Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated Cisco Cyber Vision Alternatives

Cisco Cyber Vision Reviews & Product Details

Cisco Cyber Vision Overview

What is Cisco Cyber Vision?

Sentryo is the pioneer in solutions dedicated to managing the cyber risk of M2M networks and Industrial Control Systems (ICS).

Cisco Cyber Vision Details
Show LessShow More
Product Description

Sentryo is the pioneer in solutions dedicated to managing the cyber risk of M2M networks and Industrial Control Systems (ICS).


Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
733,873 Twitter followers
LinkedIn® Page
www.linkedin.com
97,323 employees on LinkedIn®
Ownership
NASDAQ:CSCO
Phone
847-678-6600
Total Revenue (USD mm)
$49,301
Description

Cisco delivers intent-based networking across the branch, WAN, and cloud. We provide end-to-end security, automation, and analytics with award-winning services and support.

Recent Cisco Cyber Vision Reviews

Amit P.
AP
Amit P.Enterprise (> 1000 emp.)
5.0 out of 5
"“Balancing Strengths and Challenges: A Review of Cisco Cyber Vision for OT Security”"
Cisco Cyber Vision excels at providing deep visibility into OT assets, seamless integration with Cisco’s security tools, and effective threat detec...
DL
Diago L.Mid-Market (51-1000 emp.)
4.5 out of 5
"The Inclussive Security Platform that Supports Cyber Postures and OT"
Cisco Cyber Vision has universal features, that assist us in monitoring all the OT activities or events. The software has issued a detail guide on...
SD
Sophia D.Mid-Market (51-1000 emp.)
4.0 out of 5
"Enables highly detailed insight to possible weaknesses"
Cisco Cyber Vision has been particularly helpful for me to gain an overview of the IT network security situation. Their feature of centralising inf...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Cisco Cyber Vision Media

Answer a few questions to help the Cisco Cyber Vision community
Have you used Cisco Cyber Vision before?
Yes

4 Cisco Cyber Vision Reviews

4.4 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
4 Cisco Cyber Vision Reviews
4.4 out of 5
4 Cisco Cyber Vision Reviews
4.4 out of 5
G2 reviews are authentic and verified.
Amit P.
AP
Sr. Solution Architect
Telecommunications
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Cisco Cyber Vision?

Cisco Cyber Vision excels at providing deep visibility into OT assets, seamless integration with Cisco’s security tools, and effective threat detection tailored for industrial environments. It also offers passive monitoring to avoid disruptions in critical OT systems. Review collected by and hosted on G2.com.

What do you dislike about Cisco Cyber Vision?

Cisco Cyber Vision has a few drawbacks: it’s complex to set up, costly, and integrates best with Cisco products. The user interface can feel unintuitive, and it may require a steep learning curve. Review collected by and hosted on G2.com.

What problems is Cisco Cyber Vision solving and how is that benefiting you?

Cisco Cyber Vision addresses visibility and security in OT environments, solving the challenge of monitoring critical industrial assets without impacting operations. This provides real-time threat detection, improved asset management, and seamless integration with Cisco’s IT security tools, strengthening overall cybersecurity for both IT and OT. Review collected by and hosted on G2.com.

DL
ICT Manager
Health, Wellness and Fitness
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Cisco Cyber Vision?

Cisco Cyber Vision has universal features, that assist us in monitoring all the OT activities or events.

The software has issued a detail guide on cyber secuirty, that makes it realistic for us to integrate with several other security apparatus.

Cisco Cyber Vision has simplified the deployment process for security solutions. Review collected by and hosted on G2.com.

What do you dislike about Cisco Cyber Vision?

Cisco Cyber Vision is the software I would give a five star rate, the security development and assistance are vibrant and robust. Review collected by and hosted on G2.com.

What problems is Cisco Cyber Vision solving and how is that benefiting you?

Cisco Cyber Vision has provided us with quality and indepth OT security assistance, which amounts to great operational support.

We solve large scale security postures, from cyber threats to system security postures. The development of automated and AI controlled threat detectors gives us a robust form of business enaggement. Review collected by and hosted on G2.com.

SD
Technical Support Agent
Electrical/Electronic Manufacturing
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Cisco Cyber Vision?

Cisco Cyber Vision has been particularly helpful for me to gain an overview of the IT network security situation. Their feature of centralising information about threats from different security products and displaying it in one console is especially helpful. Review collected by and hosted on G2.com.

What do you dislike about Cisco Cyber Vision?

Communicating and detecting industrial control systems (ICS) need further configuration and more insight. Another one is the absence of pre-built dashboards or reporting precisely designed for operational technology security. Review collected by and hosted on G2.com.

What problems is Cisco Cyber Vision solving and how is that benefiting you?

Cyber Vision offers consolidation of the IT security solutions in the sphere for the entire network of our company. It reduces the need for utilizing many security solutions thus making the process of identifying and neutralizing the threat simpler. Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
II
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Cisco Cyber Vision?

The thing I like most about Sentryo ICS CyberVision is its efficiency.Its never lets me down in finding any type of vulnerability present in the current control networks . Review collected by and hosted on G2.com.

What do you dislike about Cisco Cyber Vision?

There is nothing as such to dislike in it.Still I would like to use it more if it's GUI gets little bit improved. Review collected by and hosted on G2.com.

What problems is Cisco Cyber Vision solving and how is that benefiting you?

SENTRYO MANAGES THE CYBER RISK OF M2M NETWORKS AND INDUSTRIAL CONTROL SYSTEMS. IT INVENTORIES INDUSTRIAL ASSETS TO IDENTIFY VULNERABILITIES AND DETECT ANOMALIES IN REAL TIME.It helps to do my job of security analyst by detecting any type of cyber risk present. Review collected by and hosted on G2.com.

There are not enough reviews of Cisco Cyber Vision for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Palo Alto Networks IoT/OT Security Logo
Palo Alto Networks IoT/OT Security
4.3
(91)
Protect every connected asset with OT security that keeps operations up 24/7, not CISOs
2
Microsoft Defender for IoT Logo
Microsoft Defender for IoT
4.2
(69)
3
AWS IoT Device Defender Logo
AWS IoT Device Defender
4.4
(57)
AWS IoT Device Defender is a fully managed service that helps you secure your fleet of IoT devices. AWS IoT Device Defender continuously audits the security policies associated with your devices to make sure that they aren't deviating from security practices.
4
Azure IoT Hub Logo
Azure IoT Hub
4.3
(44)
Azure IoT Hub is a scalable, multi-tenant cloud platform (IoT PaaS) that includes an IoT device registry, data storage, and security. It also provides a service interface to support IoT application development.
5
Google Cloud IoT Core Logo
Google Cloud IoT Core
4.1
(31)
Google Cloud IoT Core is a fully managed service that allows users to easily and securely connect, manage, and ingest data from millions of globally dispersed devices.
6
AppSealing Logo
AppSealing
4.8
(27)
AppSealing is a trusted player in the world of mobile application security. In today’s application-focused world, security can’t slow down your speed of development. We utilize runtime application self-protection features to build scalable security solutions for your mobile apps business in quick time without 'ANY CODING'. Our powerful security suite ensures real-time in-depth application security like source code protection, anti-reverse engineering, cheat tool & emulator detection/blocking, and enforces app integrity. It protects 800+ mobile apps and 800 million+ devices, successfully blocking 70 million+ threats across the globe. Our esteemed clientele spans across Gaming, Fintech, Movie apps, E-comm, Healthcare, and O2o.
7
Appgate SDP Logo
Appgate SDP
4.8
(26)
Appgate SDP secures the network with a Software-Defined Perimeter's network security model that dynamically creates one-to-one network connections between the user and the resources they access.
8
Azure Sphere Logo
Azure Sphere
4.4
(23)
Azure Sphere is a new solution for creating highly-secured, Internet-connected microcontroller (MCU) devices. It provides a foundation of security and connectivity that allows you to create the intelligent products and experiences that customers love—and get them to market quickly—at a price point that enables the Internet of Things (IoT) at scale.
9
Trellix Embedded Control Logo
Trellix Embedded Control
4.3
(22)
McAfee Embedded Control provides whitelisting and file integrity monitoring technology to combat targeted malware, unauthorized software changes, and configuration alterations across commercial and industrial IoT devices.
10
Corelight Logo
Corelight
4.6
(20)
Corelight provides security teams with network evidence so they can protect the world’s most critical organizations and companies. On-prem and in the cloud, our Open Network Detection and Response Platform enhances visibility and analytics, leading to faster investigations and expanded threat hunting. Corelight’s global customers include Fortune 500 companies, major government agencies, and large research universities. Based in San Francisco, Corelight is an open-core security company founded by the creators of Zeek®, the widely-used network security technology.
Show More