"StealthWatch is an incredibly useful tool for blocking external reconnaissance traffic and locating compromised systems throughout our campus."
"StealthWatch offers the best capabilities for categorizing the threat level of network traffic. Its proprietary Concern Index correlates alarms with threat levels to indicate when malicious activity may be occurring. I found StealthWatch to be both intuitive and logical, as I easily navigated from a high-level view of security and traffic status indicators to the underlying insightful details. Upon installation, StealthWatch immediately identified minor system misconfigurations on the network, such as DNS and WINS settings as well as various unnecessary applications. It even highlighted some interesting traffic for further investigation. We were able to fix a number of network problems during the evaluation period."
"Going to Lancope has provided us with end-to-end visibility, and monitoring scalability once thought impossible for a reasonable price."
"Of all the solutions we evaluated, StealthWatch provided the most comprehensive view of our network traffic, along with the most flexible alerting and mitigation options. With its efficient, accessible reporting on all our network traffic, StealthWatch helps us tune our entire network for better performance and enhanced security."
"Upon implementation, StealthWatch immediately alerted us to port-scanning activities on our network and identified several infected machines that had entered through VPN access. StealthWatch allows us to know what is continuously happening on the network. Similar to a mechanic who needs the right tools to fix a car, we use StealthWatch to fix our network."
"StealthWatch can look at NetFlow and monitor the entire network. [It] has already had an immediate and positive impact on our network. StealthWatch excels at providing a wealth of useful, actionable information about what is happening on the network. Cancer Research UK uses StealthWatch to quickly identify threats and affected hosts and servers, mitigate attacks and perform forensic analysis in order to maintain high network availability."
"StealthWatch enables our support team to make strategic decisions about network and security management based on a unified view of network, security and user information across the enterprise. Not only does it provide network performance monitoring to ensure our applications run optimally, StealthWatch also identifies internal and external threats through behavior based algorithms."
"Stealthwatch provides an holistic view of our network rather than a specific link or part of the network. The rich functionality together with the superb customer support gives us an excellent tool for combating security issues on the network."
“We are still in the deployment phase of StealthWatch and in the process of 'dialing it in.' It has helped us in identifying threats and network troubleshooting though."
"StealthWatch has dramatically increased our network visibility. We’ve gone from analyzing 10 percent of network connections to 95 percent or higher. Tasks, which we used to avoid because of the effort required, are now performed quickly and efficiently using StealthWatch. A NetFlow analysis tool of some sort is a ‘must have’ for any network and security operations team, and StealthWatch is the product to consider if you demand the best technology available. Like using a mobile phone, once you’ve seen StealthWatch in action, you’ll wonder how you possibly lived without it."
"[My favorite aspect of the StealthWatch Solution is it gives an] overview of the network."
"StealthWatch has made our network team more productive. It automates many of the tedious analysis...offers more visibility and remains on duty 24/7."
"[StealthWatch] has the ability to drill down into information from a single console."
"Greater visibility and the ability to zero in on the problem quickly. Ability to trace incidents back to source."
"[Lancope’s StealthWatch] validates the fact that when a system is compromised/virused – we have the network information to back it up in the form of flows."