(182)
4.8 out of 5
Visit Website
Sponsored
Policy Optimization | Identifies redundent processes and policies, automates changes to reduce unnecessary policy enforcement. | Not enough data | |
Risk Analysis | Identifies potential network security risks, vulnerabilities, and compliance impacts. | Not enough data | |
Auditing | Allows for deep examination into network-connected devices, policies, and protocols. | Not enough data |
Network Mapping | Provides visual displays network connections, services, and endpoints. | Not enough data | |
Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | Not enough data | |
Reporting | Documents suspicious activity within a network and provide analysis of potential threats or vulnerabilities. | Not enough data | |
Console | Provides a centralized console for administration tasks and unified control. | Not enough data |
Network Monitoring | Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point. | Not enough data | |
Configuration Monitoring | Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. | Not enough data | |
Change Management | Tools to track and implement required network policy changes. | Not enough data |
Metadata Management | Indexes metadata descriptions for easier searching and enhanced insights | Not enough data | |
Artificial Intelligence & Machine Learning | Facilitates Artificial Intelligence (AI) or Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis. | Not enough data | |
Response Automation | Reduces time spent remedying issues manually. Resolves common network security incidents quickly. | Not enough data | |
Continuous Analysis | Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering. | Not enough data |
Multi-Network Capability | Provides monitoring capabilities for multiple networks at once. | Not enough data | |
Anomaly Detection | Constantly monitors activity related to user behavior and compares activity to benchmarked patterns. | Not enough data | |
Network Visibility | Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks. | Not enough data | |
Scalability | Provides features to allow scaling for large organizations. | Not enough data |
Incident Logs | Information on each incident is stored in databases for user reference and analytics. | Not enough data | |
Incident Alerts | Gives alerts when incidents arise. Some responses may be automated, but users will still be informed. | Not enough data | |
Incident Reporting | Produces reports detailing trends and vulnerabilities related to their network and infrastructure. | Not enough data |
Usage Monitoring | Tracks infrastructure resource needs and alerts administrators or automatically scales usage to minimize waste. This feature was mentioned in 15 Cisco Secure Network Analytics reviews. | 90% (Based on 15 reviews) | |
Database Monitoring | Monitors performance and statistics related to memory, caches and connections. 15 reviewers of Cisco Secure Network Analytics have provided feedback on this feature. | 89% (Based on 15 reviews) | |
API Monitoring | Detects anomalies in functionality, user accessibility, traffic flows, and tampering. 15 reviewers of Cisco Secure Network Analytics have provided feedback on this feature. | 84% (Based on 15 reviews) | |
Activity Monitoring | Actively monitors status of work stations either on-premise or remote. This feature was mentioned in 15 Cisco Secure Network Analytics reviews. | 92% (Based on 15 reviews) |
Compliance Monitoring | As reported in 15 Cisco Secure Network Analytics reviews. Monitors data quality and send alerts based on violations or misuse. | 90% (Based on 15 reviews) | |
Risk Analysis | See feature definition | As reported in 14 Cisco Secure Network Analytics reviews. Identifies potential network security risks, vulnerabilities, and compliance impacts. | 94% (Based on 14 reviews) |
Reporting | Creates reports outlining log activity and relevant metrics. This feature was mentioned in 14 Cisco Secure Network Analytics reviews. | 96% (Based on 14 reviews) |
Security Automation | Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process. This feature was mentioned in 14 Cisco Secure Network Analytics reviews. | 93% (Based on 14 reviews) | |
Security Integration | Integrates additional security tools to automate security and incident response processes. This feature was mentioned in 14 Cisco Secure Network Analytics reviews. | 87% (Based on 14 reviews) | |
Multicloud Visibility | Allows users to track and control activity across cloud services and providers. This feature was mentioned in 13 Cisco Secure Network Analytics reviews. | 92% (Based on 13 reviews) |
Incident Reporting | As reported in 12 Cisco Secure Network Analytics reviews. Produces reports detailing trends and vulnerabilities related to their network and infrastructur | 96% (Based on 12 reviews) | |
Network Visibility | Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks. This feature was mentioned in 12 Cisco Secure Network Analytics reviews. | 97% (Based on 12 reviews) | |
Metadata Enrichment | Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis. This feature was mentioned in 11 Cisco Secure Network Analytics reviews. | 89% (Based on 11 reviews) | |
Metadata Management | Based on 11 Cisco Secure Network Analytics reviews. Indexes metadata descriptions for easier searching and enhanced insight | 92% (Based on 11 reviews) |
Incident Alerts | Gives alerts when incidents arise. Some responses may be automated, but users will still be informed. This feature was mentioned in 12 Cisco Secure Network Analytics reviews. | 93% (Based on 12 reviews) | |
Response Orchestration | Based on 11 Cisco Secure Network Analytics reviews. Integrates additional security tools to automate security and incident response processes. | 94% (Based on 11 reviews) | |
Response Automation | Based on 11 Cisco Secure Network Analytics reviews. Reduces time spent remedying issues manually. Resolves common network security incidents quickly | 92% (Based on 11 reviews) |
Multi-Network Monitoring | Provides monitoring capabilities for multiple networks at once. 11 reviewers of Cisco Secure Network Analytics have provided feedback on this feature. | 100% (Based on 11 reviews) | |
Asset Discovery | Detect new assets as they enter a network and add them to asset inventory. This feature was mentioned in 12 Cisco Secure Network Analytics reviews. | 93% (Based on 12 reviews) | |
Anomaly Detection | As reported in 12 Cisco Secure Network Analytics reviews. Constantly monitors activity related to user behavior and compares activity to benchmarked patterns | 96% (Based on 12 reviews) |
DLP Configuration | Offers data loss prevention tools to protect data from leaving the environments it is allowed to. | Not enough data | |
Configuration Monitoring | Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. | Not enough data | |
Unified Policy Management | Allows users to track and control security policies across cloud services and providers. | Not enough data | |
Adaptive Access Control | Provides a risk-based approach to determining trust within the network. | Not enough data | |
API / Integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | Not enough data |
Multicloud Visibility | Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks. | Not enough data | |
Asset Discovery | Detect new assets as they enter a cloud environments and networks to add to asset inventory. | Not enough data |
Threat Hunting | Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks. | Not enough data | |
Vulnerability Scanning | Analyzes your existing cloud, network, and IT infrastructure to outline access points that can be easily compromised. | Not enough data | |
Vulnerability Intelligence | Stores information related to new and common vulnerabilities and how to resolve them once incidents occur. | Not enough data | |
Risk-Prioritization | Allows for vulnerability ranking by customized risk and threat priorities. | Not enough data |
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Proactive Assistance | Anticipates needs and offers suggestions without prompting | Not enough data | |
Decision Making | Makes informed choices based on available data and objectives | Not enough data |