TechValidate Research on Cisco Secure Network Analytics

These pages present data that TechValidate has sourced via direct research with verified customers and users of Cisco Secure Network Analytics. TechValidate stands behind the authenticity of all published data. Learn more »



1,720 Customers Surveyed

14,065 Data Points Collected

590 Published TechFacts

63 Published Charts

71 Published Case Studies



Featured Research Collections for Cisco Secure Network Analytics

Curated collections and slideshows of TechValidate research data on Cisco Secure Network Analytics.



Selected Research Highlights


Cisco Stealthwatch Customer Experience Customer Research

How quickly were you able to recognize time to value from your engagement with Stealthwatch Customer Experience?

Immediately
24%
Less than 30 days
28%
Less than 90 days
15%
Less than 120 days
7%
More than 180 days
2%
Don’t know/not sure
24%

Network Security Ecosystem

Do you use Stealthwatch with the following tools to add situational awareness / context?

SIEM
43%
Firewalls
71%
IDS / IPS
56%
Full-packet capture system
40%
Other
5%

Cisco Secure Network Analytics Customer Satisfaction Rating

A Network Administrator at a medium enterprise telecommunications services company would be very likely to recommend Cisco Secure Network Analytics for this reason:

Secure Network Analytics is a very informative tool when it comes to network traffic anomaly detection.

Case Study: Stanford University

Introduction

This case study of Stanford University is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“[Cisco’s Stealthwatch] validates the fact that when a system is compromised/virused – we have the network information to back it up in the form of flows.”

Challenges

  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Enhanced network security posture
    • Improved forensic analysis
    • Increased flow collection, monitoring and analysis

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Incident Response
    • Network Forensics
    • Security Forensics
  • Used Stealthwatch to detect or prevent the following security threats:
    • Network malware or virus
    • Suspicious user behavior
    • External hacking attempt
    • Compromised host
    • Network reconnaissance
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Monitoring a centralized network with a large number of satellite or retail locations
    • Operating in a classified network with strictly controlled access to specific segments

Results

  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Real-time flow monitoring capabilities
    • Internal visibility
  • Selected Stealthwatch by Cisco over the following vendors:
    • Q1 Labs / IBM
    • Riverbed Cascade / Mazu Networks
    • Arbor Networks
    • In-house monitoring solution
    • Open source solution
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Real-time threat detection and correlation with user identity data
    • Enterprise-wide visibility into network activity
    • Deployment and support simplicity
    • Forensic analysis
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Security: Better
    • Performance Monitoring: Better
    • Scalability: Better
    • Network Visibility: Better
    • Innovation: Better

Cisco Stealthwatch Customer Statement

Cisco Systems Canada, Inc. has improved real-time threat detection, incident response, forensic investigations, overall security posture, and network troubleshooting with Stealthwatch.

Case Study: Medium Enterprise Banking Company

Introduction

This case study of a medium enterprise banking company is based on a June 2014 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“By increasing visibility into our network we are able to correlate data between our network TAPs and Firewall information to generate a ‘larger view’ of whats really going on in the network and from where.”

Challenges

  • Purchased Cisco because it is differentiated from competitive products in the following areas:
    • Scalability up to 3 million flows per second
    • Flow analytics
    • Value for price
    • Customer support
    • IPv6 and Cisco ISE integration!!!!

Use Case

  • Uses Stealthwatch with:
    • SIEM
    • Firewalls
    • Full-packet capture system
    • ISE
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Monitoring a centralized network with a large number of satellite or retail locations
    • Monitoring traffic within a data center, physical and virtual

Results

  • The following are the greatest benefits of the internal visibility provided by Cisco Stealthwatch:
    • Faster Incident response
    • Forensics
    • Monitors individual user activity & mobile devices
    • Continuous internal monitoring
    • Contextual & situational awareness
    • Meets auditing & compliance requirements
    • Cross-department collaboration
    • Integration with Cisco ISE
  • Agrees that Stealthwatch’s user/host-level information is critical for the following:
    • Security
    • Performance monitoring
    • Network troubleshooting
  • Rated Stealthwatch’s effectiveness in the following areas:
    • detecting DDoS: extremely effective
    • accelerating incident response and forensics: extremely effective
    • detecting advanced persistent threats: extremely effective
    • detecting insider threats / Suspicious behavior: extremely effective
    • detecting malware / zero-day attacks: extremely effective
  • Rated how critical Cisco Stealthwatch is for the following:
    • Monitoring visibility: very critical
    • Improving security: very critical
    • Managing cyber security: very critical
    • Responding to cyber threats : very critical
  • Selected Stealthwatch by Cisco over the following vendors:
    • Arbor Networks
    • NetScout
    • Plixer
    • Orion which is currently in place.


More to Explore



About Cisco Secure Network Analytics

With Cisco Stealthwatch, organizations can improve both network security and performance, and avoid the high costs associated with downtime, security breaches and other issues.

Cisco Secure Network Analytics Website   Cisco Website