TechValidate Research on Cisco Secure Network Analytics


Cisco Stealthwatch Case Study

Horizon Blue Cross Blue Shield of NJ

Introduction

This case study of Horizon Blue Cross Blue Shield of NJ is based on a September 2016 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Stealthwatch protects my previous investments by allowing me to do more with my existing security tools.”

“Stealthwatch has dramatically improved my organization’s security posture.”

Challenges

The business challenges that led Horizon Blue Cross Blue Shield of NJ to evaluate and ultimately select Cisco Stealthwatch:

  • Uses Stealthwatch to gain visibility into the following:
    • Application usage
    • Virtualized infrastructure

Use Case

The key features and functionalities of Cisco Stealthwatch that the surveyed company uses:

  • Uses Stealthwatch for the following reasons:
    • Identify malware and APTs
    • Improve network performance
    • Proactively hunt for threats on the network
    • Prevent DDoS attacks
    • Enforce policy

Horizon Blue Cross Blue Shield of NJ has integrated Stealthwatch with the Identity Services Engine (ISE).

Results

The surveyed company achieved the following results with Cisco Stealthwatch:

  • Uses Stealthwatch for the following reasons:
    • Improve security efficacy
    • Reduce enterprise risk
    • Maintain a competitive advantage
    • Protect intellectual property
    • Better serve customers/partners
    • Increase operational efficiency
    • Improve regulatory compliance
  • Uses Stealthwatch to enable the following:
    • Detect threats faster
    • Secure more areas of the network
    • Illuminate blind spots in the network
    • Reduce mean time to dwell on threats on the network
    • Accelerate incident response
    • Improve forensic investigations
    • Use the network as an enforcer
  • Rates their experience with Stealthwatch’s proposed benefits to be as follows:
    • Simple, easy to use: strongly agree
    • Open, easy to integrate: strongly agree
    • Automated, reduces manual work: strongly agree




About This Data

This data was sourced directly from verified users of Cisco Secure Network Analytics by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on Cisco Secure Network Analytics