Stealthwatch Enterprise Customer Testimonial
Recently, our ISP claimed we flooded them because they transited traffic for us in the range of 60000 packets at a 30Mbps bandwidth. With Cisco Stealthwatch, we could identify the host that caused the issue and found a wireless Access Point (AP) that was on our network without permission. Behind the host IP, there were many uncontrolled devices and applications installed that generated the traffic which triggered the alarm.
— Horia Mioscu, IT Director, Distributie Energie Electrica Romania
This data was sourced directly from a verified user of Cisco Secure Network Analytics by TechValidate.
TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.
More Research on Cisco Secure Network Analytics