Command
Ranking in Network Detection and Response (NDR)
16th
Average Rating
8.6
Reviews Sentiment
7.1
Number of Reviews
2
Ranking in other categories
No ranking in other categories
Vectra AI
Ranking in Network Detection and Response (NDR)
2nd
Average Rating
8.6
Reviews Sentiment
7.1
Number of Reviews
45
Ranking in other categories
Intrusion Detection and Prevention Software (IDPS) (5th), Extended Detection and Response (XDR) (16th), Identity Threat Detection and Response (ITDR) (9th), AI-Powered Cybersecurity Platforms (6th)
 

Mindshare comparison

As of October 2025, in the Network Detection and Response (NDR) category, the mindshare of Sangfor Cyber Command is 1.1%, up from 1.0% compared to the previous year. The mindshare of Vectra AI is 15.6%, down from 17.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Network Detection and Response (NDR) Market Share Distribution
ProductMarket Share (%)
Vectra AI15.6%
Sangfor Cyber Command1.1%
Other83.3%
Network Detection and Response (NDR)
 

Featured Reviews

Zaid Farooqui - PeerSpot reviewer
Helped our organization by providing a comprehensive picture of our cyber posture in terms of threat intelligence
The most valuable feature is the capability to correlate all the vulnerabilities or threats detected from different sources. It does a very good job in correlating and identifying threat actors. Its integration with other products such as HCI, Firewall, and VDI solution for native control and detection also adds significant value.
Mohammad Alkurdi - PeerSpot reviewer
Innovative detection features enhance monitoring
The advantages of the integration are not entirely out-of-the-box. You have to do it manually. When I'm doing tier response, an out-of-the-box solution is not available. You need to have a Linux server, and from the Linux server, you must perform AI tasks, and there is a lot to be handled in the back end. This is a major consideration about them. The recall feature, if it can be placed in some areas instead of the cloud, and charged for, would be better. Recall the storage where you watch all the traffic, and you can recall it and try to analyze it in the back end. It’s cloud-based. If they offer it on-prem, it would be better. I think they have a solution, but I have never tested it, to be honest with you.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The tool is a good product in the NDR market. Its valuable features are ease of management and breach of response features. It is an easy-to-learn solution."
"The most valuable feature is the capability to correlate all the vulnerabilities or threats detected from different sources."
"Sangfor Cyber Command has helped our organization by providing a comprehensive picture of our cyber posture in terms of threat intelligence."
"Vectra AI helped our team be more productive and save time. We have less work thanks to it."
"The dashboard gives me a scoring system that allows me to prioritize things that I should look at. I may not necessarily care so much about one event, whereas if I have a single botnet detection or a brute force attack, I really want to get on top of those."
"The most valuable feature for Cognito Detect, the main solution, is that external IDS's create a lot of alerts. When I say a lot of alerts I really mean a lot of alerts. Vectra, on the other hand, contextualizes everything, reducing the number of alerts and pinpointing only the things of interest. This is a key feature for me. Because of this, a non-trained analyst can use it almost right away."
"The key feature for me for Detect for Office 365 is that it can also concentrate all the information and detection at one point, the same as the network solution does. This is the key feature for me because, while accessing data from Office 365 is possible using Microsoft interfaces, they are not really user-friendly and are quite confusing to use. But Detect for Office 365 is aggregating all the info, and it's only the interesting stuff."
"The biggest feature for us, because we are heavy Microsoft users, is its integration with Office 365. On top of Vectra AI, we use all of the Microsoft security platforms, such as Defender ATP and Sentinel. Having full integration and a central platform to look at all of the threats that are coming through from the different platforms is a huge benefit for us."
"It provides various dashboards that facilitate the identification of connections and can detect data exfiltration, meaning data sent from your environment to another."
"I like the way that Vectra AI focuses on the internal network. Nowadays, most of the attackers are already inside, and they can be inside for many years before they start attacking. With normal monitoring, it's quite difficult to find them."
"We particularly like the user experience around the dashboard, which we find to be much more straightforward than the dashboard of some of the competitive products... Vectra is a really easy system to understand and use to prioritize where we need to focus our security resources."
 

Cons

"Technical support could be improved, and I rate them a seven. The support team has fewer cybersecurity resources capable of managing Cyber Command compared to other solutions."
"The solution could improve by incorporating email security."
"The product needs to improve its dashboard. Integration with existing systems has been challenging. When comparing it with Trend Micro, which offers an all-in-one NDR solution, the tool's integration process can be difficult."
"The rules for threats are not always precise and Vectra AI should improve this."
"One of the things that we are missing a bit is the capability to add our own rules to it. At the moment, the tech engine does its thing, but we have some cool ideas to make additional rules. There should be an option in the platform to add custom rules, or there should be some kind of user group where we can suggest them for the roadmap and see if they get evaluated and get transparent communication on whether they will be implemented in the product or not."
"The UI/UX and detection could be improved. More detections of specific security events could be useful. We've had a few incidents that were not detected by Vectra. The teams are working on it right now, but more detection is always better."
"We are using SMB 3.0, which is an encrypted protocol. When we get some alerts or something, we cannot go deep into the protocol to see what's wrong because it's encrypted. We need to decrypt the protocol in another way, which is quite difficult. We might go back to SMB 2.0 just for this reason, but that's not a good solution."
"They use a proprietary logging format that is probably 90% similar to Bro Logs. Their biggest area of improvement is finishing out the remaining 10%. That 10% might not be beneficial to their ML engine, but that's fine. The industry standard is Zeek Logs or Bro Logs, or Bro or Zeek, depending on how old you are. While they have 90% of those fields, they're still missing some fields. In very rare instances, some community rules do not have the fields that they need, and we had to modify community rules for our logs. So, their biggest area of improvement would be to just finish their matching of the Zeek standard."
"You are always limited with visibility on the host due to the fact that it is a network based tool. It gives you visibility on certain elements of the attack path, but it doesn't necessarily give you visibility on everything. Specifically, the initial intrusion side of things that doesn't necessarily see the initial compromise. It doesn't see stuff that goes on the host, such as where scripts are run. Even though you are seeing traffic, it doesn't necessarily see the malicious payload. Therefore, it's very difficult for it to identify these type of host-driven complex attacks."
"There could be an option where Vectra manages the solution remotely, and when there is an attack, there could be a notification center to give us information about the attack."
"Integration with other security components needs improvement. It should have true integration as opposed to just being a separate pane of glass."
 

Pricing and Cost Advice

Information not available
"Their licensing model is antiquated. I'm not a fan of their licensing model. We have to pay for licensing based on four different things. You have to pay based on the number of unique IPs, the number of logs that we send through Recall and Stream, and the size of our environment. They need to simplify their licensing down to just one thing. It should be based on the amount of data, the number of devices, or something else, but there should be just one thing for everything. That's what they need to base their licensing on. Cost-wise, they're not cheap. They were definitely the most expensive option, but you get what you pay for. They're not the cheapest option."
"Vectra AI is not a cheap solution."
"The licensing is on an annual basis."
"The upfront pricing model that we have would have been more beneficial if it had been a recurring license fee, but that wasn't a massive issue for us. It's fairly priced."
"The solution's pricing was 50 percent lower than the other vendors shortlisted."
"The pricing is very good. It's less expensive than many of the tools out there."
"We are running at about 90,000 pounds per year. The solution is a licensed cost. The hardware that they gave us was pretty much next to nothing. It is the license that we're paying for."
"It's relatively on the pricier side, but when compared to other solutions. It's not the most budget-friendly option, but it can be considered somewhat more cost-effective in comparison to other alternatives."
report
Use our free recommendation engine to learn which Network Detection and Response (NDR) solutions are best for your needs.
868,787 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
15%
Hospitality Company
13%
Computer Software Company
10%
Financial Services Firm
8%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
8%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise10
Large Enterprise27
 

Questions from the Community

What do you like most about Sangfor Cyber Command?
The tool is a good product in the NDR market. Its valuable features are ease of management and breach of response features. It is an easy-to-learn solution.
What needs improvement with Sangfor Cyber Command?
The solution could improve by incorporating email security. Additionally, there is room for improvement in the technical support capability side, as there are relatively fewer cybersecurity profess...
What is your primary use case for Sangfor Cyber Command?
The primary use case for Sangfor Cyber Command is threat hunting. It correlates vulnerabilities and threats detected from various sources including user side, server side, and Internet-facing and i...
What is the biggest difference between Corelight and Vectra AI?
The two platforms take a fundamentally different approach to NDR. Corelight is limited to use cases that require the eventual forwarding of events and parsed data logs to a security team’s SIEM or ...
What do you like most about Vectra AI?
The solution is currently used as a central threat detection and response system.
What is your experience regarding pricing and costs for Vectra AI?
It is very acceptable when you compare it with Darktrace, for example.
 

Also Known As

No data available
Vectra Networks, Vectra AI NDR
 

Overview

 

Sample Customers

Information Not Available
Tribune Media Group, Barry University, Aruba Networks, Good Technology, Riverbed, Santa Clara University, Securities Exchange, Tri-State Generation and Transmission Association
Find out what your peers are saying about Sangfor Cyber Command vs. Vectra AI and other solutions. Updated: September 2025.
868,787 professionals have used our research since 2012.