-
“StealthWatch works well with Cisco NetFlow to give holistic picture of the network. It allows us to group and build out profiles that reduce the amount of raw analysis making it practical for a very small security team to get a handle on what is happening on a large network.”
-
"The StealthWatch FlowSensor VE provides enterprise visibility to help improve security and performance in the virtual environment, while preserving IT cost savings and minimizing complexity through ease of deployment as a VMware virtual appliance."
-
"StealthWatch has been tremendously effective in providing unique visibility for enhanced understanding of our network and security posture. StealthWatch played a key role in the detection of several devices that were infected with the Blaster Virus. Through its powerful correlation ability, StealthWatch worked directly with our firewalls and IDS to …
-
"We knew that the volume of new attacks and the vectors used were only going to increase, so we chose to stay ahead of the curve with a behavioral analysis system. I believe behavior and anomaly-based solutions will be most effective long term. StealthWatch was the only solution we tested …
-
"With StealthWatch in place, we’ve been able to reduce the time required for problem resolution from four or five hours down to just one hour. StealthWatch has brought us several compliance-related benefits as well. We use the advanced user identity tracking to monitor which users are dialing into particular servers …
-
"Lancope’s solution has provided us with better visibility into network activity across our global enterprise. The near real-time data reporting and alerting capabilities enable our team to detect and respond quicker to security incidents as they occur."
-
"Upon implementation, StealthWatch immediately alerted us to port-scanning activities on our network and identified several infected machines that had entered through VPN access. StealthWatch allows us to know what is continuously happening on the network. Similar to a mechanic who needs the right tools to fix a car, we use …
-
"The StealthWatch System proactively manages the utilization of our network, identifying and removing sources of inappropriate traffic. As a result, more bandwidth is available for productive use by the organizations connected to EMMAN. As StealthWatch alerts us in real time to areas of high concern, the reliability and availability of …
-
"We needed a robust system to monitor and protect our network investment and Lancope has come to our aid in a pinch, getting StealthWatch up and running quickly. We are able to watch more baseball than monitors because of [StealthWatch]. Having [StealthWatch] in place and having everything run smoothly, it …
-
"StealthWatch performed extremely well during the evaluation. Its non-intrusive approach to monitoring does not impact network performance, and StealthWatch has excellent reporting and alerting capabilities. The depth of analysis and information available from StealthWatch is astounding. The reports it produces either scheduled or on demand are excellent and easy to …
-
"Unless you know what is happening on your network the actual host conversations and the details about them you cannot even begin to serve your users. StealthWatch not only provides basic details about the ‘who, what, when and where’ of network traffic, but it also enables us to focus on …
-
"StealthWatch reduces problem-solving from days to seconds."
-
"StealthWatch gives us better visibility of internal traffic and its File Sharing Index accurately identifies machines running P2P applications."
-
"StealthWatch is an incredibly useful tool for blocking external reconnaissance traffic and locating compromised systems throughout our campus."
-
"Immediately upon deployment, StealthWatch uncovered 400 misbehaving hosts and helped reduce network threats by 90 percent. Email worms, which used to propagate quickly, are now immediately stopped with StealthWatch. New attacks, for which no signatures exist, now fail to gain a foothold unlike before."