Try our new research platform with insights from 80,000+ expert users
Team Leader & Head of MSSP at We Ankor
Real User
It alerts anomalies on the network. But, we have encountered issues with unresolved crashes.
Pros and Cons
  • "It gives the ability to investigate into network traffic in the Net and the organization what we couldn't do before."
  • "We have encountered issues with unresolved crashes."

What is our primary use case?

We use it as a network tool to alert any anomalies on the network.

What is most valuable?

It gives the ability to investigate into network traffic in the Net and the organization what we couldn't do before.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

The product continues to crash. Even with tech support help, it does not resolve itself.

Buyer's Guide
NetWitness Platform
June 2025
Learn what your peers think about NetWitness Platform. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.

How are customer service and support?

Yes, we have had extensive use of tech support and they have not been as helpful as we would have liked. We had the crashing issue, and we had special sessions with tech support. The UAE representative and the IR response team were both on our site, and they could not understand why the system crashes. They configured the rules and then it crashed again. It is quite frustrating.

Which solution did I use previously and why did I switch?

The packet has a model that is called the extracting and it doesn't really work that well. Usually, it crashes and the re-issue improves it because it is one of the main functions that we use and it doesn't work properly.

How was the initial setup?

It was very hard to implement. After implementation, we found e had to revise everything. With help of support, we eventually managed to stabilize it. But, it took a full year to do so.

Which other solutions did I evaluate?

The only other solution similar to this is Solera and I do not think our organization will be switching to that. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
ACD - Level 3 Analyst at a tech services company with 10,001+ employees
Real User
Advance monitoring and alerting feature is not stable, though it is easy to integrate common data sources

How has it helped my organization?

Reliable in terms of no data loss. Plays a huge role in device health checks (Event Source Monitor). Provides FSEs relevant information prior to end user problem solutions (if data sources are integrated and parsed properly).

What is most valuable?

  • Packet Solution: Allows analyst proactive hunting and alerting on daily sophisticated APTs.
  • Broker service: Aggregate multiple concentrator devices deployed in various sites which accelerates analyst’s duties.
  • Archiver – Does log retention for three to five years for forensics purposes or targeted investigations in the future.

What needs improvement?

Advance monitoring and alerting feature is not stable (Event Stream Analysis). Does not allow certain use cases running parallel.

The reporting module: If only their dashboards resembled anything you would see on any BI reporting tools.

What do I think about the stability of the solution?

More than once with fine tuning use cases (ESA feature) for real-time monitoring.

Reporting feature suddenly limits the amount of log extraction over certain cycles.

What do I think about the scalability of the solution?

Never.

How are customer service and technical support?

An eight out of 10. RSA tech support is awesome.

Sometimes they face huge challenges when an unknown bug hits their system and tech support must take their cases to engineering.

Which solution did I use previously and why did I switch?

None in production other than RSA. However, I will be using IBM QRadar towards the end of this year.

How was the initial setup?

I was never involved in setting up the solution with any of my employers. I get to learn the architecture and see the environment once it's complete.

What's my experience with pricing, setup cost, and licensing?

RSA licensing ranges per core devices and services.

An additional Designated Support Engineer can be acquired at quite a pricy cost. They are reliable as your system and will be given a higher priority than any other support case(s).

Which other solutions did I evaluate?

Our partnership with RSA was already in place. No room for evaluation.

Top SIEM tools such as HP Arcsight, McAfee ESM, and IBM QRadar.

What other advice do I have?

Either operating this solution in-house or reselling. First, outline all your data sources. Give more priority to the assets you want to protect.

Event source type and versions will be key.

Additional useful features:

  • Easy to integrate common data sources.
  • User friendly GUI.
  • Basic SQL rule syntax.

We are using RSA Security analytics version 10.6.3.2 and upgrading to 10.6.4 in mid-September. NetWitness suite v11 is due in October as a major upgrade.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner and reseller.
PeerSpot user
Buyer's Guide
NetWitness Platform
June 2025
Learn what your peers think about NetWitness Platform. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
it_user365328 - PeerSpot reviewer
Founder & CEO at a tech services company with 11-50 employees
Consultant
The Alerting Module provides real-time event processing language on the logs/packets stream.
Pros and Cons
  • "Alerting Module: It provides real-time event processing language on all the logs/packets stream for advanced alerting, i.e., using SQL LIKE statements."
  • "Health monitoring of the event sources and devices."

How has it helped my organization?

As mentioned elsewhere, this product provides full visibility for the activities in the networks and systems. For example, it provides detection of the attacks in early stages (brute-force attacks), by which the attackers try to gain access to the systems, by trying to log in using different usernames and passwords (might be in a dictionary).

What is most valuable?

RSA NetWitness is a SIEM and real-time network traffic solution. It collects logs/packets and applies a set of alerting, reporting and analysis rules on them. Thus, it provides the enterprise with a full visibility of the networks and activities of the systems.

Its main features/components are:

  • Investigation Module: It is the location where the SOC analysts can find all logs/packets captured in a time-frame, that are related/non-related and have drill-down/filtration capabilities all in one table, for investigation and analysis.
  • Alerting Module: It provides real-time event processing language on all the logs/packets stream for advanced alerting, i.e., using SQL LIKE statements.
  • Reporting Module: It provides advanced reporting capabilities.
  • Dashboard Module: It provides dashboards for specific activities on the systems and networks.
  • Command and Control Detection: In additional to identifying the C&C IPs through threat intelligence, NetWitness investigates the packets to determine any type of suspicious C&C communication, by using a feature called Automated Threat Detection.
  • Threat Hunting Package: By using this advanced technique, NetWitness automatically investigates all the service sessions, files/packets and then it identifies any IoCs, BoCs and EoCs.
  • Context Lookup: In order to give an overview during investigation, this feature highlights any value related to the previous alert, incident, RSA ECAT feed mentioned or even if it had any comment from the RSA community, that leads to detecting any recent attack (even if it is still not announced on threat intelligence).
  • Incident Module: It provides an automated incident handling utility to ensure that right actions have been taken to close the incident.
  • Malware Analysis Module: It provides a file analysis environment including sandboxing, community etc., so as to investigate more of the files captured through the environment traffic.

What needs improvement?

  • Out-of-the-box alerts and investigation rules
  • Health monitoring of the event sources and devices
  • Threat intelligence for data accuracy

What do I think about the stability of the solution?

We encountered stability issues in the earlier versions, and much fewer in the newer versions.

What do I think about the scalability of the solution?

There were no scalability issues.

What's my experience with pricing, setup cost, and licensing?

The new pricing and licensing mechanisms are fair. I would advise always to get the full solution (i.e., not only Logs).

Which other solutions did I evaluate?

I did not evaluate other solutions.

What other advice do I have?

The only thing I advise others is to spend enough time for fine-tuning and the initial rule development.

You should also develop a plan for the ongoing development and fine-tuning, as found in all the other leading SIEM solutions.

Disclosure: My company has a business relationship with this vendor other than being a customer. We are a sub-contractor.
PeerSpot user
it_user698622 - PeerSpot reviewer
it_user698622Advisory Consultant at SCIS SECURITY
Top 20MSP

I agree, with Alireza's comment. It's always best practice regardless of the SIEM. Traditionally, we've used the Netwitness platform mainly for full packet capture and basic alerting. To make better use as a full SIEM, it's important for others to note that customers need to buy additional modules and hardware including ESA. The additional content out of the box requires subscriptions to their RSA live and threat intel feeds as well in many cases. It's not the usage that is too difficult; it's the administration that makes it a bear. I advise, like many other solutions to get vendor formal training if you intend to self-administrate or create your own content

See all 2 comments
it_user619134 - PeerSpot reviewer
Direct Sales Director at a tech services company with 501-1,000 employees
Consultant
We can investigate incidents based on logs and raw packets.
Pros and Cons
  • "Possibility to investigate incidents based on logs and raw packets, such as extracting files sent over the network"
  • "The system architecture is complex and sometimes it’s hard to troubleshoot potential problems."

What is most valuable?

Full packet capture: A must in an SOC

Possibility to investigate incidents based on logs and raw packets, such as extracting files sent over the network

Built-in Incident Management module for small security/SOC teams

Advanced correlation engine based on metadata flow: Provides nearly real time correlation

Rich reporting options

How has it helped my organization?

We can monitor all traffic to/from our company.

It is possible to track end user behaviour.

With RSA NetWitness Endpoint, we are able to monitor not only the network, but also what’s happening on endpoints, i.e., behaviour analytics for processes inside the operating system.

Thanks to this tool, we have a small SOC running in our company.

What needs improvement?

Integration with external tools should be built-in, such as an external sandbox for files.

We can import data using external feeds, using STIX or CVS files.

The REST API is poor

The system architecture is complex and sometimes it’s hard to troubleshoot potential problems.

RSA should improve backup options and High Availability architecture.

Data is stored on separate components without redundancy. It’s possible to have backup for data, but you have to use an external backup solution.

For how long have I used the solution?

I have used this product for two and a half years.

What do I think about the stability of the solution?

The system is stable if you provide enough CPU, RAM, and HDD (IOPS). Sizing should be done by RSA Professional Services or by an experienced partner for Virtual Machines. The hardware is sized well.

What do I think about the scalability of the solution?

There were no scalability issues, but you have to know what you are doing. Proper network deployment is important. Metadata flows are quite big between internal system components. Of course, it depends on how many network packets and logs are logged into the system.

How are customer service and technical support?

I would give technical support a rating of 8/10. Sometimes you have to wait for an initial response, especially if it’s not a critical problem. But when they start investigating, they do it quite well.

Which solution did I use previously and why did I switch?

For full packet capture, we had Blue Coat Security Analytics. We switched because in NetWitness, we have everything needed to run a small SOC in our company.(Packets, logs, endpoints, incident management module, correlation, reporting, and investigation available for analysts.)

How was the initial setup?

It’s a very easy product to install, when you know what you are doing. Customers without any experience should cooperate with RSA Professional Services or a partner company. It’s too complex of a product to deploy for someone without experience. It can be done, but the value coming from RSA or a partner is incomparable.

What's my experience with pricing, setup cost, and licensing?

Prepare use cases, i.e., what to do and how.

Collect information about EPS for logs and total bandwidth for packets. This will allow you to properly size the licensing.

Hardware is too expensive in my opinion (Eastern Europe). It’s cheaper to run virtual machines in a VMware environment. (Keep in mind that CPU, RAM, and especially HDD requirements must be matched.)

Which other solutions did I evaluate?

We had Blue Coat Security Analytics, but we’re an RSA partner so it was natural to use the technology available to us.

What other advice do I have?

  • Don’t rush. Prepare use cases for packets and logs as it is a very important part of deployment and future use.
  • Use RSA Professional Services or a partner. Don’t deploy alone.
  • A basic administration course is a must for all administrators.
  • System architecture may be very easy or very complex. Do sizing well with external help.
Disclosure: My company has a business relationship with this vendor other than being a customer. RSA Partner.
PeerSpot user
Alireza Ghahrood - PeerSpot reviewer
Alireza GhahroodConsultant & Instructor -Cyber Security,GovernanceRIskCompliance (CISO as a Services) at Independent
Top 10Real User

Built-in Incident Management module for small security/SOC teams

it_user130770 - PeerSpot reviewer
Managing Architect at a tech company with 10,001+ employees
Real User
Since the solution has been under way we have seen a large decrease of threats and proactive reactions to incidents.

Valuable Features

I have found the Security Intelligence most valuable.

Improvements to My Organization

Adding Threat Globe and SA(Analytics).

Room for Improvement

Cross Platform Integration could be improved.

Use of Solution

I have been using the solution for more than 8 Years.

Deployment Issues

No issues with deployment.

Stability Issues

No issues with stability.

Scalability Issues

Yes.

Customer Service and Technical Support

Customer Service: It's good for Enterprise Customer’s.Technical Support: It's good for Enterprise Customer’s.

ROI

Since the solution has been under way we have seen a large decrease of threats and proactive reactions to incidents.

Other Advice

This purely is an Enterprise Product and one has to have a defined budget and plan; it’s good to fit Business requirements first, and then go for products.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free NetWitness Platform Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Buyer's Guide
Download our free NetWitness Platform Report and get advice and tips from experienced pros sharing their opinions.