It is our all-in-one platform for logs and packets for our network and for EDR.
Security Consultant at Global Solutions
Great visualizations, stable, and easy to use and deploy
Pros and Cons
- "It is very easy to use, and its usability is great. The use cases are also very easy. The visualizations of the use cases are magnificent. You cannot find this in any other solution. From my point of view, it is great."
- "Its price could be improved. It is an expensive product. Its training is also too expensive. It would be great if they can have a better pricing scheme for the training."
What is our primary use case?
What is most valuable?
It is very easy to use, and its usability is great. The use cases are also very easy.
The visualizations of the use cases are magnificent. You cannot find this in any other solution. From my point of view, it is great.
What needs improvement?
Its price could be improved. It is an expensive product. Its training is also too expensive. It would be great if they can have a better pricing scheme for the training.
For how long have I used the solution?
I have been using this solution for about two or three years.
Buyer's Guide
NetWitness NDR
June 2025

Learn what your peers think about NetWitness NDR. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,168 professionals have used our research since 2012.
What do I think about the stability of the solution?
It is very stable.
What do I think about the scalability of the solution?
It is not meant for small businesses. It is for medium to very large enterprises.
How are customer service and support?
They have very good staff in tech support.
How was the initial setup?
Its installation is easy.
What about the implementation team?
I did it myself.
What's my experience with pricing, setup cost, and licensing?
It is an expensive product.
What other advice do I have?
I would rate RSA NetWitness Network a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Senior Cybersecurity Consultant at CIA Botswana
Good performance and reporting, and can discover unknown malware using signatureless detection methods
Pros and Cons
- "This solution allows us to locate the malware in real-time."
- "I would like to see Security Orchestration and Response Automation (SOAR) integration."
What is our primary use case?
We use this solution to detect indicators of compromise, where incidents that occur are analyzed and given risk scores. For example, if the endpoint is of high risk then it will be indicated in red. By contrast, if it's of low risk then it will be indicated in green. The scoring criteria are what we call the Indicators of Compromise.
The overall goal is to detect malware that is affecting the endpoints and then provide a response. It is often used by banks and telecom companies.
What is most valuable?
The incident response is very good.
When you are searching for malware, you can easily decrease the endpoints to narrow the search and find it. Examples of endpoints can be servers or laptops, each with different operating systems. This solution allows us to locate the malware in real-time.
I like the performance. It can detect signatureless malware, which many perimeter control and antivirus solutions cannot do. It is helpful for discovering unknown malware and it is so lightweight that you don't even notice that it is installed in your environment. It doesn't load the network and it uses less bandwidth than some other products.
The reporting is perfect and I haven't seen any problems with it.
RSA can easily integrate with third-party applications like Rapid7. All of the documentation for integration with other platforms and other vendors is available. The API makes integration even easier.
What needs improvement?
I would like to see Security Orchestration and Response Automation (SOAR) integration. This way, if there is an endpoint that has been compromised, you don't have to go about repairing or blacklisting it manually. Ideally, the system can have its own intelligence so that it can perform automated tasks without human intervention.
One of the drawbacks of using this product is that when you deploy, you have to create MSI files. These files have to be created for different operating systems, which means that you have to be conscious of which ones exist in your environment. For example, if you have Linux, MacBooks, and Windows machines, then you have to have MSI files created for each of them. Ideally, a single MSI file would be created to support deployment on any of the supported operating systems.
For how long have I used the solution?
I have been working with RSA for more than four years.
What do I think about the stability of the solution?
This product is very stable. It gives you real-time data if there's an endpoint being compromised. It is not a heavy platform.
What do I think about the scalability of the solution?
NetWitness Endpoint is very scalable.
How are customer service and technical support?
The technical support from RSA is 100%. They are available 24/7 and I am very satisfied with them.
How was the initial setup?
The initial setup is straightforward.
What about the implementation team?
I was working with another technical consultant and the two of us made up the team that implemented this solution. The last project that I was working on was larger in size and spanned over a two-month period. For the RSA NetWitness Endpoint component, it took between five and ten days to deploy, which included documentation.
One consultant is all that is needed to deploy it, as long as they understand the expectations held by the customer.
What's my experience with pricing, setup cost, and licensing?
This is not an expensive product. The cost depends on the number of endpoints that you want to monitor, but it is not expensive.
Which other solutions did I evaluate?
There are several SIEM technologies that are available but one advantage of using RSA NetWitness is that you don't have to outsource the EDR component. It comes as part of the platform. This is in contrast to solutions like IBM QRadar, where you have to outsource the EDR.
In a further comparison with QRadar, it doesn't give accurate results because there are a lot of false positives.
What other advice do I have?
This is a product that I recommend. My advice for anybody who is implementing it is to make sure that they have somebody who understands it very well. Having somebody who will configure it properly is the right way to have it generate the output that you want.
Also, you have to make sure that all of the endpoints are up to date. They have to be online all of the time so that you're able to have visibility on any compromises that may happen. If an endpoint is instead offline, it becomes difficult to investigate or to monitor compromises or malware.
I would also suggest deploying a virtual environment. By doing so, it can be cloud-based, and what you need to do is called Event Source Onboarding. This is the process whereby you are providing the consultant with the events that you want to collect data from.
In my opinion, this is the best platform, world-wide, and I am happy with it.
I would rate this solution a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
NetWitness NDR
June 2025

Learn what your peers think about NetWitness NDR. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,168 professionals have used our research since 2012.
CEO & Founder at a tech services company with 1-10 employees
A stable solution that captures traffic with detailed communication logs
Pros and Cons
- "The most valuable feature is the way it captures the traffic, and it contains every detail of the communication."
- "When analyzing something, you have to click several times. It requires a lot of effort to find something."
What is our primary use case?
We are using this solution as a network forensic tool with other security devices such as IPS and SIEM.
What is most valuable?
The most valuable feature is the way it captures the traffic, and it contains every detail of the communication.
What needs improvement?
When analyzing something, you have to click several times. It requires a lot of effort to find something. The sole purpose of NetWitness is to find text easily, so this is an area that needs to be improved.
The scalability needs improvement, but I think that it is technically difficult.
This is a complex tool to use.
In the next release, if they could include a detection feature or improve the detection then I would like it better.
For how long have I used the solution?
I have been working with this solution for about one year.
What do I think about the stability of the solution?
This solution is very stable.
What do I think about the scalability of the solution?
It does not scale. It's one network segment that captures all of the traffic, so it's not scalable at all.
We have six analysts who use this product, with maybe only three or four people in our company.
How are customer service and technical support?
For support, we contact our reseller.
How was the initial setup?
The initial setup is not complex, it was easy.
We deployed everything on port mirroring.
What about the implementation team?
I set up this solution by myself.
What other advice do I have?
Architects love to use this tool, but the analysis is very complex, which is the point of NetWitness Network.
It's not the best, but it's good. The analytics is probably a ten but because it is complex, but overall, I would rate this solution an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Cyber Security Analyst (SAFe Agile) at a transportation company with 1,001-5,000 employees
Good detection rate and tracking features but triaging of incidents needs improvement
Pros and Cons
- "We've contacted technical support several times. They've been very good. They have been able to help us resolve our issues."
- "The contamination feature could be improved."
What is our primary use case?
We use the solution for the contamination. We detect the incidents and then proceed for the contamination and error notification. For example, there's some intrusion history to the endpoint and there's a partial command that detects the code imbalance. We're able to find it and deal with it.
What is most valuable?
The detection rate and tracking features including historical tracking, tracking of the fires on the desk, and tracking of the file last monitored are all quite valuable for us.
What needs improvement?
The contamination feature could be improved.
For how long have I used the solution?
I've been using the solution for six years now.
What do I think about the stability of the solution?
The stability of the solution is good. I'd rate it seven out of ten overall. We've had minor technical issues.
What do I think about the scalability of the solution?
The solution is highly scalable. Users just need to install the agent on the products. Right now, we have about 1,000 users. We use the solution daily.
How are customer service and technical support?
We've contacted technical support several times. They've been very good. They have been able to help us resolve our issues.
Which solution did I use previously and why did I switch?
We didn't previously use another solution.
How was the initial setup?
The initial setup was pretty straightforward. We didn't run into any issues. I can't recall how long it took to deploy.
What about the implementation team?
We had a professional service assist us with the initial setup.
What other advice do I have?
We use the on-premises deployment model.
The contamination should be improved. If a new user needs better contamination capabilities, they should use something else.
I'd rate the solution seven out of ten. If it offered better triaging of incidents, I'd rate it higher.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Consultant at a tech services company with 10,001+ employees
Good SIEM solution
Pros and Cons
- "It is stable. We have been using it for some time, without any issues."
- "This solution needs an upgrade in reporting. I have heard from RSA that they are working on this, but as of yet it is not available."
What is our primary use case?
We are using it as a SIEM tool.
What is most valuable?
One of the most valuable features is the Orchestrator.
What needs improvement?
This solution needs an upgrade in reporting. I have heard from RSA that they are working on this, but as of yet it is not available.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
It is stable. We have been using it for some time, without any issues.
What do I think about the scalability of the solution?
I think it would scale nicely but we have not needed to expand our organizational needs yet.
How was the initial setup?
The initial setup was not complex.
What's my experience with pricing, setup cost, and licensing?
I do not have any opinion on the pricing or licensing of the product.
Which other solutions did I evaluate?
I used other solutions such as EnVision in the past.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Account Manager at a tech services company with 11-50 employees
Helps our security team respond more accurately when there are threats
Pros and Cons
- "It helps our security team respond more accurately when there are threats, then we get less false positives or negatives."
- "RSA NetWitness does market analysis in a more granular form. It gives you full visibility."
- "The initial setup requires a high level of skill."
- "The solution is modular, for example you can buy the RSA ePack, which you buy as a module is not part of the conduit solution. They could include it and have it as an all-in-one solution."
What is our primary use case?
It is mainly for market analysis. It has been performing exceedingly well.
How has it helped my organization?
It helps our security team respond more accurately when there are threats, then we get less false positives or negatives.
What is most valuable?
RSA NetWitness does market analysis in a more granular form. It gives you full visibility. You have good visibility across the flow of markets, then you can connect with more security devices across the network.
What needs improvement?
The solution is modular, for example you can buy the RSA ePack, which you buy as a module is not part of the conduit solution. They could include it and have it as an all-in-one solution. However, customers understand the model, so they buy them in modules and put them together.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
The stability is good. It does not fail.
What do I think about the scalability of the solution?
It is highly scalable. It can be bought based on your requirements.
How are customer service and technical support?
The product has excellent support.
How was the initial setup?
The initial setup requires a high level of skill, then the setup is good and smooth. If you have the skill, then you will get through it easily.
What's my experience with pricing, setup cost, and licensing?
The pricing is good. It is competitive. With RSA, there is flexibility in choosing the service, products, and the range that meets your requirement, as well as they are flexible in terms of pricing. They can easily adjust if you have the requirements which are required. If you have a budget cut or a budget constraint, they can bend.
What other advice do I have?
I would highly recommend the solution. Just go ahead and get it. It is the best you can get.
We chose a solution of RSA endpoint protection because of the value proposition they offered. It became clear that they have the right solution for a serious enterprise and the security operation center (SOC), and they offered the right value.
It meets our major requirements and gives you peace of mind.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Security Specialist at Masria Digital payments
A stable solution with a user friendly interface
Pros and Cons
- "The interface of this solution is very flexible and easy to use."
- "We would like to see the hunting and investigation features of this solution improved, in order to provide better visibility of issues."
What is our primary use case?
We use this solution for network security.
What is most valuable?
The interface of this solution is very flexible and easy to use.
What needs improvement?
We would like to see the hunting and investigation features of this solution improved, in order to provide better visibility of issues.
For how long have I used the solution?
We have been using this solution for two months.
What do I think about the stability of the solution?
We have found this solution to be stable so far.
How was the initial setup?
The initial setup of this solution is straightforward.
What other advice do I have?
I would rate this solution a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free NetWitness NDR Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Product Categories
Network Detection and Response (NDR) Endpoint Protection Platform (EPP) Threat Intelligence Platforms Endpoint Detection and Response (EDR) Security Orchestration Automation and Response (SOAR) Extended Detection and Response (XDR)Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Darktrace
SentinelOne Singularity Complete
Microsoft Defender XDR
IBM Security QRadar
Cortex XDR by Palo Alto Networks
Elastic Security
Trellix Endpoint Security Platform
Symantec Endpoint Security
Tanium
Kaspersky Endpoint Security for Business
Trend Vision One Endpoint Security
Trend Vision One
Buyer's Guide
Download our free NetWitness NDR Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Network Detection and Response (NDR) Differ from SIEM?
- What aspects of network security are more concerning to small and medium-sized enterprises?
- What are the best practices for Security Operations Center (SOC)?
- What is the future of the Network Operation Center (NOC)?
- Which alternative solutions (other than Darktrace) do you recommend for an SMB?
- Why is Network Detection and Response (NDR) important for companies?
- When evaluating Network Detection and Response (NDR), what aspect do you think is the most important to look for?
- GoDaddy has been hacked again. What can be done better?
- What is Data-Centric vs Application-Centric security architecture?
- What are your top Extended Detection and Response (XDR) predictions for 2022?