TechValidate Research on Cisco Stealthwatch

These pages present data that TechValidate has sourced via direct research with verified customers and users of Cisco Stealthwatch. TechValidate stands behind the authenticity of all published data. Learn more »

1,439 Customers Surveyed

11,476 Data Points Collected

422 Published TechFacts

51 Published Charts

70 Published Case Studies

Featured Research Collections for Cisco Stealthwatch

Curated collections and slideshows of TechValidate research data on Cisco Stealthwatch.

Selected Research Highlights

Cisco Stealthwatch Customer Experience Customer Statistic

88% of surveyed customers based upon their interaction with the Stealthwatch Customer Experience organization, is likely to engage with Professional Services again.


Stealthwatch Enterprise Customer Research

Cisco Stealthwatch helps customers improve their security posture.

Provide visibility into what devices, users and applications are using the network
Investigate the source of the threat through network audit trails
Detect and prioritize advanced malicious attacks and insider threats in real-time
Mitigate threats using the existing network infrastructure
Simplify network segmentation by modeling and enforcing policies

Stealthwatch Critical for Response to Cyber Threats

89% of surveyed IT organizations rated Cisco Stealthwatch’s Responding to cyber threats as Critical.

Case Study: McKee Foods


This case study of is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“We have used Cisco to consolidate several tools including replacing our IDS system and reducing costs and time to locate network problems. It provides much greater visibility across our network of anomalies and problems than we have ever had.”


  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Improved in network performance
    • Enhanced network security posture
    • Increased efficiency in the identification of security threats
    • Increased correlation of user identity and activity
    • Increased flow collection, monitoring and analysis

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Network Forensics
    • Security Forensics
    • Application performance monitoring
    • Network performance monitoring
  • Used Stealthwatch to detect or prevent the following security threats:
    • Advanced persistent threats
    • Network malware or virus
    • Suspicious user behavior
    • External hacking attempt
    • Data loss/ exfiltration
    • Command and control traffic / botnets
    • Network reconnaissance
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Monitoring a centralized network with a large number of satellite or retail locations
    • Monitoring traffic within a virtual environment
    • Monitoring traffic within a data center, physical and virtual


  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Real-time flow monitoring capabilities
    • Internal visibility
    • Forensics
    • Scalability
  • Selected Stealthwatch by Cisco over the following vendors:
    • NetScout
    • In-house monitoring solution
    • Open source solution
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Scalability and flexibility
    • Improved incident response and threat management
    • Enterprise-wide visibility into network activity
    • Deployment and support simplicity
    • Enterprise-wide user monitoring
    • Forensic analysis
  • Reduced the time it took to mitigate a security incident by 50% to 74% by deploying Stealthwatch.
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Security: Much Better
    • Performance Monitoring: Much Better
    • Scalability: Much Better
    • Network Visibility: Much Better
    • Innovation: Better

Detecting/Preventing Security Threats

Which of the following security threats have you used Stealthwatch to detect and/or prevent?

Advanced Persistent Threats
Network Malware or Virus
Suspicious user behavior
External hacking attempt
Compromised host
Data loss / Exfiltration
Command and Control traffic / Botnets
Network reconnaissance

Case Study: Blue Cross Blue Shield Of Tennessee, Inc.


This case study of BlueCross BlueShield of Tennessee, Inc. is based on a November 2013 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.


  • Purchased Cisco because it is differentiated from competitive products in the following areas:
    • User centric monitoring
    • Advanced behavioral detection
    • Flow analytics
    • Customer support

Use Case

  • Is currently using Stealthwatch for:
    • Network analysis & visibility
  • Uses StealthWatch with:
    • Firewalls
    • IDS / IPS


  • The following are the greatest benefits of the internal visibility provided by Cisco Stealthwatch:
    • Faster Incident response
    • Forensics
    • Continuous internal monitoring
  • Agrees that Stealthwatch’s user/host-level information is critical for the following:
    • Security
    • Forensics
  • Rated Stealthwatch’s effectiveness in the following areas:
    • detecting DDoS: effective
    • accelerating incident response and forensics: extremely effective
    • detecting advanced persistent threats: uncertain
    • detecting insider threats / Suspicious behavior: effective
    • detecting malware / zero-day attacks: effective
  • Rated how critical Cisco Stealthwatch is for the following:
    • Monitoring visibility: very critical
    • Improving security: Critical
    • Managing cyber security: Critical
  • Ranks Cisco’s customer support as excellent.

More to Explore

About Cisco Stealthwatch

With Cisco Stealthwatch, organizations can improve both network security and performance, and avoid the high costs associated with downtime, security breaches and other issues.

Cisco Stealthwatch Website   Cisco Website