TechValidate Research on Cisco Stealthwatch

70 Case Studies – Page 1 of 3


Cisco Stealthwatch Case Study

With Stealthwatch, Omega Exim Limited gains multi-layered visibility into malware, insider threats, encrypted traffic and much more.

Introduction

This case study of Omega Exim Limited is based on an August 2019 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Stealthwatch is a must-have component of our security posture.”

Challenges

The business challenges that led Omega Exim Limited to evaluate and ultimately select Cisco Stealthwatch:

  • A lack of visibility into a complex network with branches, IoT devices, remote employees and guests, cloud infrastructure, etc.
  • A lack of a threat investigation and forensic analysis tool
  • Protecting sensitive data
  • Detection of insider threats
  • Analyzing encrypted traffic without decryption
  • Real-time malware detection
  • Compliance requirements
  • Creating and enforcing segmentation policies

Major security concerns related to cloud infrastructure are:

  • Misconfigured assets
  • Data loss
  • Abuse of cloud services leading to disruption or huge bills

Use Case

Omega Exim Limited chose Stealthwatch for its:

  • Comprehensive visibility
  • Advanced security analytics using machine learning and entity modeling
  • Existing network infrastructure
  • Scalability
  • Integration with other Cisco products and technologies
  • Ability to analyze encrypted traffic without decryption

Results

Utilizing Stealthwatch, Omega Exim Limited was able to:

  • Detect and prioritize advanced malicious attacks and insider threats in real-time
  • Investigate the source of the threat through network audit trails
  • Mitigate threats using the existing network infrastructure
  • Simplify network segmentation by modeling and enforcing policies
  • Provide visibility into what devices, users and applications are using the network

Cisco Stealthwatch Case Study

Orange PLC Utilizes Stealthwatch to Detect Threats in Encrypted Traffic.

Introduction

This case study of Orange PLC is based on an August 2019 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Stealthwatch is a must-have component of our security posture.”

Challenges

The business challenges that led Orange PLC to evaluate and ultimately select Cisco Stealthwatch:

  • A lack of visibility into a complex network with branches, IoT devices, remote employees and guests, cloud infrastructure, etc.
  • A lack of a threat investigation and forensic analysis tool
  • Protecting sensitive data
  • Detection of insider threats
  • Analyzing encrypted traffic without decryption
  • Real-time malware detection
  • Compliance requirements
  • Creating and enforcing segmentation policies

Major security concerns related to cloud infrastructure are:

  • Unauthorized access
  • Data loss

Use Case

Orange PLC chose Stealthwatch for its:

  • Comprehensive visibility
  • Advanced security analytics using machine learning and entity modeling
  • Ability to analyze encrypted traffic without decryption
  • WAN traffic visibility

Results

Utilizing Cisco Stealthwatch, Orange PLC was able to:

  • Detect and prioritize advanced malicious attacks and insider threats in real-time
  • Provide visibility into what devices, users and applications are using the network
  • Detect malware in encrypted traffic without decryption

Cisco Stealthwatch Case Study

Tata Consultancy Services detected 25% more threats and reduced incident response time by 5 days using Stealthwatch.

Introduction

This case study of a Global 500 computer services company is based on an August 2019 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Improved network visibility by 50%”

Challenges

The business challenges that led Tata Consultancy Services to evaluate and ultimately select Cisco Stealthwatch:

  • A lack of visibility into a complex network with branches, IoT devices, remote employees and guests, cloud infrastructure, etc.
  • A lack of a threat investigation and forensic analysis tool
  • Protecting sensitive data
  • Detection of insider threats
  • Analyzing encrypted traffic without decryption
  • Real-time malware detection
  • Compliance requirements
  • Creating and enforcing segmentation policies

Major security concerns related to cloud infrastructure are:

  • Misconfigured assets
  • Unauthorized access
  • Data loss
  • Insider threats – as a result of stolen credentials or malicious employee
  • Abuse of cloud services leading to disruption or huge bills

Use Case

Tata Consultancy Services chose Stealthwatch for its:

  • Comprehensive visibility
  • Advanced security analytics using machine learning and entity modeling
  • Existing network infrastructure
  • Scalability
  • Integration with other Cisco products and technologies
  • Ability to analyze encrypted traffic without decryption
  • Reputation/recommendation

Results

Utilizing Stealthwatch, Tata Consultancy Services was able to:

  • Detect and prioritize advanced malicious attacks and insider threats in real-time
  • Investigate the source of the threat through network audit trails
  • Mitigate threats using the existing network infrastructure
  • Simplify network segmentation by modeling and enforcing policies
  • Provide visibility into what devices, users and applications are using the network
  • Enhance value provided by other Cisco devices

Cisco Stealthwatch Case Study

Through the power of Stealthwatch, Banco Pichincha is able to increase network visibility by 90%.

Introduction

This case study of Banco Pichincha is based on an August 2019 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Stealthwatch increased our network visibility by 90%”

Challenges

The business challenges that led Banco Pichincha to evaluate and ultimately select Cisco Stealthwatch:

  • A lack of visibility into a complex network with branches, IoT devices, remote employees and guests, cloud infrastructure, etc.
  • Protecting sensitive data
  • Detection of insider threats
  • Analyzing encrypted traffic without decryption
  • Real-time malware detection
  • Compliance requirements

Major security concerns related to cloud infrastructure are:

  • Data loss
  • Insider threats – as a result of stolen credentials or malicious employee
  • Abuse of cloud services leading to disruption or huge bills

Use Case

Banco Pichincha chose Stealthwatch for its:

  • Comprehensive visibility
  • Advanced security analytics using machine learning and entity modeling
  • Integration with other Cisco products and technologies

Results

Utilizing Stealthwatch, Banco Pichincha was able to:

  • Detect and prioritize advanced malicious attacks and insider threats in real-time
  • Investigate the source of the threat through network audit trails
  • Enhance value provided by other Cisco devices

Cisco Stealthwatch Case Study

Stealthwatch Boosts Threat Detection by 50% for Woodforest Financial Group, Inc.

Introduction

This case study of Woodforest Financial Group, Inc. is based on an August 2019 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Stealthwatch has increased our ability to detect threats. Since deploying it we have seen a 50% increase in early threat detection. Stealthwatch, when integrated with ISE, provides a method for automatically quarantining detected threats.

Challenges

The business challenges that led Woodforest Financial Group, Inc. to evaluate and ultimately select Cisco Stealthwatch:

  • A lack of visibility into a complex network with branches, IoT devices, remote employees and guests, cloud infrastructure, etc.
  • A lack of a threat investigation and forensic analysis tool
  • Protection of sensitive data
  • Detection of insider threats
  • Real-time malware detection

Major security concerns related to cloud infrastructure are:

  • Unauthorized access
  • Data loss
  • Insider threats – as a result of stolen credentials or malicious employee

Use Case

Woodforest Financial Group, Inc. chose Stealthwatch for its:

  • Comprehensive visibility
  • Advanced security analytics using machine learning and entity modeling
  • Integration with other Cisco products and technologies

Results

Utilizing Stealthwatch, Foodforest Financial Group, Inc was able to:

  • Detect and prioritize advanced malicious attacks and insider threats in real-time
  • Investigate the source of the threat through network audit trails
  • Mitigate threats using the existing network infrastructure
  • Enhance value provided by other Cisco devices

Stealthwatch Case Study

Cuprum Sa De Cv

Introduction

This case study of CUPRUM SA de CV is based on a March 2018 survey of Stealthwatch customers by TechValidate, a 3rd-party research service.

“Cisco Stealthwatch has reduced the time to detect and remediate threats within our organization from months to hours. It is very helpful to create a security context in order to make an enforcement decision. Stealthwatch has helped us to detect traffic with anomalous behavior, as well as to improve some of our IT processes.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select Stealthwatch:

  • Faced the following challenges before their network visibility and security analytics solution:
    • Lack of visibility into a complex network with branches, IoT devices, remote employees and guests, cloud infrastructure
    • Detection of insider threats
    • Threat mitigation
    • Creating and enforcing segmentation policies

Use Case

The key features and functionalities of Stealthwatch that the surveyed company uses:

  • Uses Stealthwatch to gain visibility into:
    • Data centers
    • Core

Results

The surveyed company achieved the following results with Stealthwatch:

  • Uses Stealthwatch to:
    • Investigate the source of the threat through network audit trails
    • Simplify network segmentation by modeling and enforcing policies

Stealthwatch Case Study

Global 500 Energy & Utilities Company

Introduction

This case study of a Global 500 energy & utilities company is based on a March 2018 survey of Stealthwatch customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Cisco Stealthwatch is very easy to setup and configure, and it does what we want. It has reduced the time to detect and remediate threats within our organization from months to hours. One of the features we have found to be most useful is the additional user context and ability to quarantine infected hosts that is available through the integration with Cisco Identity Services Engine (ISE).”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select Stealthwatch:

  • Faced the following challenges before their network visibility and security analytics solution:
    • Lack of visibility into a complex network with branches, IoT devices, remote employees and guests, cloud infrastructure

Use Case

The key features and functionalities of Stealthwatch that the surveyed company uses:

  • Uses Stealthwatch to gain visibility into:
    • Data centers
    • Access
    • Edge
    • Core

Results

The surveyed company achieved the following results with Stealthwatch:

  • Uses Stealthwatch to help with:
    • Investigating the source of the threat through network audit trails

Stealthwatch Case Study

Large Enterprise Chemicals Company

Introduction

This case study of a large enterprise chemicals company is based on a March 2018 survey of Stealthwatch customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Cisco Stealthwatch is easy to setup. One of the features we have found to be most useful is the additional user context and ability to quarantine infected hosts that is available through the integration with Cisco Identity Services Engine (ISE).”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select Stealthwatch:

  • Faced the following challenges before their network visibility and security analytics solution:
    • Lack of visibility into a complex network with branches, IoT devices, remote employees and guests, cloud infrastructure

Use Case

The key features and functionalities of Stealthwatch that the surveyed company uses:

  • Uses Stealthwatch to gain visibility into:
    • Data centers
    • Access
    • Edge
    • Core

Results

The surveyed company achieved the following results with Stealthwatch:

  • Uses Stealthwatch Enterprise to:
    • Investigate the source of the threat through network audit trails
    • Simplify network segmentation by modeling and enforcing policies

Stealthwatch Case Study

Fortune 500 Construction Company

Introduction

This case study of a Fortune 500 construction company is based on a March 2018 survey of Stealthwatch customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Cisco Stealthwatch provides excellent visibility into the network traffic passing through our NetFlow collectors. It helps us to understand what hosts are talking with each other, the data volume, data rate and NetFlow duration for each conversation, as well as what applications were used. In other words, it provides us much-needed information about the traffic is transiting our networks.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select Stealthwatch:

  • Faced the following challenges before their network visibility and security analytics solution:
    • Lack of visibility into a complex network with branches, IoT devices, remote employees and guests, cloud infrastructure
    • Protecting sensitive data
    • Detection of insider threats
    • Real-time malware detection
    • Threat mitigation

Use Case

The key features and functionalities of Stealthwatch that the surveyed company uses:

  • Uses Stealthwatch to gain visibility into:
    • Data centers
    • Application usage
    • Virtualized infrastructure

Results

The surveyed company achieved the following results with Stealthwatch:

  • Uses Stealthwatch to:
    • Detect and prioritize advanced malicious attacks and insider threats in real-time
    • Investigate the source of the threat through network audit trails
    • Mitigate threats using the existing network infrastructure
    • Gain visibility into what devices, users and applications are using the network

Stealthwatch Case Study

Lexmark International, Inc.

Introduction

This case study of Lexmark International, Inc. is based on a March 2018 survey of Stealthwatch customers by TechValidate, a 3rd-party research service.

“Cisco Stealthwatch is very helpful in conducting forensic investigation and monitoring ongoing threat. It has reduced the time to detect and remediate threats within our organization from months to hours. One of the features we have found to be most useful is the additional user context and ability to quarantine infected hosts that is available through the integration with Cisco Identity Services Engine (ISE).”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select Stealthwatch:

  • Faced the following challenges before their network visibility and security analytics solution:
    • Lack of visibility into a complex network with branches, IoT devices, remote employees and guests, cloud infrastructure
    • Lack of a threat investigation and forensic analysis tool
    • Detection of insider threats
    • Real-time malware detection
    • Threat mitigation
    • Creating and enforcing segmentation policies

Use Case

The key features and functionalities of Stealthwatch that the surveyed company uses:

  • Uses Stealthwatch to gain visibility into:
    • Data centers
    • Access
    • Core
    • User data
    • IoT devices

Results

The surveyed company achieved the following results with Stealthwatch:

  • Uses Stealthwatch to:
    • Detect and prioritize advanced malicious attacks and insider threats in real-time
    • Investigate the source of the threat through network audit trails
    • Gain visibility into what devices, users and applications are using the network

Cisco Stealthwatch Case Study

Elavon Merchant Services

Introduction

This case study of Elavon Merchant Services is based on a September 2016 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Stealthwatch protects my previous investments by allowing me to do more with my existing security tools.”

“Stealthwatch has dramatically improved my organization’s security posture.”

“Stealthwatch has helped Elavon increase visibility of our network’s edge points by 75 percent and it does a wonderful job in helping us to detect traffic anomalies in a few minutes. It has saved us lots of money, but more importantly, it helps us to maintain our priceless reputation as a very secure financial services company!”

“I love Stealthwatch because it makes security easier!”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select Cisco Stealthwatch:

  • Uses Stealthwatch to gain visibility into the following:
    • Edge
    • Application usage

Use Case

The key features and functionalities of Cisco Stealthwatch that the surveyed company uses:

  • Uses Stealthwatch for the following reasons:
    • Improve network performance
    • Conduct forensic investigations
    • Proactively hunt for threats on the network
    • Prevent DDoS attacks
    • Enforce policy

Results

The surveyed company achieved the following results with Cisco Stealthwatch:

  • Uses Stealthwatch for the following reasons:
    • Improve security efficacy
    • Reduce enterprise risk
    • Improve regulatory compliance
  • Uses Stealthwatch to enable the following:
    • Detect threats faster
    • Reduce mean time to dwell for threats on the network
    • Accelerate incident response
    • Improve forensic investigations
    • Use the network as a sensor
  • Rates their experience with Stealthwatch’s proposed benefits to be as follows:
    • Simple, easy to use: agree
    • Open, easy to integrate: agree
    • Automated, reduces manual work: agree
    • Effective, enhances security: strongly agree

Cisco Stealthwatch Case Study

Norfolk Southern Corporation

Introduction

This case study of Norfolk Southern Corporation is based on a September 2016 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Stealthwatch protects my previous investments by allowing me to do more with my existing security tools.”

“Stealthwatch has dramatically improved my organization’s security posture.”

“With quick access to NetFlow, we can easily get to the root of any investigation with absolute certainty of what happened and when.”

I love Stealthwatch because “it works for what I need and it is extremely intuitive; this way I don’t have to run around training everyone on the platform.”

Challenges

Norfolk Southern Corporation uses Stealthwatch to gain visibility into the following:

  • Data centers
  • Access
  • Edge
  • Core
  • User data
  • Mobile devices
  • Application usage
  • Virtualized infrastructure

Use Case

Norfolk Southern Corporation uses Stealthwatch for the following reasons:

  • Segment the network
  • Combat insider threats
  • Identify malware and APTs
  • Improve network performance
  • Conduct forensic investigations
  • Proactively hunt for threats on the network

Results

Norfolk Southern Corporation achieved the following results with Cisco Stealthwatch:

  • Uses Stealthwatch for the following reasons:
    • Improve security efficacy
    • Reduce enterprise risk
    • Maintain a competitive advantage
    • Better serve customers/partners
    • Increase operational efficiency
    • Improve regulatory compliance
  • Uses Stealthwatch to enable the following:
    • Detect threats faster
    • Illuminate blind spots in the network
    • Reduce mean time to dwell for threats on the network
    • Accelerate incident response
    • Improve forensic investigations
    • Use the network as a sensor
    • Use the network as an enforcer
  • Rates their experience with Stealthwatch’s proposed benefits to be as follows:
    • Simple, easy to use: very strongly agree
    • Ppen, easy to integrate: very strongly agree
    • Automated, reduces manual work: very strongly agree
    • Effective, enhances security: very strongly agree

Cisco Stealthwatch Case Study

Logistics Manager

Introduction

This case study of Logistics Manager is based on a September 2016 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Stealthwatch protects my previous investments by allowing me to do more with my existing security tools.”

“Stealthwatch has dramatically improved my organization’s security posture.”

I love Stealthwatch because “it helps to reduce risk and threats.”

“Helps protect the company assets.”

Challenges

Logistics Manager uses Stealthwatch to gain visibility into the following:

  • Data centers
  • Access
  • User data
  • Mobile devices
  • Application usage

Use Case

Logistics Manager uses Stealthwatch for the following reasons:

  • Segment the network
  • Combat insider threats
  • Prevent ransomware attacks

Logistics Manager has integrated Stealthwatch with the Cisco Identity Services Engine (ISE).

Results

Logistics Manager achieved the following results with Cisco Stealthwatch:

  • Uses Stealthwatch for the following reasons:
    • Improve security efficacy
    • Reduce enterprise risk
    • Maintain a competitive advantage
  • Uses Stealthwatch to enable the following:
    • Detect threats faster
    • Illuminate blind spots in the network
    • Reduce mean time to dwell for threats on the network
  • Rates their experience with Stealthwatch’s proposed benefits to be as follows:
    • Simple, easy to use: very strongly agree
    • Open, easy to integrate: very strongly agree
    • Automated, reduces manual work: very strongly agree

Cisco Stealthwatch Case Study

Viacom

Introduction

This case study of Viacom is based on a September 2016 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Stealthwatch protects my previous investments by allowing me to do more with my existing security tools.”

“Stealthwatch helped to identify the traffic and usage on the WAN link.”

I love Stealthwatch because “it gives me more visibility into our network.”

Challenges

Viacom uses Stealthwatch to gain visibility into the following:

  • Access
  • Application usage

Use Case

Viacom uses Stealthwatch for the following reasons:

  • Improve network performance
  • Prevent DDoS attacks

Results

Viacom uses Stealthwatch for the following reasons:

  • Improve security efficacy
  • Protect intellectual property
  • Increase operational efficiency
  • Viacom uses Stealthwatch to enable the following:
    • Detect threats faster
    • Reduce mean time to dwell for threats on the network
    • Accelerate incident response
  • Rates their experience with Stealthwatch’s proposed benefits to be as follows:
    • Simple, easy to use: strongly agree
    • Open, easy to integrate: strongly agree
    • Automated, reduces manual work: strongly agree
    • Effective, enhances security: strongly agree

Cisco Stealthwatch Case Study

Montefiore Medical Center

Introduction

This case study of Montefiore Medical Center is based on a September 2016 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Stealthwatch protects my previous investments by allowing me to do more with my existing security tools.”

“Stealthwatch has dramatically improved my organization’s security posture.”

For Montefiore Medical Center, Stealthwatch has:
1. Detected illegal scanning from compromised devices
2. Detected scanning from unknown devices
3. Helped identify medical devices not previously counted
4. Helped with ransomware investigations
5. Excellent continuously monitoring of critical & vulnerable assets

“I love Stealthwatch because it gives me a snapshot of what, how, and where the traffic on my network is doing.”

Challenges

The business challenges that led Montefiore Medical Center to evaluate and ultimately select Cisco Stealthwatch:

  • Uses Stealthwatch to gain visibility into the following:
    • Data centers
    • Core
    • User data
    • Mobile devices
    • Application usage
    • Virtualized infrastructure
    • Cloud environments
    • IoT devices

Use Case

Montefiore Medical Center uses Stealthwatch for the following reasons:

  • Combat insider threats
  • Identify malware and APTs
  • Conduct forensic investigations
  • Proactively hunt for threats on the network

Results

Montefiore Medical Center achieved the following results with Cisco Stealthwatch:

  • Uses Stealthwatch for the following reasons:
    • Improve security efficacy
    • Reduce enterprise risk
    • Protect intellectual property
    • Improve regulatory compliance
  • Uses Stealthwatch to enable the following:
    • Detect threats faster
    • Secure more areas of the network
    • Illuminate blind spots in the network
    • Accelerate incident response
    • Improve forensic investigations
  • Rates their experience with Stealthwatch’s proposed benefits to be as follows:
    • Simple, easy to use: strongly agree
    • Open, easy to integrate: very strongly agree
    • Automated, reduces manual work: very strongly agree
    • Effective, enhances security: very strongly agree

Cisco Stealthwatch Case Study

Asiacell (Iraq)

Introduction

This case study of Asiacell (Iraq) is based on a September 2016 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Stealthwatch protects my previous investments by allowing me to do more with my existing security tools.”

“Stealthwatch has dramatically improved my organization’s security posture.”

Stealthwatch is "easy to use, very user-friendly, ideal for troubleshooting, "

Challenges

The business challenges that led Asiacell (Iraq) to evaluate and ultimately select Cisco Stealthwatch:

  • Uses Stealthwatch to gain visibility into the following:
    • Data centers
    • Access
    • Edge
    • Core
    • User data
    • Virtualized infrastructure

Use Case

The key features and functionalities of Cisco Stealthwatch that Asiacell (Iraq) uses:

  • Uses Stealthwatch for the following reasons:
    • Segment the network
    • Combat insider threats
    • Identify malware and APTs
    • Prevent ransomware attacks
    • Improve network performance
    • Prevent DDoS attacks
    • Enforce policy

Results

Asiacell (Iraq) achieved the following results with Cisco Stealthwatch:

  • Uses Stealthwatch for the following reasons:
    • Improve security efficacy
    • Reduce enterprise risk
    • Increase operational efficiency
    • Improve regulatory compliance
  • Uses Stealthwatch to enable the following:
    • Detect threats faster
    • Secure more areas of the network
    • Accelerate incident response
    • Improve forensic investigations
    • Use the network as a sensor
    • Use the network as an enforcer
  • Rates their experience with Stealthwatch’s proposed benefits to be as follows:
    • Simple, easy to use: very strongly agree
    • Open, easy to integrate: very strongly agree
    • Automated, reduces manual work: very strongly agree
    • Effective, enhances security: very strongly agree

Cisco StealthWatch Case Study

The University Of Chicago

Introduction

This case study of The University of Chicago is based on an April 2016 survey of Cisco StealthWatch customers by TechValidate, a 3rd-party research service.

“Stealthwatch has delivered a strong benefit to our organization, providing a fast return on investment.”

“Support and resources have been especially invaluable when building a baseline and strengthening our initial Stealthwatch configuration.”

“Timeliness has been very important, especially compared to other vendors who can take weeks or even months in some cases to escalate or respond. Our interactions have a sense of ownership on both ends.”

Challenges

The University of Chicago has improved in the following areas as a result of working with the Customer Success team for Cisco Stealthwatch:

  • Network baselining
  • Incident response
  • Overall security posture
  • Network troubleshooting

Use Case

The University of Chicago realized the following benefits from their engagement with Stealthwatch:

  • Faster threat detection
  • Secure more of their network (devices, remote locations, etc.)
  • Detect different types of potential threats on their network
  • Integrate Stealthwatch with other security tools

Results

By engaging with the Customer Success team, the University of Chicago achieved the following results with Stealthwatch:

  • Faster time to value
  • Time to value in less than 30 days
  • Rates Stealthwatch Customer Success team to be better than competitors in the following areas:
    • Concerned about the client’s success
    • Effortless to work with
    • Cost effective
  • Rates Stealthwatch Customer Success team as much better than other security vendors.
  • Rates their likelihood for re-engaging with the Stealthwatch Customer Success team in the following areas:
    • Learning & Development/Training: very likely
    • Support: extremely likely

Cisco Stealthwatch Case Study

Supreme Court of Virginia

Introduction

This case study of Supreme Court of Virginia is based on a September 2016 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Stealthwatch protects my previous investments by allowing me to do more with my existing security tools.”

“Stealthwatch has dramatically improved my organization’s security posture.”

“Stealthwatch provides the ability to gain detailed visibility into all areas of our network. This has made a significant impact on our security posture and operational control.”

“I love Stealthwatch because it allows us to quickly identify network traffic anomalies or problems.”

Challenges

The business challenges that led the Supreme Court of Virginia to evaluate and ultimately select Cisco Stealthwatch:

  • Uses Stealthwatch to gain visibility into the following:
    • Data centers
    • Access
    • Edge
    • Core
    • Mobile devices
    • Virtualized infrastructure
    • Cloud environments

Use Case

The key features and functionalities of Cisco Stealthwatch that the Supreme Court of Virginia uses:

  • Uses Stealthwatch for the following reasons:
    • Combat insider threats
    • Improve network performance
    • Proactively hunt for threats on the network

The Supreme Court of Virginia has integrated Stealthwatch with the Identity Services Engine (ISE).

Results

The surveyed organization achieved the following results with Cisco Stealthwatch:

  • Uses Stealthwatch for the following reasons:
    • Improve security efficacy
    • Reduce enterprise risk
    • Increase operational efficiency
  • Uses Stealthwatch to enable the following:
    • Detect threats faster
    • Secure more areas of the network
    • Illuminate blind spots in the network
    • Reduce mean time to dwell for threats on the network
    • Accelerate incident response
  • Rates their experience with Stealthwatch’s proposed benefits to be as follows:
    • Simple, easy to use: very strongly agree
    • Open, easy to integrate: very strongly agree
    • Automated, reduces manual work: very strongly agree
    • Effective, enhances security: very strongly agree

Cisco Stealthwatch Case Study

Hodgson Russ LLP

Introduction

This case study of Hodgson Russ LLP is based on a September 2016 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Stealthwatch protects my previous investments by allowing me to do more with my existing security tools.”

“Stealthwatch has dramatically improved my organization’s security posture.”

“During the pilot Stealthwatch showed it’s worth by identifying a Kindle that had Malware on our guest Wi-Fi. Since the pilot we have been using Stealthwatch to identify anomalies in our network every day.”

“I love Stealthwatch because it fills the void of identifying threats in the areas of the network we cannot see.”

Challenges

The business challenges that led Hodgson Russ LLP to evaluate and ultimately select Cisco Stealthwatch:

  • Uses Stealthwatch to gain visibility into the following:
    • Data centers
    • Access
    • Core
    • Mobile devices
    • Virtualized infrastructure

Use Case

The key features and functionalities of Cisco Stealthwatch that Hodgson Russ LLP uses:

  • Uses Stealthwatch for the following reasons:
    • Identify malware and APTs
    • Prevent ransomware attacks

Hodgson Russ LLP has integrated Stealthwatch with the Identity Services Engine (ISE).

Results

Hodgson Russ LLP achieved the following results with Cisco Stealthwatch:

  • Uses Stealthwatch for the following reasons:
    • Reduce enterprise risk
    • Maintain a competitive advantage
    • Increase operational efficiency
  • Uses Stealthwatch to enable the following:
    • Detect threats faster
    • Secure more areas of the network
    • Illuminate blind spots in the network
    • Use the network as a sensor
  • Rates their experience with Stealthwatch’s proposed benefits to be as follows:
    • Simple, easy to use: strongly agree
    • Open, easy to integrate: strongly agree
    • Automated, reduces manual work: strongly agree
    • Effective, enhances security: very strongly agree

Cisco Stealthwatch Case Study

Deloitte & Touche

Introduction

This case study of Deloitte & Touche is based on a September 2016 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Stealthwatch protects my previous investments by allowing me to do more with my existing security tools.”

“Stealthwatch has dramatically improved my organization’s security posture.”

“Stealthwatch provides industry-leading network visibility and security intelligence. It gives you a single view into the lateral movement of traffic in the network and the ability to satisfy regulatory requirements.”

-Naveen Varma Chintalapati, Chief Technology Officer, Deloitte & Touche

Challenges

The business challenges that led Deloitte & Touche to evaluate and ultimately select Cisco Stealthwatch:

  • Uses Cisco Stealthwatch to gain visibility into the following:
    • Data centers
    • Access
    • Mobile devices
    • Application usage
    • Virtualized infrastructure
    • Cloud environments

Use Case

The key features and functionalities of Cisco Stealthwatch that Deloitte & Touche uses:

  • Uses Cisco Stealthwatch for the following reasons:
    • Segment the network
    • Combat insider threats
    • Identify malware and APTs
    • Improve network performance
    • Conduct forensic investigations
    • Proactively hunt for threats on the network
    • Prevent DDoS attacks
    • Enforce policy

Deloitte & Touche has integrated Cisco Stealthwatch with the Cisco Identity Services Engine (ISE).

Results

Deloitte & Touche achieved the following results with Cisco Stealthwatch:

  • Uses Cisco Stealthwatch for the following reasons:
    • Improve security efficacy
    • Reduce enterprise risk
    • Maintain a competitive advantage
    • Protect intellectual property
    • Better serve customers/partners
    • Increase operational efficiency
    • Improve regulatory compliance
  • Uses Cisco Stealthwatch to enable the following:
    • Secure more areas of the network
    • Illuminate blind spots in the network
    • Reduce mean time to dwell for threats on the network
    • Improve forensic investigations
    • Use the network as a sensor
  • Rates their experience with Cisco Stealthwatch’s proposed benefits to be as follows:
    • Simple, easy to use: very strongly agree
    • Open, easy to integrate: very strongly agree
    • Automated, reduces manual work: very strongly agree
    • Effective, enhances security: very strongly agree

Cisco Stealthwatch Case Study

Horizon Blue Cross Blue Shield of NJ

Introduction

This case study of Horizon Blue Cross Blue Shield of NJ is based on a September 2016 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Stealthwatch protects my previous investments by allowing me to do more with my existing security tools.”

“Stealthwatch has dramatically improved my organization’s security posture.”

Challenges

The business challenges that led Horizon Blue Cross Blue Shield of NJ to evaluate and ultimately select Cisco Stealthwatch:

  • Uses Stealthwatch to gain visibility into the following:
    • Application usage
    • Virtualized infrastructure

Use Case

The key features and functionalities of Cisco Stealthwatch that the surveyed company uses:

  • Uses Stealthwatch for the following reasons:
    • Identify malware and APTs
    • Improve network performance
    • Proactively hunt for threats on the network
    • Prevent DDoS attacks
    • Enforce policy

Horizon Blue Cross Blue Shield of NJ has integrated Stealthwatch with the Identity Services Engine (ISE).

Results

The surveyed company achieved the following results with Cisco Stealthwatch:

  • Uses Stealthwatch for the following reasons:
    • Improve security efficacy
    • Reduce enterprise risk
    • Maintain a competitive advantage
    • Protect intellectual property
    • Better serve customers/partners
    • Increase operational efficiency
    • Improve regulatory compliance
  • Uses Stealthwatch to enable the following:
    • Detect threats faster
    • Secure more areas of the network
    • Illuminate blind spots in the network
    • Reduce mean time to dwell on threats on the network
    • Accelerate incident response
    • Improve forensic investigations
    • Use the network as an enforcer
  • Rates their experience with Stealthwatch’s proposed benefits to be as follows:
    • Simple, easy to use: strongly agree
    • Open, easy to integrate: strongly agree
    • Automated, reduces manual work: strongly agree

Cisco Stealthwatch Case Study

Erie Insurance

Introduction

This case study of Erie Insurance is based on a September 2016 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Stealthwatch protects my previous investments by allowing me to do more with my existing security tools.”

“Stealthwatch has dramatically improved my organization’s security posture.”

“Stealthwatch improved our self-assessment scores for the 20 Critical Security Controls (version 5.1) 21% for CSC5 Malware Defense and 27% for Boundary Defense.”

“I love Stealthwatch because of the integration with other technologies, the visibility, and insight into all areas of our network.”

Challenges

The business challenges that led the Erie Insurance to evaluate and ultimately select Cisco Stealthwatch:

  • Uses Stealthwatch to gain visibility into the following:
    • Data centers
    • Access
    • Edge
    • Core
    • User data
    • Mobile devices
    • Application usage
    • Virtualized infrastructure

Use Case

The key features and functionalities of Cisco Stealthwatch that the surveyed company uses:

  • Uses Stealthwatch for the following reasons:
    • Segment the network
    • Combat insider threats
    • Identify malware and APTs
    • Improve network performance
    • Conduct forensic investigations
    • Proactively hunt for threats on the network
    • Prevent DDoS attacks
    • Enforce policy

Erie insurance has integrated Stealthwatch with the Identity Services Engine (ISE).

Results

Erie Insurance achieved the following results with Cisco Stealthwatch:

  • Uses Stealthwatch for the following reasons:
    • Improve security efficacy
    • Reduce enterprise risk
    • Protect intellectual property
    • Increase operational efficiency
    • Improve regulatory compliance
  • Uses Stealthwatch to enable the following:
    • Detect threats faster
    • Illuminate blind spots in the network
    • Reduce mean time to dwell for threats on the network
    • Accelerate incident response
    • Improve forensic investigations
    • Use the network as a sensor
  • Rates their experience with Stealthwatch’s proposed benefits to be as follows:
    • Simple, easy to use: strongly agree
    • Open, easy to integrate: very strongly agree
    • Automated, reduces manual work: strongly agree
    • Effective, enhances security: very strongly agree

Cisco Stealthwatch Case Study

Southern Company

Introduction

This case study of Southern Company is based on a September 2016 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Stealthwatch has dramatically improved my organization’s security posture.”

“Stealthwatch out of the box gave us visibility into the network traffic and communications between end points that we previously could not see.”

Challenges

Souther Company deployed Cisco Stealthwatch to gain visibility into the following:

  • Data centers
  • Core
  • Virtualized infrastructure

Use Case

The key features and functionalities of Cisco Stealthwatch that Southern Company uses:

  • Uses Stealthwatch for the following reasons:
    • Identify malware and APTs
    • Improve network performance
    • Proactively hunt for threats on the network

Results

Southern Company achieved the following results with Cisco Stealthwatch:

  • Uses Stealthwatch for the following reasons:
    • Improve security efficacy
    • Reduce enterprise risk
    • Increase operational efficiency
  • Uses Stealthwatch to enable the following:
    • Detect threats faster
    • Illuminate blind spots in the network
    • Use the network as a sensor
  • Rates their experience with Stealthwatch’s proposed benefits to be as follows:
    • Simple, easy to use: very strongly agree
    • Open, easy to integrate: very strongly agree
    • Automated, reduces manual work: agree
    • Effective, enhances security: very strongly agree

Cisco Stealthwatch Case Study

Clark County Nevada

Introduction

This case study of Clark County Nevada is based on a September 2016 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Stealthwatch protects my previous investments by allowing me to do more with my existing security tools.”

“Stealthwatch has dramatically improved my organization’s security posture.”

“On the first day Stealthwatch was operating, we detected and solved two chronic issues that plagued our network team for months.”

“Stealthwatch is the most instantly usable network monitoring software I’ve ever seen.”

Challenges

Clark Country Nevada deployed Cisco Stealthwatch to gain visibility into the following:

  • Data centers
  • Access
  • Edge
  • Core
  • User data
  • Virtualized infrastructure

Use Case

The key features and functionalities of Cisco Stealthwatch that Clark County Nevada uses:

  • Uses Stealthwatch for the following reasons:
    • Combat insider threats
    • Identify malware and APTs
    • Prevent ransomware attacks
    • Improve network performance
    • Conduct forensic investigations
    • Proactively hunt for threats on the network
    • Prevent DDoS attacks
    • Enforce policy

Results

Clark County Nevada uses Cisco Stealthwatch for the following reasons:

  • Improve security efficacy
  • Reduce enterprise risk
  • Increase operational efficiency
  • Improve regulatory compliance
  • Uses Stealthwatch to enable the following:
    • Detect threats faster
    • Secure more areas of the network
    • Illuminate blind spots in the network
    • Reduce mean time to dwell for threats on the network
    • Accelerate incident response
    • Improve forensic investigations
    • Use the network as a sensor
    • Use the network as an enforcer
  • Rates their experience with Stealthwatch’s proposed benefits to be as follows:
    • Simple, easy to use: very strongly agree
    • Open, easy to integrate: agree
    • Automated, reduces manual work: very strongly agree
    • Effective, enhances security: very strongly agree

Case Study: Toronto 2015 Pan American / Parapan American Games

Introduction

This case study of TORONTO 2015 Pan American / Parapan American Games is based on a August 2015 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

Challenges

  • Stealthwatch has helped improve the following:
    • Network baselining
    • Network segmentation
    • Real-time threat detection
    • Overall security posture
    • Network troubleshooting
    • Capacity planning

Use Case

  • Stealthwatch has helped with:
    • Insider threats
    • Malware/zero-day attacks
    • DDoS attacks
    • Network performance
    • Network segmentation
  • Is able to secure the following with Stealthwatch:
    • The data center
    • Areas of my network I could not see previously
    • Remote locations

Results

  • Reduced their network and security troubleshooting time by minutes.
  • Stealthwatch System has helped their organization achieve the following:
    • Greater network visibility
    • Heightened threat intelligence
    • Increased application awareness
  • Found the following Stealthwatch capabilities to be the most beneficial:
    • Sophisticated security analytics/behavioral analysis
    • Context awareness (user, application, device data)
    • Detection of lateral movement (East-West Traffic)
    • Scalability
  • Compared to other security vendors, Cisco is:
    • Effective at detecting attacks
    • Innovative
    • Easy to use
    • Easy to integrate with other security technologies
  • Stealthwatch enables the company to:
    • Better manage security with limited staff/resources
    • Accelerate threat detection and mitigation
    • Gain pervasive network visibility
    • Foster cross-team collaboration within the IT department

Case Study: National Water Company

Introduction

This case study of National Water Company is based on a August 2015 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

Challenges

  • Stealthwatch has helped improve the following:
    • Real-time threat detection
    • Incident response
    • Forensic investigations
    • Overall security posture
    • Network troubleshooting
    • Capacity planning

Use Case

  • Stealthwatch has helped with:
    • Insider threats
    • Malware/zero-day attacks
    • DDoS attacks
    • Network performance
  • Is able to secure the following with Stealthwatch:
    • Virtual infrastructure/private clouds
    • The data center
    • Areas of my network I could not see previously
    • Remote locations

Results

  • Reduced their network and security troubleshooting time by hours.
  • Stealthwatch System has helped their organization achieve the following:
    • Greater network visibility
    • Heightened threat intelligence
    • Improved user identity awareness
    • Increased application awareness
  • Found the following Stealthwatch capabilities to be the most beneficial:
    • Sophisticated security analytics/behavioral analysis
    • Context awareness (user, application, device data)
  • Compared to other security vendors, Cisco is:
    • Effective at detecting attacks
    • Innovative
    • Easy to use
    • Easy to integrate with other security technologies
  • Stealthwatch enables the company to:
    • Better manage security with limited staff/resources
    • Accelerate threat detection and mitigation
    • Speed up incident response
    • Reduce enterprise risk
    • Gain pervasive network visibility
    • Clearly report on organizational security to upper management

Case Study: Ivy Tech Community College Of Indiana

Introduction

This case study of Ivy Tech Community College of Indiana is based on a August 2015 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“We compared Stealthwatch to other vendors in our selection process. We decided that Stealthwatch provided more value per dollar than the other vendors. Stealthwatch’s user interface makes it easy to investigate problems on the network.”

“We are still in the deployment phase of Stealthwatch and in the process of “dialing it in.” It has helped us in identifying threats and network troubleshooting though."

Challenges

  • Stealthwatch has helped improve the following:
    • Network baselining
    • Network segmentation
    • Real-time threat detection
    • Forensic investigations
    • Network troubleshooting

Use Case

  • Stealthwatch has helped with:
    • Insider threats
    • Network performance
    • Network segmentation
  • Is able to secure the following with Stealthwatch:
    • The data center
    • Areas of my network I could not see previously

Results

  • Reduced their network and security troubleshooting time by hours.
  • Stealthwatch System has helped their organization achieve the following:
    • Greater network visibility
    • Heightened threat intelligence
    • Increased application awareness
  • Found the following Stealthwatch capabilities to be the most beneficial:
    • Context awareness (user, application, device data)
    • Flow stitching and deduplication
    • Detection of lateral movement (East-West Traffic)
  • Compared to other security vendors, Cisco is:
    • Effective at detecting attacks
    • Innovative
    • Easy to use
  • Stealthwatch enables the company to:
    • Better manage security with limited staff/resources
    • Speed up incident response
    • Reduce enterprise risk
    • Foster cross-team collaboration within the IT department

Case Study: MEMC Electronic Materials

Introduction

This case study of MEMC Electronic Materials is based on a August 2015 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Stealthwatch provides security and network information in one package.”

Challenges

  • Stealthwatch has helped improve the following:
    • Network baselining
    • Real-time threat detection
    • Incident response
    • Forensic investigations
    • Network troubleshooting

Use Case

  • Stealthwatch has helped with:
    • Insider threats
    • APTs
    • Malware / zero-day attacks
    • DDoS attacks
    • Network performance
  • Is able to secure the following with Stealthwatch:
    • Virtual infrastructure / private clouds
    • IoT devices / systems
    • The data center
    • A BYOD environment
    • SDN infrastructure
    • Areas of my network I could not see previously
    • Remote locations

Results

  • Stealthwatch has helped the organization achieve the following:
    • Greater network visibility
    • Heightened threat intelligence
  • Found the following Stealthwatch capabilities to be the most beneficial:
    • Sophisticated security analytics / behavioral analysis
    • Flow stitching and deduplication
    • Detection of lateral movement (East-West Traffic)
    • Long-term flow storage
  • Compared to other security vendors, Cisco is:
    • Effective at detecting attacks
  • Stealthwatch enables the company to:
    • Better manage security with limited staff / resources
    • Accelerate threat detection and mitigation
    • Speed up incident response
    • Clearly report on organizational security to upper management

Case Study: Cisco Systems, Inc.

Introduction

This case study of Cisco Systems, Inc. is based on a August 2015 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

Challenges

  • Stealthwatch has helped improve the following:
    • Incident response
    • Overall security posture

Use Case

  • Stealthwatch has helped with:
    • Insider threats
    • Malware/zero-day attacks
  • Is able to secure the following with Stealthwatch:
    • The data center
    • Remote locations

Results

  • Reduced their network and security troubleshooting time by hours.
  • Stealthwatch System has helped their organization achieve the following:
    • Greater network visibility
    • Heightened threat intelligence
  • Found the following Stealthwatch capabilities to be the most beneficial:
    • Support for IPv6
    • Long-term flow storage
  • Compared to other security vendors, Cisco is:
    • Easy to use
    • Easy to integrate with other security technologies
  • Stealthwatch enables the company to:
    • Accelerate threat detection and mitigation
    • Speed up incident response

Case Study: Large Enterprise Professional Services Company

Introduction

This case study of a large enterprise professional services company is based on a August 2015 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“We were able to increase our visibility into all of our remote offices by adding a single flow sensor in each location. We can now monitor network performance and security events using one platform. We typically use StealthWatch to remediate events generated from within Stealthwatch and also from our IDS. The ability to search on a name or IP address allows us to identify and locate the source of an issue very quickly.”

“The design and implementation of the solution fits perfectly within my firm. The ability to monitor performance and security using deep packet inspection and netflow within the same product helps us respond quickly to events on the network. The platform is very stable and the ability to keep data for a year is critical when trying to research an event.”

Challenges

  • Stealthwatch has helped improve the following:
    • Real-time threat detection
    • Incident response
    • Forensic investigations
    • Overall security posture
    • Network troubleshooting

Use Case

  • Stealthwatch has helped with:
    • Insider threats
    • APTs
    • Malware/zero-day attacks
    • DDoS attacks
    • Compliance
    • Network performance
    • Network segmentation
  • Is able to secure the following with Stealthwatch:
    • Virtual infrastructure/private clouds
    • The data center
    • Remote locations

Results

  • Reduced their network and security troubleshooting time by days.
  • Stealthwatch System has helped their organization achieve the following:
    • Greater network visibility
    • Heightened threat intelligence
    • Enhanced visibility in the data center
    • Improved user identity awareness
    • Increased application awareness
  • Found the following Stealthwatch capabilities to be the most beneficial:
    • Sophisticated security analytics/behavioral analysis
    • Context awareness (user, application, device data)
    • Detection of lateral movement (East-West Traffic)
    • Scalability
    • Long-term flow storage
  • Compared to other security vendors, Cisco is:
    • Effective at detecting attacks
    • Innovative
    • Supportive of its customers
  • Stealthwatch enables the company to:
    • Better manage security with limited staff/resources
    • Accelerate threat detection and mitigation
    • Speed up incident response
    • Reduce enterprise risk
    • Gain pervasive network visibility
    • Foster cross-team collaboration within the IT department



More Research on Cisco Stealthwatch