TechValidate Research on Cisco Secure Network Analytics


Stealthwatch Case Study

Lexmark International, Inc.

Introduction

This case study of Lexmark International, Inc. is based on a March 2018 survey of Stealthwatch customers by TechValidate, a 3rd-party research service.

“Cisco Stealthwatch is very helpful in conducting forensic investigation and monitoring ongoing threat. It has reduced the time to detect and remediate threats within our organization from months to hours. One of the features we have found to be most useful is the additional user context and ability to quarantine infected hosts that is available through the integration with Cisco Identity Services Engine (ISE).”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select Stealthwatch:

  • Faced the following challenges before their network visibility and security analytics solution:
    • Lack of visibility into a complex network with branches, IoT devices, remote employees and guests, cloud infrastructure
    • Lack of a threat investigation and forensic analysis tool
    • Detection of insider threats
    • Real-time malware detection
    • Threat mitigation
    • Creating and enforcing segmentation policies

Use Case

The key features and functionalities of Stealthwatch that the surveyed company uses:

  • Uses Stealthwatch to gain visibility into:
    • Data centers
    • Access
    • Core
    • User data
    • IoT devices

Results

The surveyed company achieved the following results with Stealthwatch:

  • Uses Stealthwatch to:
    • Detect and prioritize advanced malicious attacks and insider threats in real-time
    • Investigate the source of the threat through network audit trails
    • Gain visibility into what devices, users and applications are using the network




About This Data

This data was sourced directly from verified users of Cisco Secure Network Analytics by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on Cisco Secure Network Analytics