TechValidate Research on Cisco Stealthwatch

These pages present data that TechValidate has sourced via direct research with verified customers and users of Cisco Stealthwatch. TechValidate stands behind the authenticity of all published data. Learn more »

1,073 Customers Surveyed

8,761 Data Points Collected

345 Published TechFacts

39 Published Charts

65 Published Case Studies

Featured Research Collections for Cisco Stealthwatch

Curated collections and slideshows of TechValidate research data on Cisco Stealthwatch.

Selected Research Highlights

Case Study: United Auto Insurance Group


This case study of United Auto Insurance Group is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“The anomaly based protection has been very instrumental in identifying security threats both internally and externally.”


  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Reduced mean-time-to-know (MTTK) root cause of network or security incidents
    • Improved in network performance, forensic analysis
    • Enhanced network security posture
    • Increased efficiency in the identification of security threats, correlation of user identity and activity, flow collection, monitoring and analysis
    • Enhanced compliance posture

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Incident Response
    • Network Forensics
    • Security Forensics
    • Application performance monitoring
    • PCI compliance
    • Network performance monitoring
  • Used Stealthwatch to detect or prevent the following security threats:
    • Advanced persistent threats
    • Network malware or virus
    • Suspicious user behavior
    • External hacking attempt
    • Compromised host
    • Command and control traffic/ botnets
    • Network reconnaissance
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Operating in a classified network with strictly controlled access to specific segments
    • Monitoring traffic within a data center, physical and virtual


  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Real-time flow monitoring capabilities
    • Forensics
    • Advanced Persistent Threats (APTs)
    • Auditing and compliance requirements
    • Identity awareness
    • Application Aware Network Performance Monitoring
  • Selected Stealthwatch by Cisco over the following vendors:
    • Arbor Networks
    • NetQoS / CA
    • Open source solution
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Scalability and flexibility
    • Real-time threat detection and correlation with user identity data
    • Improved incident response and threat management
    • Regulatory compliance
    • Enterprise-wide visibility into network activity
    • Deployment and support simplicity
    • Enterprise-wide user monitoring
    • Forensic analysis
  • Improved time to mitigation of a security incident by > 75% by deploying Stealthwatch by Cisco.
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Security: Much Better
    • Performance Monitoring: Much Better
    • Network Visibility: Better
    • Innovation: Better

Stealthwatch Case Study

Global 500 Energy & Utilities Company


This case study of a Global 500 energy & utilities company is based on a March 2018 survey of Stealthwatch customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Cisco Stealthwatch is very easy to setup and configure, and it does what we want. It has reduced the time to detect and remediate threats within our organization from months to hours. One of the features we have found to be most useful is the additional user context and ability to quarantine infected hosts that is available through the integration with Cisco Identity Services Engine (ISE).”


The business challenges that led the profiled company to evaluate and ultimately select Stealthwatch:

  • Faced the following challenges before their network visibility and security analytics solution:
    • Lack of visibility into a complex network with branches, IoT devices, remote employees and guests, cloud infrastructure

Use Case

The key features and functionalities of Stealthwatch that the surveyed company uses:

  • Uses Stealthwatch to gain visibility into:
    • Data centers
    • Access
    • Edge
    • Core


The surveyed company achieved the following results with Stealthwatch:

  • Uses Stealthwatch to help with:
    • Investigating the source of the threat through network audit trails

Stealthwatch for Network Visibility & Threat Intelligence

What does the Stealthwatch System help your organization achieve?

Greater network visibility
Heightened threat intelligence
Enhanced visibility in the data center
Improved user identity awareness
Increased application awareness
More visibility into mobile devices

Stealthwatch Enterprise Customer Testimonial

Cisco Stealthwatch is a great tool that aids in threat-hunting to drill down the source, and detect lateral movement – all the while providing contextual info about the location and the value of asset.

IT Specialist, Fortune 500 Computer Hardware Company

Stealthwatch being used for…..

Stealthwatch’s user/host-level information is critical for?

Performance Monitoring
Network Troubleshooting

Cisco Stealthwatch Customer Testimonial


Gives me insight into areas of the network where our IT group does not manage the devices and where we would not otherwise have visibility.

Security Officer, Educational Institution

More to Explore

About Cisco Stealthwatch

With Cisco Stealthwatch, organizations can improve both network security and performance, and avoid the high costs associated with downtime, security breaches and other issues.

Cisco Stealthwatch Website   Cisco Website