TechValidate Research on Cisco Secure Network Analytics

71 Case Studies – Page 3 of 3


Case Study: Stanford University

Introduction

This case study of Stanford University is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“[Cisco’s Stealthwatch] validates the fact that when a system is compromised/virused – we have the network information to back it up in the form of flows.”

Challenges

  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Enhanced network security posture
    • Improved forensic analysis
    • Increased flow collection, monitoring and analysis

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Incident Response
    • Network Forensics
    • Security Forensics
  • Used Stealthwatch to detect or prevent the following security threats:
    • Network malware or virus
    • Suspicious user behavior
    • External hacking attempt
    • Compromised host
    • Network reconnaissance
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Monitoring a centralized network with a large number of satellite or retail locations
    • Operating in a classified network with strictly controlled access to specific segments

Results

  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Real-time flow monitoring capabilities
    • Internal visibility
  • Selected Stealthwatch by Cisco over the following vendors:
    • Q1 Labs / IBM
    • Riverbed Cascade / Mazu Networks
    • Arbor Networks
    • In-house monitoring solution
    • Open source solution
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Real-time threat detection and correlation with user identity data
    • Enterprise-wide visibility into network activity
    • Deployment and support simplicity
    • Forensic analysis
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Security: Better
    • Performance Monitoring: Better
    • Scalability: Better
    • Network Visibility: Better
    • Innovation: Better

Case Study: Office of the Governor, State Of Connecticut

Introduction

This case study of The Office of Governor, State of Connecticut is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“[Cisco] allows our engineers to address network performance issues faster and the Stealthwatch System has made our network more technically visible in our reports.”

Challenges

  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Reduced mean-time-to-know (MTTK) root cause of network or security incidents
    • Improved in network performance
    • Enhanced network security posture
    • Improved in application performance
    • Improved forensic analysis
    • Increased correlation of user identity and activity
    • Increased flow collection, monitoring and analysis

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Incident Response
    • Network Forensics
    • Security Forensics
    • Application performance monitoring
    • Network performance monitoring
  • Used Stealthwatch to detect or prevent the following security threats:
    • Advanced persistent threats
    • Network malware or virus
    • Suspicious user behavior
    • External hacking attempt
    • Compromised host
    • Command and control traffic / botnets
    • Network reconnaissance
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Monitoring a centralized network with a large number of satellite or retail locations
    • Monitoring traffic within a data center, physical and virtual

Results

  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Real-time flow monitoring capabilities
    • Internal visibility
    • DDoS
    • Forensics
    • Advanced Persistent Threats (APTs)
    • Auditing and compliance requirements
    • Scalability
    • Application Aware Network Performance Monitoring
  • Selected Stealthwatch by Cisco over the following vendors:
    • Fluke / Visual Network systems
    • Plixer
    • SolarWinds
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Scalability and flexibility
    • Real-time threat detection and correlation with user identity data
    • Improved incident response and threat management
    • Enterprise-wide visibility into network activity
    • Deployment and support simplicity
    • Forensic analysis
  • Reduced the time it took to mitigate a security incident by 25% to 49% by deploying Stealthwatch.
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Security: Much Better
    • Performance Monitoring: Much Better
    • Scalability: Much Better
    • Network Visibility: Much Better
    • Innovation: Much Better

Case Study: McKee Foods

Introduction

This case study of www.mckeefoods.com is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“We have used Cisco to consolidate several tools including replacing our IDS system and reducing costs and time to locate network problems. It provides much greater visibility across our network of anomalies and problems than we have ever had.”

Challenges

  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Improved in network performance
    • Enhanced network security posture
    • Increased efficiency in the identification of security threats
    • Increased correlation of user identity and activity
    • Increased flow collection, monitoring and analysis

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Network Forensics
    • Security Forensics
    • Application performance monitoring
    • Network performance monitoring
  • Used Stealthwatch to detect or prevent the following security threats:
    • Advanced persistent threats
    • Network malware or virus
    • Suspicious user behavior
    • External hacking attempt
    • Data loss/ exfiltration
    • Command and control traffic / botnets
    • Network reconnaissance
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Monitoring a centralized network with a large number of satellite or retail locations
    • Monitoring traffic within a virtual environment
    • Monitoring traffic within a data center, physical and virtual

Results

  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Real-time flow monitoring capabilities
    • Internal visibility
    • Forensics
    • Scalability
  • Selected Stealthwatch by Cisco over the following vendors:
    • NetScout
    • In-house monitoring solution
    • Open source solution
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Scalability and flexibility
    • Improved incident response and threat management
    • Enterprise-wide visibility into network activity
    • Deployment and support simplicity
    • Enterprise-wide user monitoring
    • Forensic analysis
  • Reduced the time it took to mitigate a security incident by 50% to 74% by deploying Stealthwatch.
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Security: Much Better
    • Performance Monitoring: Much Better
    • Scalability: Much Better
    • Network Visibility: Much Better
    • Innovation: Better

Case Study: Grafisch Lyceum Rotterdam

Introduction

This case study of glr is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Cisco has improved our Mean-Time-to-Know (MTTK) and offers one central dashboard, making it easier to investigate incidents.”

Challenges

  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Reduced mean-time-to-know (MTTK) root cause of network or security incidents
    • Improved in network performance
    • Enhanced network security posture
    • Improved forensic analysis

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Incident Response
    • Network Forensics
    • Security Forensics
    • Application performance monitoring
    • Network performance monitoring
  • Used Stealthwatch to detect or prevent the following security threats:
    • Network malware or virus
    • Suspicious user behavior
    • Compromised host
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Monitoring a centralized network with a large number of satellite or retail locations
    • Monitoring traffic within a virtual environment

Results

  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Forensics
    • Identity awareness
  • Selected Stealthwatch by Cisco over the following vendors:
    • In-house monitoring solution
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Scalability and flexibility
    • Real-time threat detection and correlation with user identity data
    • Enterprise-wide visibility into network activity
    • Enterprise-wide user monitoring
    • Forensic analysis
  • Improved mitigate response time by > 75% by deploying Stealthwatch.
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Security: Much Better
    • Performance Monitoring: Much Better
    • Scalability: Much Better
    • Network Visibility: Much Better
    • Innovation: Much Better

Case Study: American Cancer Society

Introduction

This case study of American Cancer Society, Inc. is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Cisco’s Stealthwatch has made it possible to store and review past network activity in an efficient and affordable manner. Network and application behavior is now available – real-time – to a more diverse IT user base than before, dramatically improving our effectiveness and productivity.”

Challenges

  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Reduced mean-time-to-know (MTTK) root cause of network or security incidents
    • Improved in network performance
    • Enhanced network security posture
    • Improved in application performance
    • Increased efficiency in the identification of security threats
    • Improved forensic analysis
    • Increased correlation of user identity and activity
    • Increased visibility of mobile devices
    • Increased flow collection, monitoring and analysis
    • Enhanced compliance posture

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Incident Response
    • Network Forensics
    • Security Forensics
    • Application performance monitoring
    • PCI compliance
    • HIPAA compliance
  • Used Stealthwatch to detect or prevent the following security threats:
    • Network malware or virus
    • Suspicious user behavior
    • Compromised host
    • Network reconnaissance
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Monitoring a centralized network with a large number of satellite or retail locations
    • Monitoring traffic within a data center, physical and virtual

Results

  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Real-time flow monitoring capabilities
    • Internal visibility
    • Forensics
    • Advanced Persistent Threats (APTs)
    • Auditing and compliance requirements
    • Scalability
    • Identity awareness
    • Application Aware Network Performance Monitoring
  • Selected Stealthwatch by Cisco over the following vendors:
    • In-house monitoring solution
    • Open source solution
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Scalability and flexibility
    • Real-time threat detection and correlation with user identity data
    • Improved incident response and threat management
    • Regulatory compliance
    • Enterprise-wide visibility into network activity
    • Deployment and support simplicity
    • Enterprise-wide user monitoring
    • Forensic analysis
  • Reduced the time it took to mitigate a security incident by > 75% by deploying Stealthwatch.
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Visibility: Much Better
    • Network Security: Much Better
    • Innovation: Much Better
    • Performance Monitoring: Better
    • Scalability: Better

Case Study: California Dept. of Education

Introduction

This case study of Education Dept is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Going to Cisco has provided us with end-to-end visibility, and monitoring scalability once thought impossible for a reasonable price.”

Challenges

  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Reduced mean-time-to-know (MTTK) root cause of network or security incidents
    • Enhanced network security posture
    • Increased efficiency in the identification of security threats
    • Improved forensic analysis
    • Increased correlation of user identity and activity
    • Increased flow collection, monitoring and analysis

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Incident Response
    • Network Forensics
    • Security Forensics
    • Network performance monitoring
  • Used Stealthwatch to detect or prevent the following security threats:
    • Network malware or virus
    • Suspicious user behavior
    • External hacking attempt
    • Compromised host
    • Network reconnaissance
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Midsized LAN / and Small WAN

Results

  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Real-time flow monitoring capabilities
    • Internal visibility
    • Forensics
    • Identity awareness
    • Application Aware Network Performance Monitoring
  • Selected Stealthwatch by Cisco over the following vendors:
    • Riverbed Cascade / Mazu Networks
    • NetScout
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Scalability and flexibility
    • Real-time threat detection and correlation with user identity data
    • Improved incident response and threat management
    • Enterprise-wide visibility into network activity
    • Deployment and support simplicity
    • Enterprise-wide user monitoring
    • Forensic analysis
  • Reduced the time it took to mitigate a security incident by > 75% by deploying Stealthwatch.
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Security: Much Better
    • Scalability: Much Better
    • Innovation: Much Better
    • Performance Monitoring: Better

Case Study: Central Michigan University

Introduction

This case study of Central Michigan University is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“[Cisco] allowed us to gain visibility into our internal networks. It also allowed us to easily audit our secure zones to ensure certain types of traffic are not leaving those networks.”

Challenges

  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Reduced mean-time-to-know (MTTK) root cause of network or security incidents
    • Enhanced network security posture
    • Increased efficiency in the identification of security threats
    • Improved forensic analysis
    • Increased visibility of mobile devices
    • Increased flow collection, monitoring and analysis
    • Enhanced compliance posture

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Incident Response
    • Network Forensics
    • Security Forensics
    • Application performance monitoring
    • PCI compliance
    • HIPAA compliance
    • Network performance monitoring
  • Used Stealthwatch to detect or prevent the following security threats:
    • Network malware or virus
    • Suspicious user behavior
    • External hacking attempt
    • Compromised host
    • Data loss/ exfiltration
    • Network reconnaissance
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Monitoring a centralized network with a large number of satellite or retail locations
    • Monitoring traffic within a data center, physical and virtual

Results

  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Real-time flow monitoring capabilities
    • Internal visibility
    • Forensics
    • Auditing and compliance requirements
    • Application Aware Network Performance Monitoring
  • Selected Stealthwatch by Cisco over the following vendors:
    • Arbor Networks
    • Open source solution
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Scalability and flexibility
    • Real-time threat detection and correlation with user identity data
    • Improved incident response and threat management
    • Regulatory compliance
    • Enterprise-wide visibility into network activity
    • Deployment and support simplicity
    • Enterprise-wide user monitoring
    • Forensic analysis
  • Reduced the time it took to mitigate a security incident by 25% to 49% by deploying Stealthwatch.
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Visibility: Much Better
    • Network Security: Better
    • Scalability: Better
    • Innovation: Better

Case Study: Tembec

Introduction

This case study of Tembec is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Greater visibility and the ability to zero in on the problem quickly. Ability to trace incidents back to source.”

Challenges

  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Reduced mean-time-to-know (MTTK) root cause of network or security incidents
    • Enhanced network security posture
    • Increased efficiency in the identification of security threats
    • Increased flow collection, monitoring and analysis

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Incident Response
    • Network Forensics
    • Security Forensics
    • Network performance monitoring
  • Used Stealthwatch to detect or prevent the following security threats:
    • Network malware or virus
    • Suspicious user behavior
    • Compromised host
    • Network reconnaissance
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Monitoring a large, globally distributed network

Results

  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Real-time flow monitoring capabilities
  • Selected Stealthwatch by Cisco over the following vendors:
    • Riverbed Cascade / Mazu Networks
    • Arbor Networks
    • NetQoS / CA
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Improved incident response and threat management
    • Enterprise-wide visibility into network activity
    • Forensic analysis
  • Reduced the time it took to mitigate a security incident by 50% to 74% by deploying Stealthwatch.
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Security: Much Better
    • Performance Monitoring: Better
    • Scalability: Better
    • Network Visibility: Better
    • Innovation: Better

Case Study: Westinghouse Electric

Introduction

This case study of Westinghouse Electric Company, LLC is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Cisco’s solution has provided us with better visibility into network activity across our global enterprise. The near real-time data reporting and alerting capabilities enable our team to detect and respond quicker to security incidents as they occur.”

Challenges

  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Reduced mean-time-to-know (MTTK) root cause of network or security incidents
    • Enhanced network security posture
    • Improved forensic analysis
    • Increased correlation of user identity and activity
    • Increased flow collection, monitoring and analysis
    • Enhanced compliance posture

Use Case

  • Primarily uses Stealthwatch in the following ways:
    • Incident Response
    • Network Forensics
    • Security Forensics
    • NIST compliance
    • Network performance monitoring
  • Used Stealthwatch to detect or prevent the following security threats:
    • Advanced persistent threats
    • Network malware or virus
    • Compromised host
    • Data loss / exfiltration
    • Command and control traffic / botnets
    • Network reconnaissance
  • Is doing the following with Stealthwatch deployment:
    • Monitoring a large, globally distributed network
    • Monitoring traffic within a data center, physical and virtual

Results

  • Chose Stealthwatch for the following capabilities:
    • Behavior-based security monitoring
    • Real-time flow monitoring capabilities
    • Internal visibility
    • Forensics
    • Advanced Persistent Threats (APTs)
    • Scalability
    • Identity awareness
  • Selected Stealthwatch over the following vendors:
    • Q1 Labs / IBM
    • Fluke / Visual Network systems
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Scalability and flexibility
    • Real-time threat detection and correlation with user identity data
    • Enterprise-wide visibility into network activity
    • Deployment and support simplicity
    • Forensic analysis
  • Reduced the time it took to mitigate a security incident by 25% to 49% by deploying Stealthwatch.
  • Rated the following Stealthwatch capabilities as compared to competing vendors:
    • Network Security: Much Better
    • Network Visibility: Much Better
    • Innovation: Better
    • Scalability: Better

Case Study: Medium Enterprise Pharmaceuticals Company

Introduction

This case study of a medium enterprise pharmaceuticals company is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“We lacked visibility into what was happening on the network previously. The intelligence that Cisco gives us is immeasurably valuable in terms of security response, forensics, and knowledge of what is happening on the network.”

Challenges

  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Reduced mean-time-to-know (MTTK) root cause of network or security incidents
    • Enhanced network security posture
    • Increased efficiency in the identification of security threats
    • Improved forensic analysis
    • Increased correlation of user identity and activity
    • Increased flow collection, monitoring and analysis

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Incident Response
    • Network Forensics
    • Security Forensics
  • Used Stealthwatch to detect or prevent the following security threats:
    • Network malware or virus
    • Suspicious user behavior
    • Compromised host
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Monitoring a large, globally distributed network

Results

  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Internal visibility
    • Forensics
    • Identity awareness
    • Application Aware Network Performance Monitoring
    • IPv6 monitoring
  • Selected Stealthwatch by Cisco over the following vendors:
    • Riverbed Cascade / Mazu Networks
    • Plixer
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Scalability and flexibility
    • Real-time threat detection and correlation with user identity data
    • Improved incident response and threat management
    • Enterprise-wide visibility into network activity
    • Deployment and support simplicity
    • Enterprise-wide user monitoring
    • Forensic analysis
  • Reduced the time it took to mitigate a security incident by > 75% by deploying Stealthwatch.
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Security: Better
    • Scalability: Better
    • Network Visibility: Better
    • Innovation: Much Better

Case Study: United Auto Insurance Group

Introduction

This case study of United Auto Insurance Group is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“The anomaly based protection has been very instrumental in identifying security threats both internally and externally.”

Challenges

  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Reduced mean-time-to-know (MTTK) root cause of network or security incidents
    • Improved in network performance, forensic analysis
    • Enhanced network security posture
    • Increased efficiency in the identification of security threats, correlation of user identity and activity, flow collection, monitoring and analysis
    • Enhanced compliance posture

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Incident Response
    • Network Forensics
    • Security Forensics
    • Application performance monitoring
    • PCI compliance
    • Network performance monitoring
  • Used Stealthwatch to detect or prevent the following security threats:
    • Advanced persistent threats
    • Network malware or virus
    • Suspicious user behavior
    • External hacking attempt
    • Compromised host
    • Command and control traffic/ botnets
    • Network reconnaissance
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Operating in a classified network with strictly controlled access to specific segments
    • Monitoring traffic within a data center, physical and virtual

Results

  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Real-time flow monitoring capabilities
    • Forensics
    • Advanced Persistent Threats (APTs)
    • Auditing and compliance requirements
    • Identity awareness
    • Application Aware Network Performance Monitoring
  • Selected Stealthwatch by Cisco over the following vendors:
    • Arbor Networks
    • NetQoS / CA
    • Open source solution
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Scalability and flexibility
    • Real-time threat detection and correlation with user identity data
    • Improved incident response and threat management
    • Regulatory compliance
    • Enterprise-wide visibility into network activity
    • Deployment and support simplicity
    • Enterprise-wide user monitoring
    • Forensic analysis
  • Improved time to mitigation of a security incident by > 75% by deploying Stealthwatch by Cisco.
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Security: Much Better
    • Performance Monitoring: Much Better
    • Network Visibility: Better
    • Innovation: Better



More Research on Cisco Secure Network Analytics