TechValidate Research on Cisco Secure Network Analytics

These pages present data that TechValidate has sourced via direct research with verified customers and users of Cisco Secure Network Analytics. TechValidate stands behind the authenticity of all published data. Learn more »

1,720 Customers Surveyed

14,065 Data Points Collected

590 Published TechFacts

63 Published Charts

71 Published Case Studies

Featured Research Collections for Cisco Secure Network Analytics

Curated collections and slideshows of TechValidate research data on Cisco Secure Network Analytics.

Selected Research Highlights

Cisco vs. Competitors

What differentiates Cisco from other competitive products?

Scalability up to 3 million flows per second
1:1 Flows
User centric monitoring
Advanced behavioral detection
Flow analytics
Value for price
Customer support

Cisco Stealthwatch Customer Testimonial

Stealthwatch is so easy to implement. We got our system up and running in less than a week, and our network ops team were able to set up the netflow forwarding in under one day. I particularly like how you can search for ANY IP address and instantly see traffic and activity.

Chief Information Security Officer, Medium Enterprise Telecommunications Equipment Company

Cisco Secure Network Analytics Customer Satisfaction Rating

An IT Manager at a medium enterprise financial services company would be very likely to recommend Cisco Secure Network Analytics for this reason:


Stealthwatch applications are significant to educational institutes visibility & security.

How critical is Cisco’s Stealthwatch for:

Very Critical Critical Somewhat Critical Not Critical

Monitoring visibility
Improving security
Managing cyber security
Responding to cyber threats

Case Study: Stanford University


This case study of Stanford University is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“[Cisco’s Stealthwatch] validates the fact that when a system is compromised/virused – we have the network information to back it up in the form of flows.”


  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Enhanced network security posture
    • Improved forensic analysis
    • Increased flow collection, monitoring and analysis

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Incident Response
    • Network Forensics
    • Security Forensics
  • Used Stealthwatch to detect or prevent the following security threats:
    • Network malware or virus
    • Suspicious user behavior
    • External hacking attempt
    • Compromised host
    • Network reconnaissance
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Monitoring a centralized network with a large number of satellite or retail locations
    • Operating in a classified network with strictly controlled access to specific segments


  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Real-time flow monitoring capabilities
    • Internal visibility
  • Selected Stealthwatch by Cisco over the following vendors:
    • Q1 Labs / IBM
    • Riverbed Cascade / Mazu Networks
    • Arbor Networks
    • In-house monitoring solution
    • Open source solution
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Real-time threat detection and correlation with user identity data
    • Enterprise-wide visibility into network activity
    • Deployment and support simplicity
    • Forensic analysis
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Security: Better
    • Performance Monitoring: Better
    • Scalability: Better
    • Network Visibility: Better
    • Innovation: Better

Case Study: Yale New Haven Hospital


This case study of Yale-New Haven Hospital is based on a November 2013 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.


  • Purchased Cisco because it is differentiated from competitive products in the following areas:
    • Value for price
    • Customer support

Use Case

  • Is currently using Stealthwatch for:
    • Specialized threat analysis & protection
    • Network analysis & visibility
    • Advanced threat detection
    • Network performance monitoring & diagnostics
  • Uses Stealthwatch with:
    • SIEM


  • The following are the greatest benefits of the internal visibility provided by Cisco Stealthwatch:
    • Forensics
    • Continuous internal monitoring
  • Agrees that Stealthwatch’s user/host-level information is critical for the following:
    • Security
    • Performance monitoring
    • Forensics
    • Compliance
    • Network troubleshooting
  • Rated Stealthwatch’s effectiveness in the following areas:
    • detecting DDoS: effective
    • accelerating incident response and forensics: effective
    • detecting advanced persistent threats: effective
    • detecting insider threats / Suspicious behavior: effective
    • detecting malware / zero-day attacks: effective
  • Saves hours per incident for determining Mean-Time-To-Identify threats and Mean-Time-To-Know root cause using Stealthwatch.
  • Rated how critical Cisco Stealthwatch is for the following:
    • Monitoring visibility: Critical
    • Improving security: somewhat critical
    • Managing cyber security: somewhat critical
    • Responding to cyber threats : Not Critical
  • Ranks Cisco’s customer support as above average.

More to Explore

About Cisco Secure Network Analytics

With Cisco Stealthwatch, organizations can improve both network security and performance, and avoid the high costs associated with downtime, security breaches and other issues.

Cisco Secure Network Analytics Website   Cisco Website