57 Lancope Testimonials

Industry
Company Size
15 per page
  • 15
Reset
1-12 of 57 results
  • "UNC-Chapel Hill is a unique research and learning environment that enthusiastically supports innovative technologies. We use StealthWatch’s ability to accommodate large volumes of data to understand network traffic at a higher level. The increased visibility contributes to the identification of infected machines and enables us to proactively plan for new …

  • "Unless you know what is happening on your network the actual host conversations and the details about them you cannot even begin to serve your users. StealthWatch not only provides basic details about the ‘who, what, when and where’ of network traffic, but it also enables us to focus on …

  • "StealthWatch offers the best capabilities for categorizing the threat level of network traffic. Its proprietary Concern Index correlates alarms with threat levels to indicate when malicious activity may be occurring. I found StealthWatch to be both intuitive and logical, as I easily navigated from a high-level view of security and …

  • "StealthWatch enables our support team to make strategic decisions about network and security management based on a unified view of network, security and user information across the enterprise. Not only does it provide network performance monitoring to ensure our applications run optimally, StealthWatch also identifies internal and external threats through …

  • "We have used Lancope to consolidate several tools including replacing our IDS system and reducing costs and time to locate network problems. It provides much greater visibility across our network of anomalies and problems than we have ever had."

  • "The StealthWatch FlowSensor VE provides enterprise visibility to help improve security and performance in the virtual environment, while preserving IT cost savings and minimizing complexity through ease of deployment as a VMware virtual appliance."

  • "The breadth of information StealthWatch affords in conjunction with both definable and built-in heuristics—helps us view all traffic flowing across our networks and security devices. With StealthWatch, we can identify security threats, capture statistics and data streams for capacity planning, enforce usage policies, and solve performance problems much faster. It …

  • "StealthWatch has made our network team more productive. It automates many of the tedious analysis...offers more visibility and remains on duty 24/7."

  • "Upon implementation, StealthWatch immediately alerted us to port-scanning activities on our network and identified several infected machines that had entered through VPN access. StealthWatch allows us to know what is continuously happening on the network. Similar to a mechanic who needs the right tools to fix a car, we use …

  • "StealthWatch performed extremely well during the evaluation. Its non-intrusive approach to monitoring does not impact network performance, and StealthWatch has excellent reporting and alerting capabilities. The depth of analysis and information available from StealthWatch is astounding. The reports it produces either scheduled or on demand are excellent and easy to …

  • "StealthWatch can look at NetFlow and monitor the entire network. [It] has already had an immediate and positive impact on our network. StealthWatch excels at providing a wealth of useful, actionable information about what is happening on the network. Cancer Research UK uses StealthWatch to quickly identify threats and affected …

  • "Stealthwatch provides an holistic view of our network rather than a specific link or part of the network. The rich functionality together with the superb customer support gives us an excellent tool for combating security issues on the network."

  • "We knew that the volume of new attacks and the vectors used were only going to increase, so we chose to stay ahead of the curve with a behavioral analysis system. I believe behavior and anomaly-based solutions will be most effective long term. StealthWatch was the only solution we tested …

  • "Northern Illinois needed a secure appliance that could alert to most kinds of malicious traffic and that required no more than 30 minutes per day to manage. After tuning, StealthWatch required only 15 minutes a day to manage and did not demand signature-updates."

  • "We are dependent on [StealthWatch by Lancope’s] ‘Alarm and Target (Alarm Report by Type)’ for security analysis and detection."