TechValidate Research on Cisco Stealthwatch

These pages present data that TechValidate has sourced via direct research with verified customers and users of Cisco Stealthwatch. TechValidate stands behind the authenticity of all published data. Learn more »

1,439 Customers Surveyed

11,476 Data Points Collected

422 Published TechFacts

51 Published Charts

70 Published Case Studies

Featured Research Collections for Cisco Stealthwatch

Curated collections and slideshows of TechValidate research data on Cisco Stealthwatch.

Selected Research Highlights

Solving Operational Challenges

What types of operational challenges did the use of Stealthwatch by Cisco solve?

Reduction in Mean-Time-to-Know (MTTK) root cause of network or security incidents
Improved in network performance
Improved network security posture
Improved in application performance
Improved efficiency in the identification of security threats
Improved forensic analysis
Increased correlation of user identity and activity
Increased visibility of mobile devices
Increased flow collection, monitoring and analysis
Enhanced compliance posture

Cisco Stealthwatch Customer Satisfaction Rating

A Network Operations at a large enterprise telecommunications services company would be very likely to recommend Cisco Stealthwatch for this reason:

Due to its flexibility, Stealthwatch is a great substitute to many SIEM tools.

Quickly Detect and Mitigate Malware

Cisco’s Stealthwatch has enabled us to detect malware that other security controls are unable to detect or block, and find the affected sources inside our network, clean them, and reduce bad network traffic.

IT Architect, Global 500 Professional Services Company

Case Study: Tembec


This case study of Tembec is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Greater visibility and the ability to zero in on the problem quickly. Ability to trace incidents back to source.”


  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Reduced mean-time-to-know (MTTK) root cause of network or security incidents
    • Enhanced network security posture
    • Increased efficiency in the identification of security threats
    • Increased flow collection, monitoring and analysis

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Incident Response
    • Network Forensics
    • Security Forensics
    • Network performance monitoring
  • Used Stealthwatch to detect or prevent the following security threats:
    • Network malware or virus
    • Suspicious user behavior
    • Compromised host
    • Network reconnaissance
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Monitoring a large, globally distributed network


  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Real-time flow monitoring capabilities
  • Selected Stealthwatch by Cisco over the following vendors:
    • Riverbed Cascade / Mazu Networks
    • Arbor Networks
    • NetQoS / CA
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Improved incident response and threat management
    • Enterprise-wide visibility into network activity
    • Forensic analysis
  • Reduced the time it took to mitigate a security incident by 50% to 74% by deploying Stealthwatch.
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Security: Much Better
    • Performance Monitoring: Better
    • Scalability: Better
    • Network Visibility: Better
    • Innovation: Better

Case Study: State & Local Government


This case study of a state & local government is based on a August 2015 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service. The profiled organization asked to have their name blinded to protect their confidentiality.

“With Stealthwatch, we enabled our security team to better investigate problems within our network and more efficiently remediate any issues.”

“Cisco is a great company that stands by their clients. Stealthwatch is not only selling a great product, it is also giving us an edge over breach resolution.”


  • Stealthwatch has helped improve the following:
    • Network baselining
    • Real-time threat detection
    • Incident response
    • Overall security posture
    • Network troubleshooting

Use Case

  • Stealthwatch has helped with:
    • Insider threats
    • DDoS attacks
    • Network performance
  • Is able to secure the following with Stealthwatch:
    • Virtual infrastructure/private clouds
    • IoT devices/systems
    • The data center


  • Stealthwatch System has helped their organization achieve the following:
    • Greater network visibility
    • Heightened threat intelligence
    • Enhanced visibility in the data center
    • Improved user identity awareness
    • More visibility into mobile devices
  • Found the following Stealthwatch capabilities to be the most beneficial:
    • Sophisticated security analytics/behavioral analysis
    • Context awareness (user, application, device data)
  • Compared to other security vendors, Cisco is:
    • Effective at detecting attacks
    • Innovative
    • Supportive of its customers
    • Easy to use
    • Easy to integrate with other security technologies
  • Stealthwatch enables the company to:
    • Better manage security with limited staff/resources
    • Accelerate threat detection and mitigation
    • Gain pervasive network visibility

Stealthwatch Customer Review Rating

How would you rate Cisco Stealthwatch?


More to Explore

About Cisco Stealthwatch

With Cisco Stealthwatch, organizations can improve both network security and performance, and avoid the high costs associated with downtime, security breaches and other issues.

Cisco Stealthwatch Website   Cisco Website