TechValidate Research on Cisco Stealthwatch

These pages present data that TechValidate has sourced via direct research with verified customers and users of Cisco Stealthwatch. TechValidate stands behind the authenticity of all published data. Learn more »



1,439 Customers Surveyed

11,476 Data Points Collected

422 Published TechFacts

51 Published Charts

70 Published Case Studies



Featured Research Collections for Cisco Stealthwatch

Curated collections and slideshows of TechValidate research data on Cisco Stealthwatch.



Selected Research Highlights


Network Performance and Security Monitoring

Cisco’s real-time view of network traffic and events is useful for security monitoring and is equally effective at application performance monitoring.

Chief Security Officer, Small Business Retail Company

Stealthwatch – Internal Visibility Provides Security Benefits

What do you find to be the greatest benefit of the internal visibility provided by Cisco Stealthwatch?

Earliest detection of advanced threats (APTs, malware, etc.)
53%
Faster Incident response
58%
Forensics
53%
Monitors individual user activity & mobile devices
26%
Continuous internal monitoring
84%
Contextual & situational awareness
58%
Meets auditing & compliance requirements
21%
Cross-department collaboration
26%
Other
16%

Stealthwatch Case Study

Global 500 Energy & Utilities Company

Introduction

This case study of a Global 500 energy & utilities company is based on a March 2018 survey of Stealthwatch customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Cisco Stealthwatch is very easy to setup and configure, and it does what we want. It has reduced the time to detect and remediate threats within our organization from months to hours. One of the features we have found to be most useful is the additional user context and ability to quarantine infected hosts that is available through the integration with Cisco Identity Services Engine (ISE).”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select Stealthwatch:

  • Faced the following challenges before their network visibility and security analytics solution:
    • Lack of visibility into a complex network with branches, IoT devices, remote employees and guests, cloud infrastructure

Use Case

The key features and functionalities of Stealthwatch that the surveyed company uses:

  • Uses Stealthwatch to gain visibility into:
    • Data centers
    • Access
    • Edge
    • Core

Results

The surveyed company achieved the following results with Stealthwatch:

  • Uses Stealthwatch to help with:
    • Investigating the source of the threat through network audit trails

Case Study: Medium Enterprise Media & Entertainment Company

Introduction

This case study of a medium enterprise media & entertainment company is based on a August 2015 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Information is easier to find. Network baselining and traffic reporting is streamlined.”

“Stealthwatch is easy to use for a small staff. Deployment was simple.”

Challenges

  • Stealthwatch has helped improve the following:
    • Network baselining
    • Incident response
    • Forensic investigations
    • Overall security posture
    • Network troubleshooting
    • Capacity planning

Use Case

  • Stealthwatch has helped with:
    • Insider threats
    • DDoS attacks
    • Compliance
    • Network performance
    • Network segmentation

Results

  • Reduced their network and security troubleshooting time by hours.
  • Stealthwatch System has helped their organization achieve the following:
    • Greater network visibility
    • Heightened threat intelligence
    • Enhanced visibility in the data center
    • Increased application awareness
  • Found the following Stealthwatch capabilities to be the most beneficial:
    • Detection of lateral movement (East-West Traffic)
    • Scalability
    • Long-term flow storage
  • Compared to other security vendors, Cisco is:
    • Easy to use
    • Easy to integrate with other security technologies
    • Cost effective
  • Stealthwatch enables the company to:
    • Better manage security with limited staff/resources
    • Speed up incident response
    • Gain pervasive network visibility
    • Foster cross-team collaboration within the IT department
    • Clearly report on organizational security to upper management

Network Security Ecosystem

Do you use Stealthwatch with the following tools to add situational awareness / context?

SIEM
43%
Firewalls
71%
IDS / IPS
56%
Full-packet capture system
40%
Other
5%

Stealthwatch Customer on Early Detection

Stealthwatch is able to understand our idea of what is “normal.” It notices changes and enables us to react in a timely manner so that events do not become incidents.

Senior IT Architect, Fortune 500 Automotive & Transport Company



More to Explore



About Cisco Stealthwatch

With Cisco Stealthwatch, organizations can improve both network security and performance, and avoid the high costs associated with downtime, security breaches and other issues.

Cisco Stealthwatch Website   Cisco Website