TechValidate Research on Cisco Secure Network Analytics

These pages present data that TechValidate has sourced via direct research with verified customers and users of Cisco Secure Network Analytics. TechValidate stands behind the authenticity of all published data. Learn more »



1,719 Customers Surveyed

14,055 Data Points Collected

590 Published TechFacts

63 Published Charts

71 Published Case Studies



Featured Research Collections for Cisco Secure Network Analytics

Curated collections and slideshows of TechValidate research data on Cisco Secure Network Analytics.



Selected Research Highlights


Real-time Security Monitoring

100% of surveyed IT Security Officers chose Stealthwatch by Cisco for real-time flow monitoring capabilities.

Detecting/Preventing Security Threats

Which of the following security threats have you used Stealthwatch to detect and/or prevent?

Advanced Persistent Threats
21%
Network Malware or Virus
79%
Suspicious user behavior
84%
External hacking attempt
47%
Compromised host
84%
Data loss / Exfiltration
21%
Command and Control traffic / Botnets
47%
Network reconnaissance
58%

Cisco Stealthwatch Customer Testimonial

Stealthwatch provides an excellent forensics tool for historical review and provides visibility into network anomalies.

IT Specialist, Large Enterprise Health Care Company

Cisco Stealthwatch Case Study

Southern Company

Introduction

This case study of Southern Company is based on a September 2016 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Stealthwatch has dramatically improved my organization’s security posture.”

“Stealthwatch out of the box gave us visibility into the network traffic and communications between end points that we previously could not see.”

Challenges

Souther Company deployed Cisco Stealthwatch to gain visibility into the following:

  • Data centers
  • Core
  • Virtualized infrastructure

Use Case

The key features and functionalities of Cisco Stealthwatch that Southern Company uses:

  • Uses Stealthwatch for the following reasons:
    • Identify malware and APTs
    • Improve network performance
    • Proactively hunt for threats on the network

Results

Southern Company achieved the following results with Cisco Stealthwatch:

  • Uses Stealthwatch for the following reasons:
    • Improve security efficacy
    • Reduce enterprise risk
    • Increase operational efficiency
  • Uses Stealthwatch to enable the following:
    • Detect threats faster
    • Illuminate blind spots in the network
    • Use the network as a sensor
  • Rates their experience with Stealthwatch’s proposed benefits to be as follows:
    • Simple, easy to use: very strongly agree
    • Open, easy to integrate: very strongly agree
    • Automated, reduces manual work: agree
    • Effective, enhances security: very strongly agree

Cisco Stealthwatch Customer Research

Please rate the following capabilities of Stealthwatch:

Very strongly agree Strongly agree Agree Disagree

Simple, easy to use
Open, easy to integrate
Automated, reduces manual work
Effective, enhances security

Stealthwatch Cloud Case Study

Medium Enterprise Professional Services Company

Introduction

This case study of a medium enterprise professional services company is based on an October 2020 survey of Stealthwatch Cloud customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“We increased visibility and control.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select Stealthwatch Cloud:

  • Challenges that motivated their search for a Network Detection and Response (NDR) solution:
    • A lack of visibility into a complex network (with branches, IoT devices, remote employees and guests, cloud infrastructure)
    • Detecting insider threats

Use Case

The key features and functionalities of Stealthwatch Cloud that the surveyed company uses:

  • Is using Stealthwatch Cloud to monitor the private network.
  • Stealthwatch Cloud helps them meet the following compliance frameworks:
    • PCI
    • ISO
    • NIST
    • CIS Benchmarks
  • They have activated SecureX in Stealthwatch Cloud.

Results

The surveyed company achieved the following results with Stealthwatch Cloud:

  • Stealthwatch Cloud has been most impactful in detecting:
    • Data exfiltration
    • Encrypted threats
    • Policy violations
    • Threats originating within the network
  • Agrees that Stealthwatch Cloud helped their organization enforce internal security policy requirements.
  • Stealthwatch Cloud makes them feel more confident in their ability to:
    • Detect threats that have bypassed other defenses
    • Conduct forensic analysis
    • Quickly identify the source of an attack


More to Explore



About Cisco Secure Network Analytics

With Cisco Stealthwatch, organizations can improve both network security and performance, and avoid the high costs associated with downtime, security breaches and other issues.

Cisco Secure Network Analytics Website   Cisco Website