TechValidate Research on Cisco Secure Network Analytics


Case Study: Grafisch Lyceum Rotterdam

Introduction

This case study of glr is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Cisco has improved our Mean-Time-to-Know (MTTK) and offers one central dashboard, making it easier to investigate incidents.”

Challenges

  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Reduced mean-time-to-know (MTTK) root cause of network or security incidents
    • Improved in network performance
    • Enhanced network security posture
    • Improved forensic analysis

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Incident Response
    • Network Forensics
    • Security Forensics
    • Application performance monitoring
    • Network performance monitoring
  • Used Stealthwatch to detect or prevent the following security threats:
    • Network malware or virus
    • Suspicious user behavior
    • Compromised host
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Monitoring a centralized network with a large number of satellite or retail locations
    • Monitoring traffic within a virtual environment

Results

  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Forensics
    • Identity awareness
  • Selected Stealthwatch by Cisco over the following vendors:
    • In-house monitoring solution
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Scalability and flexibility
    • Real-time threat detection and correlation with user identity data
    • Enterprise-wide visibility into network activity
    • Enterprise-wide user monitoring
    • Forensic analysis
  • Improved mitigate response time by > 75% by deploying Stealthwatch.
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Security: Much Better
    • Performance Monitoring: Much Better
    • Scalability: Much Better
    • Network Visibility: Much Better
    • Innovation: Much Better




About This Data

This data was sourced directly from verified users of Cisco Secure Network Analytics by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on Cisco Secure Network Analytics