TechValidate Research on Cisco Stealthwatch

These pages present data that TechValidate has sourced via direct research with verified customers and users of Cisco Stealthwatch. TechValidate stands behind the authenticity of all published data. Learn more »



1,439 Customers Surveyed

11,476 Data Points Collected

422 Published TechFacts

51 Published Charts

70 Published Case Studies



Featured Research Collections for Cisco Stealthwatch

Curated collections and slideshows of TechValidate research data on Cisco Stealthwatch.



Selected Research Highlights


Cisco Stealthwatch Customer Experience Customer Testimonial

What Stealthwatch service(s) did you consume and what value did you receive as a result?

We used Stealthwatch Professional Services to configure host group automation. We now receive insight into where all of our network segments reside on our physical footprint.

Security Manager, Educational Institution

How Educational Institutions are using Stealthwatch

How are you currently using Stealthwatch?

Specialized threat analysis & protection
37%
Network analysis & visibility
97%
Advanced threat detection
20%
Network performance monitoring & diagnostics
63%

Cisco Stealthwatch Customer Experience Customer Research

The goal of the Stealthwatch Customer Experience organization is to help our customers accelerate time to value through our Services and customer engagement. Based on your interaction, how would you describe your success in achieving these results?

Significantly faster time to value
35%
Faster time to value
60%
Slowed my time to value
3%
Not delivered any value
3%

Case Study: Yale New Haven Hospital

Introduction

This case study of Yale-New Haven Hospital is based on a November 2013 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

Challenges

  • Purchased Cisco because it is differentiated from competitive products in the following areas:
    • Value for price
    • Customer support

Use Case

  • Is currently using Stealthwatch for:
    • Specialized threat analysis & protection
    • Network analysis & visibility
    • Advanced threat detection
    • Network performance monitoring & diagnostics
  • Uses Stealthwatch with:
    • SIEM

Results

  • The following are the greatest benefits of the internal visibility provided by Cisco Stealthwatch:
    • Forensics
    • Continuous internal monitoring
  • Agrees that Stealthwatch’s user/host-level information is critical for the following:
    • Security
    • Performance monitoring
    • Forensics
    • Compliance
    • Network troubleshooting
  • Rated Stealthwatch’s effectiveness in the following areas:
    • detecting DDoS: effective
    • accelerating incident response and forensics: effective
    • detecting advanced persistent threats: effective
    • detecting insider threats / Suspicious behavior: effective
    • detecting malware / zero-day attacks: effective
  • Saves hours per incident for determining Mean-Time-To-Identify threats and Mean-Time-To-Know root cause using Stealthwatch.
  • Rated how critical Cisco Stealthwatch is for the following:
    • Monitoring visibility: Critical
    • Improving security: somewhat critical
    • Managing cyber security: somewhat critical
    • Responding to cyber threats : Not Critical
  • Ranks Cisco’s customer support as above average.

Case Study: American Cancer Society

Introduction

This case study of American Cancer Society, Inc. is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Cisco’s Stealthwatch has made it possible to store and review past network activity in an efficient and affordable manner. Network and application behavior is now available – real-time – to a more diverse IT user base than before, dramatically improving our effectiveness and productivity.”

Challenges

  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Reduced mean-time-to-know (MTTK) root cause of network or security incidents
    • Improved in network performance
    • Enhanced network security posture
    • Improved in application performance
    • Increased efficiency in the identification of security threats
    • Improved forensic analysis
    • Increased correlation of user identity and activity
    • Increased visibility of mobile devices
    • Increased flow collection, monitoring and analysis
    • Enhanced compliance posture

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Incident Response
    • Network Forensics
    • Security Forensics
    • Application performance monitoring
    • PCI compliance
    • HIPAA compliance
  • Used Stealthwatch to detect or prevent the following security threats:
    • Network malware or virus
    • Suspicious user behavior
    • Compromised host
    • Network reconnaissance
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Monitoring a centralized network with a large number of satellite or retail locations
    • Monitoring traffic within a data center, physical and virtual

Results

  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Real-time flow monitoring capabilities
    • Internal visibility
    • Forensics
    • Advanced Persistent Threats (APTs)
    • Auditing and compliance requirements
    • Scalability
    • Identity awareness
    • Application Aware Network Performance Monitoring
  • Selected Stealthwatch by Cisco over the following vendors:
    • In-house monitoring solution
    • Open source solution
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Scalability and flexibility
    • Real-time threat detection and correlation with user identity data
    • Improved incident response and threat management
    • Regulatory compliance
    • Enterprise-wide visibility into network activity
    • Deployment and support simplicity
    • Enterprise-wide user monitoring
    • Forensic analysis
  • Reduced the time it took to mitigate a security incident by > 75% by deploying Stealthwatch.
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Visibility: Much Better
    • Network Security: Much Better
    • Innovation: Much Better
    • Performance Monitoring: Better
    • Scalability: Better

Stealthwatch Enterprise Customer Statistic

59% of surveyed organizations chose Cisco Stealthwatch over the competition because of its integration with other Cisco products and technologies.

59%


More to Explore



About Cisco Stealthwatch

With Cisco Stealthwatch, organizations can improve both network security and performance, and avoid the high costs associated with downtime, security breaches and other issues.

Cisco Stealthwatch Website   Cisco Website