TechValidate Research on Cisco Secure Network Analytics

These pages present data that TechValidate has sourced via direct research with verified customers and users of Cisco Secure Network Analytics. TechValidate stands behind the authenticity of all published data. Learn more »



1,719 Customers Surveyed

14,055 Data Points Collected

590 Published TechFacts

63 Published Charts

71 Published Case Studies



Featured Research Collections for Cisco Secure Network Analytics

Curated collections and slideshows of TechValidate research data on Cisco Secure Network Analytics.



Selected Research Highlights


Cisco Stealthwatch Customer Testimonial

Stealthwatch…..

  • Improves visibility into the network traffic
  • Identifies different tools throughout a large organization
  • Helps IR team to track down malicious hosts

Engineer, Global 500 Beverage Company

Cisco Stealthwatch Customer Experience Customer Research

Compared to your other security vendors; how would you rate the Stealthwatch Customer Experience team?

Extremely better
28%
Significantly better
26%
Better
26%
Don’t know/not sure
17%
Worse
2%

Case Study: Stanford University

Introduction

This case study of Stanford University is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“[Cisco’s Stealthwatch] validates the fact that when a system is compromised/virused – we have the network information to back it up in the form of flows.”

Challenges

  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Enhanced network security posture
    • Improved forensic analysis
    • Increased flow collection, monitoring and analysis

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Incident Response
    • Network Forensics
    • Security Forensics
  • Used Stealthwatch to detect or prevent the following security threats:
    • Network malware or virus
    • Suspicious user behavior
    • External hacking attempt
    • Compromised host
    • Network reconnaissance
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Monitoring a centralized network with a large number of satellite or retail locations
    • Operating in a classified network with strictly controlled access to specific segments

Results

  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Real-time flow monitoring capabilities
    • Internal visibility
  • Selected Stealthwatch by Cisco over the following vendors:
    • Q1 Labs / IBM
    • Riverbed Cascade / Mazu Networks
    • Arbor Networks
    • In-house monitoring solution
    • Open source solution
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Real-time threat detection and correlation with user identity data
    • Enterprise-wide visibility into network activity
    • Deployment and support simplicity
    • Forensic analysis
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Security: Better
    • Performance Monitoring: Better
    • Scalability: Better
    • Network Visibility: Better
    • Innovation: Better

Cisco StealthWatch Customer Testimonial

Customer Success is…….

Very responsive, and specifically tailored to my business. The people who usually help me out at Cisco, know the product inside and out, and they are always willing to lend a hand when I need help.

Chief Security Officer, Medium Enterprise Telecommunications Equipment Company

Stealthwatch for Addressing Higher Education Security & Network Challenges

What types of operational challenges did the use of Stealthwatch by Cisco solve?

Reduction in Mean-Time-to-Know (MTTK) root cause of network or security incidents
47%
Improved in network performance
26%
Improved network security posture
84%
Improved in application performance
5%
Improved efficiency in the identification of security threats
68%
Improved forensic analysis
79%
Increased correlation of user identity and activity
32%
Increased visibility of mobile devices
11%
Increased flow collection, monitoring and analysis
79%
Enhanced compliance posture
11%

Case Study: Council Rock School District

Introduction

This case study of Council Rock School District is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Prior, I had no consolidated single view picture that provided, with a single click or two, the depth of information. I could get the depth, or the broad stroke, but not both. Cisco provided me with the visibility I needed.”

Challenges

  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Reduced mean-time-to-know (MTTK) root cause of network or security incidents
    • Enhanced network security posture
    • Increased efficiency in the identification of security threats
    • Improved forensic analysis
    • Increased correlation of user identity and activity, visibility of mobile devices, flow collection, monitoring and analysis

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Network Forensics
    • Security Forensics
    • Application performance monitoring
    • Network performance monitoring
  • Used Stealthwatch to detect or prevent the following security threats:
    • Suspicious user behavior
    • Network reconnaissance
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Monitoring a centralized network with a large number of satellite or retail locations

Results

  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Real-time flow monitoring capabilities
    • Internal visibility
    • Forensics
    • Auditing and compliance requirements
    • Identity awareness
    • Application Aware Network Performance Monitoring
  • Selected Stealthwatch by Cisco over the following vendors:
    • Open source solution
    • Cisco
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Scalability and flexibility
    • Real-time threat detection and correlation with user identity data
    • Improved incident response and threat management
    • Enterprise-wide visibility into network activity
    • Deployment and support simplicity
    • Enterprise-wide user monitoring
    • Forensic analysis
  • Reduced the time it took to mitigate a security incident by > 75% by deploying Stealthwatch.
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Security: Much Better
    • Performance Monitoring: Much Better
    • Scalability: Much Better
    • Network Visibility: Much Better
    • Innovation: Much Better


More to Explore



About Cisco Secure Network Analytics

With Cisco Stealthwatch, organizations can improve both network security and performance, and avoid the high costs associated with downtime, security breaches and other issues.

Cisco Secure Network Analytics Website   Cisco Website