TechValidate Research on Cisco Secure Network Analytics


Case Study: Tembec

Introduction

This case study of Tembec is based on a December 2012 survey of Cisco Stealthwatch customers by TechValidate, a 3rd-party research service.

“Greater visibility and the ability to zero in on the problem quickly. Ability to trace incidents back to source.”

Challenges

  • Solved the following operational challenges with Stealthwatch by Cisco:
    • Reduced mean-time-to-know (MTTK) root cause of network or security incidents
    • Enhanced network security posture
    • Increased efficiency in the identification of security threats
    • Increased flow collection, monitoring and analysis

Use Case

  • Primarily uses Stealthwatch by Cisco in the following ways:
    • Incident Response
    • Network Forensics
    • Security Forensics
    • Network performance monitoring
  • Used Stealthwatch to detect or prevent the following security threats:
    • Network malware or virus
    • Suspicious user behavior
    • Compromised host
    • Network reconnaissance
  • Is doing the following with Stealthwatch by Cisco deployment:
    • Monitoring a large, globally distributed network

Results

  • Chose Stealthwatch by Cisco for the following capabilities:
    • Behavior-based security monitoring
    • Real-time flow monitoring capabilities
  • Selected Stealthwatch by Cisco over the following vendors:
    • Riverbed Cascade / Mazu Networks
    • Arbor Networks
    • NetQoS / CA
  • Meets enterprise requirements by utilizing the following Stealthwatch by Cisco benefits:
    • Improved incident response and threat management
    • Enterprise-wide visibility into network activity
    • Forensic analysis
  • Reduced the time it took to mitigate a security incident by 50% to 74% by deploying Stealthwatch.
  • Rated the following Stealthwatch by Cisco capabilities as compared to competing vendors:
    • Network Security: Much Better
    • Performance Monitoring: Better
    • Scalability: Better
    • Network Visibility: Better
    • Innovation: Better




About This Data

This data was sourced directly from verified users of Cisco Secure Network Analytics by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on Cisco Secure Network Analytics