TechValidate Research on Cisco Stealthwatch


Case Study: American Cancer Society

Introduction

This case study of American Cancer Society, Inc. is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Cisco’s Stealthwatch has made it possible to store and review past network activity in an efficient and affordable manner. Network and application behavior is now available – real-time – to a more diverse IT user base than before, dramatically improving our effectiveness and productivity.”

Challenges

  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Reduced mean-time-to-know (MTTK) root cause of network or security incidents
    • Improved in network performance
    • Enhanced network security posture
    • Improved in application performance
    • Increased efficiency in the identification of security threats
    • Improved forensic analysis
    • Increased correlation of user identity and activity
    • Increased visibility of mobile devices
    • Increased flow collection, monitoring and analysis
    • Enhanced compliance posture

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Incident Response
    • Network Forensics
    • Security Forensics
    • Application performance monitoring
    • PCI compliance
    • HIPAA compliance
  • Used Stealthwatch to detect or prevent the following security threats:
    • Network malware or virus
    • Suspicious user behavior
    • Compromised host
    • Network reconnaissance
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Monitoring a centralized network with a large number of satellite or retail locations
    • Monitoring traffic within a data center, physical and virtual

Results

  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Real-time flow monitoring capabilities
    • Internal visibility
    • Forensics
    • Advanced Persistent Threats (APTs)
    • Auditing and compliance requirements
    • Scalability
    • Identity awareness
    • Application Aware Network Performance Monitoring
  • Selected Stealthwatch by Cisco over the following vendors:
    • In-house monitoring solution
    • Open source solution
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Scalability and flexibility
    • Real-time threat detection and correlation with user identity data
    • Improved incident response and threat management
    • Regulatory compliance
    • Enterprise-wide visibility into network activity
    • Deployment and support simplicity
    • Enterprise-wide user monitoring
    • Forensic analysis
  • Reduced the time it took to mitigate a security incident by > 75% by deploying Stealthwatch.
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Visibility: Much Better
    • Network Security: Much Better
    • Innovation: Much Better
    • Performance Monitoring: Better
    • Scalability: Better




About This Data

This data was sourced directly from verified users of Cisco Stealthwatch by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on Cisco Stealthwatch