TechValidate Research on Cisco Secure Network Analytics


Case Study: Vesuvius

Introduction

This case study of us.vesuvius.com is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“We are dependent on [Stealthwatch by Cisco’s] ‘Alarm and Target (Alarm Report by Type)’ for security analysis and detection.”

Challenges

  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Reduced mean-time-to-know (MTTK) root cause of network or security incidents
    • Improved in network performance and forensic analysis
    • Enhanced network security posture
    • Increased efficiency in the identification of security threats
    • Increased correlation of user identity and activity, flow collection, and monitoring and analysis

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Incident Response
    • Network Forensics
    • Security Forensics
    • Network performance monitoring
  • Used Stealthwatch to detect or prevent the following security threats:
    • Network malware or virus
    • Suspicious user behavior
    • External hacking attempt
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Monitoring a large, globally distributed network

Results

  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Real-time flow monitoring capabilities
    • DDoS
    • Scalability
  • Selected Stealthwatch by Cisco over the following vendors:
    • Riverbed Cascade / Mazu Networks
    • NetScout
    • Fluke / Visual Network systems
    • Open source solution
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Scalability and flexibility
    • Improved incident response and threat management
    • Enterprise-wide visibility into network activity
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Security: Better
    • Scalability: Better
    • Network Visibility: Better
    • Innovation: Better




About This Data

This data was sourced directly from verified users of Cisco Secure Network Analytics by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on Cisco Secure Network Analytics