Introducing G2.ai, the future of software buying.Try now
Kechie ERP
Sponsored
Kechie ERP
Visit Website
Product Avatar Image
Cisco Cyber Vision

By Cisco

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at Cisco Cyber Vision and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
4.4 out of 5 stars
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Cisco Cyber Vision?

Kechie ERP
Sponsored
Kechie ERP
Visit Website
It's been two months since this profile received a new review
Leave a Review

Cisco Cyber Vision Reviews & Product Details

Product Avatar Image

Have you used Cisco Cyber Vision before?

Answer a few questions to help the Cisco Cyber Vision community

Cisco Cyber Vision Reviews (4)

Reviews

Cisco Cyber Vision Reviews (4)

4.4
4 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Amit P.
AP
Sr. Solution Architect
Telecommunications
Enterprise (> 1000 emp.)
"“Balancing Strengths and Challenges: A Review of Cisco Cyber Vision for OT Security”"
What do you like best about Cisco Cyber Vision?

Cisco Cyber Vision excels at providing deep visibility into OT assets, seamless integration with Cisco’s security tools, and effective threat detection tailored for industrial environments. It also offers passive monitoring to avoid disruptions in critical OT systems. Review collected by and hosted on G2.com.

What do you dislike about Cisco Cyber Vision?

Cisco Cyber Vision has a few drawbacks: it’s complex to set up, costly, and integrates best with Cisco products. The user interface can feel unintuitive, and it may require a steep learning curve. Review collected by and hosted on G2.com.

DL
ICT Manager
Health, Wellness and Fitness
Mid-Market (51-1000 emp.)
"The Inclussive Security Platform that Supports Cyber Postures and OT"
What do you like best about Cisco Cyber Vision?

Cisco Cyber Vision has universal features, that assist us in monitoring all the OT activities or events.

The software has issued a detail guide on cyber secuirty, that makes it realistic for us to integrate with several other security apparatus.

Cisco Cyber Vision has simplified the deployment process for security solutions. Review collected by and hosted on G2.com.

What do you dislike about Cisco Cyber Vision?

Cisco Cyber Vision is the software I would give a five star rate, the security development and assistance are vibrant and robust. Review collected by and hosted on G2.com.

SD
Technical Support Agent
Electrical/Electronic Manufacturing
Mid-Market (51-1000 emp.)
"Enables highly detailed insight to possible weaknesses"
What do you like best about Cisco Cyber Vision?

Cisco Cyber Vision has been particularly helpful for me to gain an overview of the IT network security situation. Their feature of centralising information about threats from different security products and displaying it in one console is especially helpful. Review collected by and hosted on G2.com.

What do you dislike about Cisco Cyber Vision?

Communicating and detecting industrial control systems (ICS) need further configuration and more insight. Another one is the absence of pre-built dashboards or reporting precisely designed for operational technology security. Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
II
Small-Business (50 or fewer emp.)
"Worth to pay"
What do you like best about Cisco Cyber Vision?

The thing I like most about Sentryo ICS CyberVision is its efficiency.Its never lets me down in finding any type of vulnerability present in the current control networks . Review collected by and hosted on G2.com.

What do you dislike about Cisco Cyber Vision?

There is nothing as such to dislike in it.Still I would like to use it more if it's GUI gets little bit improved. Review collected by and hosted on G2.com.

There are not enough reviews of Cisco Cyber Vision for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Palo Alto Networks IoT/OT Security Logo
Palo Alto Networks IoT/OT Security
4.4
(117)
Protect every connected asset with OT security that keeps operations up 24/7, not CISOs
2
Microsoft Defender for IoT Logo
Microsoft Defender for IoT
4.3
(100)
Microsoft Defender for IoT is a comprehensive security solution designed to protect Internet of Things (IoT and operational technology (OT environments. It offers real-time asset discovery, vulnerability management, and cyberthreat protection for industrial infrastructures, including industrial control systems (ICS and OT networks. By providing complete visibility into all IoT and OT assets, Defender for IoT enables organizations to manage security posture effectively and reduce the cyberattack surface area. Its agentless, network-layer monitoring ensures seamless integration with existing systems without impacting performance. Key Features and Functionality: - Context-Aware Visibility: Gain comprehensive insights into all IoT and OT assets, including device details, communication protocols, and behaviors. - Risk-Based Security Posture Management: Identify and prioritize vulnerabilities using a risk-prioritized approach to minimize the cyberattack surface. - Cyberthreat Detection with Behavioral Analytics: Utilize IoT and OT-aware behavioral analytics and machine learning to detect and respond to cyberthreats effectively. - Agentless Monitoring: Deploy non-invasive, passive monitoring that integrates seamlessly with diverse industrial equipment and legacy systems. - Unified Security Operations: Integrate with Microsoft Sentinel and other security information and event management (SIEM systems for centralized monitoring and governance. Primary Value and Problem Solved: Defender for IoT addresses the critical need for robust security in IoT and OT environments, which are often vulnerable due to unpatched devices, misconfigurations, and lack of visibility. By providing real-time asset discovery, continuous monitoring, and advanced threat detection, it empowers organizations to proactively manage risks, ensure compliance, and protect critical infrastructure from evolving cyberthreats. This solution enables seamless integration with existing security operations, fostering a unified approach to IT and OT security.
3
Rayven Logo
Rayven
4.9
(61)
No/low/full-code platform for building apps, AI tools + automations. Rayven enables you to integrate systems, unlock data sources, and build custom apps with business-orientated AI capabilities, simply.
4
AWS IoT Device Defender Logo
AWS IoT Device Defender
4.4
(57)
AWS IoT Device Defender is a fully managed service that helps you secure your fleet of IoT devices. AWS IoT Device Defender continuously audits the security policies associated with your devices to make sure that they aren't deviating from security practices.
5
DoveRunner Logo
DoveRunner
4.7
(52)
DoveRunner is a trusted player in the world of mobile application security. In today’s application-focused world, security can’t slow down your speed of development. We utilize runtime application self-protection features to build scalable security solutions for your mobile apps business in quick time without 'ANY CODING'. Our powerful security suite ensures real-time in-depth application security like source code protection, anti-reverse engineering, cheat tool & emulator detection/blocking, and enforces app integrity. It protects 800+ mobile apps and 800 million+ devices, successfully blocking 70 million+ threats across the globe. Our esteemed clientele spans across Gaming, Fintech, Movie apps, E-comm, Healthcare, and O2o.
6
Azure IoT Hub Logo
Azure IoT Hub
4.3
(44)
Azure IoT Hub is a scalable, multi-tenant cloud platform (IoT PaaS) that includes an IoT device registry, data storage, and security. It also provides a service interface to support IoT application development.
7
Appgate SDP Logo
Appgate SDP
4.8
(33)
Appgate SDP secures the network with a Software-Defined Perimeter's network security model that dynamically creates one-to-one network connections between the user and the resources they access.
8
Google Cloud IoT Core Logo
Google Cloud IoT Core
4.1
(30)
Google Cloud IoT Core is a fully managed service that allows users to easily and securely connect, manage, and ingest data from millions of globally dispersed devices.
9
Azure Sphere Logo
Azure Sphere
4.4
(23)
Azure Sphere is a new solution for creating highly-secured, Internet-connected microcontroller (MCU) devices. It provides a foundation of security and connectivity that allows you to create the intelligent products and experiences that customers love—and get them to market quickly—at a price point that enables the Internet of Things (IoT) at scale.
10
FortiNAC Logo
FortiNAC
4.4
(20)
FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Cisco Cyber Vision
View Alternatives