"The anomaly based protection has been very instrumental in identifying security threats both internally and externally."
"StealthWatch enables us to know what is happening across our entire network 24/7."
“We are still in the deployment phase of StealthWatch and in the process of 'dialing it in.' It has helped us in identifying threats and network troubleshooting though."
"The breadth of information StealthWatch affords in conjunction with both definable and built-in heuristics—helps us view all traffic flowing across our networks and security devices. With StealthWatch, we can identify security threats, capture statistics and data streams for capacity planning, enforce usage policies, and solve performance problems much faster. It also enables our staff to respond to network threats and outages quickly and intelligently, reducing business impact."
"We knew that the volume of new attacks and the vectors used were only going to increase, so we chose to stay ahead of the curve with a behavioral analysis system. I believe behavior and anomaly-based solutions will be most effective long term. StealthWatch was the only solution we tested that does not rely on canned signature-matching techniques to identify risky network traffic... StealthWatch is now the single point of reference when we’re trying to resolve security challenges or observe new trends that may cause performance issues later on. We can tailor the system reporting to include as much or as little data as we choose. Furthermore, StealthWatch is an integral part of the network access control."
"UNC-Chapel Hill is a unique research and learning environment that enthusiastically supports innovative technologies. We use StealthWatch’s ability to accommodate large volumes of data to understand network traffic at a higher level. The increased visibility contributes to the identification of infected machines and enables us to proactively plan for new applications and needs."
"[Lancope’s StealthWatch] is a great way to see threats proactively."
"StealthWatch offers the best capabilities for categorizing the threat level of network traffic. Its proprietary Concern Index correlates alarms with threat levels to indicate when malicious activity may be occurring. I found StealthWatch to be both intuitive and logical, as I easily navigated from a high-level view of security and traffic status indicators to the underlying insightful details. Upon installation, StealthWatch immediately identified minor system misconfigurations on the network, such as DNS and WINS settings as well as various unnecessary applications. It even highlighted some interesting traffic for further investigation. We were able to fix a number of network problems during the evaluation period."
"Upon implementation, StealthWatch immediately alerted us to port-scanning activities on our network and identified several infected machines that had entered through VPN access. StealthWatch allows us to know what is continuously happening on the network. Similar to a mechanic who needs the right tools to fix a car, we use StealthWatch to fix our network."
"[Lancope] allows our engineers to address network performance issues faster and the StealthWatch System has made our network more technically visible in our reports."
"StealthWatch reduces problem-solving from days to seconds."
"[My favorite aspect of the StealthWatch Solution is ] being able to see what is on the wire."
"StealthWatch has saved us a great deal of time, especially with extremely complex troubleshooting. In addition, we are using StealthWatch to gain application awareness, which enables us to quickly identify and respond to unauthorized application usage."
"The StealthWatch FlowSensor VE provides enterprise visibility to help improve security and performance in the virtual environment, while preserving IT cost savings and minimizing complexity through ease of deployment as a VMware virtual appliance."
"Immediately upon deployment, StealthWatch uncovered 400 misbehaving hosts and helped reduce network threats by 90 percent. Email worms, which used to propagate quickly, are now immediately stopped with StealthWatch. New attacks, for which no signatures exist, now fail to gain a foothold unlike before."