-
"The breadth of information StealthWatch affords in conjunction with both definable and built-in heuristics—helps us view all traffic flowing across our networks and security devices. With StealthWatch, we can identify security threats, capture statistics and data streams for capacity planning, enforce usage policies, and solve performance problems much faster. It …
-
"UNC-Chapel Hill is a unique research and learning environment that enthusiastically supports innovative technologies. We use StealthWatch’s ability to accommodate large volumes of data to understand network traffic at a higher level. The increased visibility contributes to the identification of infected machines and enables us to proactively plan for new …
-
"StealthWatch has been tremendously effective in providing unique visibility for enhanced understanding of our network and security posture. StealthWatch played a key role in the detection of several devices that were infected with the Blaster Virus. Through its powerful correlation ability, StealthWatch worked directly with our firewalls and IDS to …
-
"Going to Lancope has provided us with end-to-end visibility, and monitoring scalability once thought impossible for a reasonable price."
-
"StealthWatch improves upon the inherent details in NetFlow with detection algorithms and an interface to visualize Netflow in new ways."
-
“StealthWatch works well with Cisco NetFlow to give holistic picture of the network. It allows us to group and build out profiles that reduce the amount of raw analysis making it practical for a very small security team to get a handle on what is happening on a large network.”
-
"We needed a robust system to monitor and protect our network investment and Lancope has come to our aid in a pinch, getting StealthWatch up and running quickly. We are able to watch more baseball than monitors because of [StealthWatch]. Having [StealthWatch] in place and having everything run smoothly, it …
-
"Immediately upon deployment, StealthWatch uncovered 400 misbehaving hosts and helped reduce network threats by 90 percent. Email worms, which used to propagate quickly, are now immediately stopped with StealthWatch. New attacks, for which no signatures exist, now fail to gain a foothold unlike before."
-
"With its behavior-based approach, StealthWatch can cost-effectively scale by leveraging our current network infrastructure and analyzing NetFlow from our Cisco routers and Enterasys switches.StealthWatch impressed us with its ability to provide visibility of the internal network from the core to the edges, enabling us to quickly remediate any issue [StealthWatch] …
-
“Going to Lancope has provided us with end-to-end visibility, and monitoring scalability once thought impossible for a reasonable price.”
-
"With StealthWatch in place, we’ve been able to reduce the time required for problem resolution from four or five hours down to just one hour. StealthWatch has brought us several compliance-related benefits as well. We use the advanced user identity tracking to monitor which users are dialing into particular servers …
-
"StealthWatch is the only solution that could scale to our needs."
-
"StealthWatch has increased our visibility of internal network traffic ten-fold from 90MB per minute to 900MB per minute. StealthWatch helps our network and security managers view traffic patterns without having to deploy costly sniffers or LAN probes on every segment, and provides a rich source of data for security-related tasks."
-
"StealthWatch is an incredibly useful tool for blocking external reconnaissance traffic and locating compromised systems throughout our campus."
-
"We knew that the volume of new attacks and the vectors used were only going to increase, so we chose to stay ahead of the curve with a behavioral analysis system. I believe behavior and anomaly-based solutions will be most effective long term. StealthWatch was the only solution we tested …