TechValidate Research on Cisco Secure Network Analytics


Cisco Stealthwatch Case Study

Tata Consultancy Services detected 25% more threats and reduced incident response time by 5 days using Stealthwatch.

Introduction

This case study of a Global 500 computer services company is based on an August 2019 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Improved network visibility by 50%”

Challenges

The business challenges that led Tata Consultancy Services to evaluate and ultimately select Cisco Stealthwatch:

  • A lack of visibility into a complex network with branches, IoT devices, remote employees and guests, cloud infrastructure, etc.
  • A lack of a threat investigation and forensic analysis tool
  • Protecting sensitive data
  • Detection of insider threats
  • Analyzing encrypted traffic without decryption
  • Real-time malware detection
  • Compliance requirements
  • Creating and enforcing segmentation policies

Major security concerns related to cloud infrastructure are:

  • Misconfigured assets
  • Unauthorized access
  • Data loss
  • Insider threats – as a result of stolen credentials or malicious employee
  • Abuse of cloud services leading to disruption or huge bills

Use Case

Tata Consultancy Services chose Stealthwatch for its:

  • Comprehensive visibility
  • Advanced security analytics using machine learning and entity modeling
  • Existing network infrastructure
  • Scalability
  • Integration with other Cisco products and technologies
  • Ability to analyze encrypted traffic without decryption
  • Reputation/recommendation

Results

Utilizing Stealthwatch, Tata Consultancy Services was able to:

  • Detect and prioritize advanced malicious attacks and insider threats in real-time
  • Investigate the source of the threat through network audit trails
  • Mitigate threats using the existing network infrastructure
  • Simplify network segmentation by modeling and enforcing policies
  • Provide visibility into what devices, users and applications are using the network
  • Enhance value provided by other Cisco devices




About This Data

This data was sourced directly from verified users of Cisco Secure Network Analytics by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on Cisco Secure Network Analytics