"UNC-Chapel Hill is a unique research and learning environment that enthusiastically supports innovative technologies. We use StealthWatch’s ability to accommodate large volumes of data to understand network traffic at a higher level. The increased visibility contributes to the identification of infected machines and enables us to proactively plan for new applications and needs."
"StealthWatch provides us with the actionable insight we need to more quickly and confidently address the full spectrum of network and security issues we are faced with on a daily basis."
"[Lancope’s StealthWatch] validates the fact that when a system is compromised/virused – we have the network information to back it up in the form of flows."
"Stealthwatch provides an holistic view of our network rather than a specific link or part of the network. The rich functionality together with the superb customer support gives us an excellent tool for combating security issues on the network."
"We have used Lancope to consolidate several tools including replacing our IDS system and reducing costs and time to locate network problems. It provides much greater visibility across our network of anomalies and problems than we have ever had."
"We knew that the volume of new attacks and the vectors used were only going to increase, so we chose to stay ahead of the curve with a behavioral analysis system. I believe behavior and anomaly-based solutions will be most effective long term. StealthWatch was the only solution we tested that does not rely on canned signature-matching techniques to identify risky network traffic... StealthWatch is now the single point of reference when we’re trying to resolve security challenges or observe new trends that may cause performance issues later on. We can tailor the system reporting to include as much or as little data as we choose. Furthermore, StealthWatch is an integral part of the network access control."
"StealthWatch gives us better visibility of internal traffic and its File Sharing Index accurately identifies machines running P2P applications."
"StealthWatch has made our network team more productive. It automates many of the tedious analysis...offers more visibility and remains on duty 24/7."
"StealthWatch reduces problem-solving from days to seconds."
"[Lancope] allows our engineers to address network performance issues faster and the StealthWatch System has made our network more technically visible in our reports."
"StealthWatch has been tremendously effective in providing unique visibility for enhanced understanding of our network and security posture. StealthWatch played a key role in the detection of several devices that were infected with the Blaster Virus. Through its powerful correlation ability, StealthWatch worked directly with our firewalls and IDS to alert our information security and networks team about these misbehaving devices."
"StealthWatch is an incredibly useful tool for blocking external reconnaissance traffic and locating compromised systems throughout our campus."
"Unless you know what is happening on your network the actual host conversations and the details about them you cannot even begin to serve your users. StealthWatch not only provides basic details about the ‘who, what, when and where’ of network traffic, but it also enables us to focus on the all-important ‘why’ behind many network problems. Our team’s productivity has increased significantly because we now have time to focus on other projects instead of spending hours manually diagnosing network-related traffic problems."
"We needed a robust system to monitor and protect our network investment and Lancope has come to our aid in a pinch, getting StealthWatch up and running quickly. We are able to watch more baseball than monitors because of [StealthWatch]. Having [StealthWatch] in place and having everything run smoothly, it was great for us to have time and go out and watch these playoff games."
"StealthWatch has saved us a great deal of time, especially with extremely complex troubleshooting. In addition, we are using StealthWatch to gain application awareness, which enables us to quickly identify and respond to unauthorized application usage."