Cisco Stealthwatch Customer Research
Additional Telemetry
My organization uses Stealthwatch to gain visibility into:
Application usage |
|
|
User data |
|
|
Mobile devices |
|
|
IoT devices |
|
|
Other |
|
Cisco Stealthwatch Customer Research
My organization uses Stealthwatch to:
Conduct forensic investigations |
|
|
Proactively hunt for threats on the network |
|
|
Identify malware and APTs |
|
|
Improve network performance |
|
|
Combat insider threats |
|
|
Enforce policy |
|
|
Prevent ransomware attacks |
|
|
Segment the network |
|
|
Prevent DDoS attacks |
|
|
Other |
|
Cisco Stealthwatch Customer Research
Stealthwatch enables my organization to:
Detect threats faster |
|
|
Illuminate blind spots in the network |
|
|
Accelerate incident response |
|
|
Improve forensic investigations |
|
|
Use the Network as a Sensor |
|
|
Secure more areas of the network |
|
|
Reduce mean time to dwell for threats on the network |
|
|
Use the Network as an Enforcer |
|
|
Other |
|
What does the Stealthwatch System help your organization achieve?
Greater network visibility |
|
|
Heightened threat intelligence |
|
|
Enhanced visibility in the data center |
|
|
Improved user identity awareness |
|
|
Increased application awareness |
|
|
More visibility into mobile devices |
|
|
Other |
|
What do you find to be the greatest benefit of the internal visibility provided by Cisco Stealthwatch?
Earliest detection of advanced threats (APTs, malware, etc.) |
|
|
Faster Incident response |
|
|
Forensics |
|
|
Monitors individual user activity & mobile devices |
|
|
Continuous internal monitoring |
|
|
Contextual & situational awareness |
|
|
Meets auditing & compliance requirements |
|
|
Cross-department collaboration |
|
|
Other |
|
How effective is StealthWatch at the following?
Extremely Effective Effective Ineffective Uncertain
Detecting DDoS |
|
Accelerating incident response and forensics |
|
Detecting advanced persistent threats |
|
Detecting insider threats / Suspicious behavior |
|
Detecting malware / zero-day attacks |
|
How effective is Stealthwatch at the following?
Extremely Effective Effective Ineffective Uncertain
Detecting DDoS |
|
Accelerating incident response and forensics |
|
Detecting advanced persistent threats |
|
Detecting insider threats / Suspicious behavior |
|
Detecting malware / zero-day attacks |
|
What do you find to be the greatest benefit of the internal visibility provided by Cisco Stealthwatch?
Earliest detection of advanced threats (APTs, malware, etc.) |
|
|
Faster Incident response |
|
|
Forensics |
|
|
Monitors individual user activity & mobile devices |
|
|
Continuous internal monitoring |
|
|
Contextual & situational awareness |
|
|
Meets auditing & compliance requirements |
|
What do you find to be the greatest benefit of the internal visibility provided by Cisco Stealthwatch?
Earliest detection of advanced threats (APTs, malware, etc.) |
|
|
Faster Incident response |
|
|
Forensics |
|
|
Monitors individual user activity & mobile devices |
|
|
Continuous internal monitoring |
|
|
Contextual & situational awareness |
|
|
Meets auditing & compliance requirements |
|
|
Cross-department collaboration |
|
|
Other |
|
Which of the following security threats have you used Stealthwatch to detect and/or prevent?
Advanced Persistent Threats |
|
|
Network Malware or Virus |
|
|
Suspicious user behavior |
|
|
External hacking attempt |
|
|
Compromised host |
|
|
Data loss / Exfiltration |
|
|
Command and Control traffic / Botnets |
|
|
Network reconnaissance |
|
Which of the following security threats have you used Stealthwatch to detect and/or prevent?
Advanced Persistent Threats |
|
|
Network Malware or Virus |
|
|
Suspicious user behavior |
|
|
External hacking attempt |
|
|
Compromised host |
|
|
Data loss / Exfiltration |
|
|
Command and Control traffic / Botnets |
|
|
Network reconnaissance |
|
|
Other |
|
Which of the following influenced your decision to select Stealthwatch by Cisco?
Behavior-based security monitoring |
|
|
Real-time flow monitoring capabilities |
|
|
Internal visibility |
|
|
DDoS |
|
|
Forensics |
|
|
Advanced Persistent Threats (APTs) |
|
|
Auditing and compliance requirements |
|
|
Scalability |
|
|
Identity awareness |
|
|
Application Aware Network Performance Monitoring |
|
|
Other |
|
Which of the following security threats have you used Stealthwatch to detect and/or prevent?
Advanced Persistent Threats |
|
|
Network Malware or Virus |
|
|
Suspicious user behavior |
|
|
External hacking attempt |
|
|
Compromised host |
|
|
Data loss / Exfiltration |
|
|
Command and Control traffic / Botnets |
|
|
Network reconnaissance |
|