TechValidate Research on Cisco Stealthwatch

These pages present data that TechValidate has sourced via direct research with verified customers and users of Cisco Stealthwatch. TechValidate stands behind the authenticity of all published data. Learn more »



1,451 Customers Surveyed

11,552 Data Points Collected

422 Published TechFacts

51 Published Charts

71 Published Case Studies



Featured Research Collections for Cisco Stealthwatch

Curated collections and slideshows of TechValidate research data on Cisco Stealthwatch.



Selected Research Highlights


Case Study: Fortune 500 Health Care Company

Introduction

This case study of a fortune 500 health care company is based on a June 2014 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

Challenges

  • Purchased Cisco because it is differentiated from competitive products in the following areas:
    • Scalability up to 3 million flows per second
    • 1:1 Flows
    • Advanced behavioral detection
    • Flow analytics
    • Customer support

Use Case

  • Uses Stealthwatch with:
    • Full-packet capture system
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Monitoring a centralized network with a large number of satellite or retail locations

Results

  • The following are the greatest benefits of the internal visibility provided by Cisco Stealthwatch:
    • Monitors individual user activity & mobile devices
    • Continuous internal monitoring
    • Contextual & situational awareness
  • Agrees that Stealthwatch’s user / host-level information is critical for the following:
    • Security
    • Performance monitoring
    • Network troubleshooting
  • Rated Stealthwatch’s effectiveness in the following areas:
    • Detecting DDoS: extremely effective
    • Accelerating incident response and forensics: extremely effective
    • Detecting advanced persistent threats: extremely effective
    • Detecting insider threats / Suspicious behavior: extremely effective
    • Detecting malware / zero-day attacks: extremely effective
  • Rated how critical Cisco Stealthwatch is for the following:
    • Monitoring visibility: Critical
    • Improving security: Critical
    • Managing cyber security: Critical
    • Responding to cyber threats : Critical
  • Selected Stealthwatch by Cisco over the following vendors:
    • Riverbed Cascade / Mazu Networks
    • NetScout
    • Fluke / Visual Network systems

Cisco Stealthwatch Customer Research

Stealthwatch enables my organization to:

Detect threats faster
67%
Illuminate blind spots in the network
58%
Accelerate incident response
55%
Improve forensic investigations
54%
Use the Network as a Sensor
52%
Secure more areas of the network
43%
Reduce mean time to dwell for threats on the network
30%
Use the Network as an Enforcer
10%
Other
6%

Cisco Stealthwatch Customer Testimonial

We now have visibility within the data center – which was always a black box.

Senior IT Architect, Large Enterprise Energy & Utilities Company

Cisco StealthWatch Customer Testimonial

Customer Success is…….

Very responsive, and specifically tailored to my business. The people who usually help me out at Cisco, know the product inside and out, and they are always willing to lend a hand when I need help.

Chief Security Officer, Medium Enterprise Telecommunications Equipment Company

Detecting/Preventing Security Threats

Which of the following security threats have you used Stealthwatch to detect and/or prevent?

Advanced Persistent Threats
21%
Network Malware or Virus
79%
Suspicious user behavior
84%
External hacking attempt
47%
Compromised host
84%
Data loss / Exfiltration
21%
Command and Control traffic / Botnets
47%
Network reconnaissance
58%

Case Study: Medium Enterprise Pharmaceuticals Company

Introduction

This case study of a medium enterprise pharmaceuticals company is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“We lacked visibility into what was happening on the network previously. The intelligence that Cisco gives us is immeasurably valuable in terms of security response, forensics, and knowledge of what is happening on the network.”

Challenges

  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Reduced mean-time-to-know (MTTK) root cause of network or security incidents
    • Enhanced network security posture
    • Increased efficiency in the identification of security threats
    • Improved forensic analysis
    • Increased correlation of user identity and activity
    • Increased flow collection, monitoring and analysis

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Incident Response
    • Network Forensics
    • Security Forensics
  • Used Stealthwatch to detect or prevent the following security threats:
    • Network malware or virus
    • Suspicious user behavior
    • Compromised host
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Monitoring a large, globally distributed network

Results

  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Internal visibility
    • Forensics
    • Identity awareness
    • Application Aware Network Performance Monitoring
    • IPv6 monitoring
  • Selected Stealthwatch by Cisco over the following vendors:
    • Riverbed Cascade / Mazu Networks
    • Plixer
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Scalability and flexibility
    • Real-time threat detection and correlation with user identity data
    • Improved incident response and threat management
    • Enterprise-wide visibility into network activity
    • Deployment and support simplicity
    • Enterprise-wide user monitoring
    • Forensic analysis
  • Reduced the time it took to mitigate a security incident by > 75% by deploying Stealthwatch.
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Security: Better
    • Scalability: Better
    • Network Visibility: Better
    • Innovation: Much Better


More to Explore



About Cisco Stealthwatch

With Cisco Stealthwatch, organizations can improve both network security and performance, and avoid the high costs associated with downtime, security breaches and other issues.

Cisco Stealthwatch Website   Cisco Website