TechValidate Research on Cisco Secure Network Analytics


Case Study: Small Business Health Care Company

Introduction

This case study of a small business health care company is based on a June 2014 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

Challenges

  • Purchased Cisco because it is differentiated from competitive products in the following areas:
    • Scalability up to 3 million flows per second
    • User centric monitoring
    • Advanced behavioral detection
    • Flow analytics
    • Customer support

Use Case

  • Uses Stealthwatch with:
    • IDS / IPS
    • Full-packet capture system
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Large Healthcare network

Results

  • The following are the greatest benefits of the internal visibility provided by Cisco Stealthwatch:
    • Earliest detection of advanced threats (APTs, malware, etc.)
    • Faster Incident response
    • Forensics
    • Continuous internal monitoring
  • Agrees that Stealthwatch’s user / host-level information is critical for the following:
    • Security
    • Performance monitoring
    • Forensics
    • Network troubleshooting
  • Rated Stealthwatch’s effectiveness in the following areas:
    • Detecting DDoS: extremely effective
    • Accelerating incident response and forensics: extremely effective
    • Detecting advanced persistent threats: effective
    • Detecting insider threats / Suspicious behavior: effective
    • Detecting malware / zero-day attacks: effective
  • Rated how critical Cisco Stealthwatch is for the following:
    • Monitoring visibility: very critical
    • Improving security: very critical
    • Managing cyber security: very critical
    • Responding to cyber threats : Critical
  • Selected Stealthwatch by Cisco over the following vendors:
    • Riverbed Cascade / Mazu Networks
    • NetScout
    • Fluke / Visual Network systems
    • OpNet




About This Data

This data was sourced directly from verified users of Cisco Secure Network Analytics by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on Cisco Secure Network Analytics