"StealthWatch provides our team with actionable network performance metrics that help increase system availability and lower IT operating costs."
"We knew that the volume of new attacks and the vectors used were only going to increase, so we chose to stay ahead of the curve with a behavioral analysis system. I believe behavior and anomaly-based solutions will be most effective long term. StealthWatch was the only solution we tested that does not rely on canned signature-matching techniques to identify risky network traffic... StealthWatch is now the single point of reference when we’re trying to resolve security challenges or observe new trends that may cause performance issues later on. We can tailor the system reporting to include as much or as little data as we choose. Furthermore, StealthWatch is an integral part of the network access control."
"Upon implementation, StealthWatch immediately alerted us to port-scanning activities on our network and identified several infected machines that had entered through VPN access. StealthWatch allows us to know what is continuously happening on the network. Similar to a mechanic who needs the right tools to fix a car, we use StealthWatch to fix our network."
"The HP Vertica Analytics Platform is an integral component of Lancope StealthWatch because it enables the tool to handle the enormous volume of data it collects. HP Vertica’s analytical capabilities and fast query speeds help ensure we detect network security issues as quickly as possible."
"StealthWatch enables our support team to make strategic decisions about network and security management based on a unified view of network, security and user information across the enterprise. Not only does it provide network performance monitoring to ensure our applications run optimally, StealthWatch also identifies internal and external threats through behavior based algorithms."
"Going to Lancope has provided us with end-to-end visibility, and monitoring scalability once thought impossible for a reasonable price."
"StealthWatch has dramatically increased our network visibility. We’ve gone from analyzing 10 percent of network connections to 95 percent or higher. Tasks, which we used to avoid because of the effort required, are now performed quickly and efficiently using StealthWatch. A NetFlow analysis tool of some sort is a ‘must have’ for any network and security operations team, and StealthWatch is the product to consider if you demand the best technology available. Like using a mobile phone, once you’ve seen StealthWatch in action, you’ll wonder how you possibly lived without it."
"The benefits of StealthWatch are felt enterprise-wide, as it helps keep our network secure and our staff productive. The network team greatly benefits from StealthWatch’s time-saving capabilities for network and forensic analysis; the security team is more confident that network-related incidents can be detected and quickly corrected; and management can be kept better informed."
"Stealthwatch provides an holistic view of our network rather than a specific link or part of the network. The rich functionality together with the superb customer support gives us an excellent tool for combating security issues on the network."
"StealthWatch enables us to know what is happening across our entire network 24/7."
"With its behavior-based approach, StealthWatch can cost-effectively scale by leveraging our current network infrastructure and analyzing NetFlow from our Cisco routers and Enterasys switches.StealthWatch impressed us with its ability to provide visibility of the internal network from the core to the edges, enabling us to quickly remediate any issue [StealthWatch] streamlines the remediation process and reduces incident investigation by more than half... StealthWatch took advantage of Aurora’s already existing router and traffic infrastructure, making it a wise investment."
“StealthWatch provides security and network information in one package.”
"Northern Illinois needed a secure appliance that could alert to most kinds of malicious traffic and that required no more than 30 minutes per day to manage. After tuning, StealthWatch required only 15 minutes a day to manage and did not demand signature-updates."
"Unless you know what is happening on your network the actual host conversations and the details about them you cannot even begin to serve your users. StealthWatch not only provides basic details about the ‘who, what, when and where’ of network traffic, but it also enables us to focus on the all-important ‘why’ behind many network problems. Our team’s productivity has increased significantly because we now have time to focus on other projects instead of spending hours manually diagnosing network-related traffic problems."
"StealthWatch gives us better visibility of internal traffic and its File Sharing Index accurately identifies machines running P2P applications."