TechValidate Research on Cisco Secure Network Analytics


Cisco Stealthwatch Case Study

Hodgson Russ LLP

Introduction

This case study of Hodgson Russ LLP is based on a September 2016 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Stealthwatch protects my previous investments by allowing me to do more with my existing security tools.”

“Stealthwatch has dramatically improved my organization’s security posture.”

“During the pilot Stealthwatch showed it’s worth by identifying a Kindle that had Malware on our guest Wi-Fi. Since the pilot we have been using Stealthwatch to identify anomalies in our network every day.”

“I love Stealthwatch because it fills the void of identifying threats in the areas of the network we cannot see.”

Challenges

The business challenges that led Hodgson Russ LLP to evaluate and ultimately select Cisco Stealthwatch:

  • Uses Stealthwatch to gain visibility into the following:
    • Data centers
    • Access
    • Core
    • Mobile devices
    • Virtualized infrastructure

Use Case

The key features and functionalities of Cisco Stealthwatch that Hodgson Russ LLP uses:

  • Uses Stealthwatch for the following reasons:
    • Identify malware and APTs
    • Prevent ransomware attacks

Hodgson Russ LLP has integrated Stealthwatch with the Identity Services Engine (ISE).

Results

Hodgson Russ LLP achieved the following results with Cisco Stealthwatch:

  • Uses Stealthwatch for the following reasons:
    • Reduce enterprise risk
    • Maintain a competitive advantage
    • Increase operational efficiency
  • Uses Stealthwatch to enable the following:
    • Detect threats faster
    • Secure more areas of the network
    • Illuminate blind spots in the network
    • Use the network as a sensor
  • Rates their experience with Stealthwatch’s proposed benefits to be as follows:
    • Simple, easy to use: strongly agree
    • Open, easy to integrate: strongly agree
    • Automated, reduces manual work: strongly agree
    • Effective, enhances security: very strongly agree




About This Data

This data was sourced directly from verified users of Cisco Secure Network Analytics by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on Cisco Secure Network Analytics