-
"We purchased Lancope due to a sense of urgency brought about by the results of an external penetration test. Our organization is relatively small, and the IT focus had been on everything but security for a while. Lancope immediately made clear its ROI due to the overwhelming visibility it provided …
-
“I like having access to the highly trained staff to help us talk through alerts and issues that we have on our network. "
-
"Immediately upon deployment, StealthWatch uncovered 400 misbehaving hosts and helped reduce network threats by 90 percent. Email worms, which used to propagate quickly, are now immediately stopped with StealthWatch. New attacks, for which no signatures exist, now fail to gain a foothold unlike before."
-
“We are still in the deployment phase of StealthWatch and in the process of 'dialing it in.' It has helped us in identifying threats and network troubleshooting though."
-
"StealthWatch gives us better visibility of internal traffic and its File Sharing Index accurately identifies machines running P2P applications."
-
"StealthWatch has saved us a great deal of time, especially with extremely complex troubleshooting. In addition, we are using StealthWatch to gain application awareness, which enables us to quickly identify and respond to unauthorized application usage."
-
"UNC-Chapel Hill is a unique research and learning environment that enthusiastically supports innovative technologies. We use StealthWatch’s ability to accommodate large volumes of data to understand network traffic at a higher level. The increased visibility contributes to the identification of infected machines and enables us to proactively plan for new …
-
"[My favorite aspect of the StealthWatch Solution is it gives an] overview of the network."
-
"StealthWatch can look at NetFlow and monitor the entire network. [It] has already had an immediate and positive impact on our network. StealthWatch excels at providing a wealth of useful, actionable information about what is happening on the network. Cancer Research UK uses StealthWatch to quickly identify threats and affected …
-
"With its behavior-based approach, StealthWatch can cost-effectively scale by leveraging our current network infrastructure and analyzing NetFlow from our Cisco routers and Enterasys switches.StealthWatch impressed us with its ability to provide visibility of the internal network from the core to the edges, enabling us to quickly remediate any issue [StealthWatch] …
-
"We knew that the volume of new attacks and the vectors used were only going to increase, so we chose to stay ahead of the curve with a behavioral analysis system. I believe behavior and anomaly-based solutions will be most effective long term. StealthWatch was the only solution we tested …
-
"StealthWatch is an incredibly useful tool for blocking external reconnaissance traffic and locating compromised systems throughout our campus."
-
"[Lancope] allows our engineers to address network performance issues faster and the StealthWatch System has made our network more technically visible in our reports."
-
"[My favorite aspect of the StealthWatch Solution is ] being able to see what is on the wire."
-
"Upon implementation, StealthWatch immediately alerted us to port-scanning activities on our network and identified several infected machines that had entered through VPN access. StealthWatch allows us to know what is continuously happening on the network. Similar to a mechanic who needs the right tools to fix a car, we use …