"StealthWatch has dramatically increased our network visibility. We’ve gone from analyzing 10 percent of network connections to 95 percent or higher. Tasks, which we used to avoid because of the effort required, are now performed quickly and efficiently using StealthWatch. A NetFlow analysis tool of some sort is a ‘must have’ for any network and security operations team, and StealthWatch is the product to consider if you demand the best technology available. Like using a mobile phone, once you’ve seen StealthWatch in action, you’ll wonder how you possibly lived without it."
"The anomaly based protection has been very instrumental in identifying security threats both internally and externally."
"Stealthwatch provides an holistic view of our network rather than a specific link or part of the network. The rich functionality together with the superb customer support gives us an excellent tool for combating security issues on the network."
"With StealthWatch in place, we’ve been able to reduce the time required for problem resolution from four or five hours down to just one hour. StealthWatch has brought us several compliance-related benefits as well. We use the advanced user identity tracking to monitor which users are dialing into particular servers and which users are making large data transfers. StealthWatch also enables us to identify, track and report on end users responsible for suspicious activity, including the files they accessed and when they gained access."
"StealthWatch gives us better visibility of internal traffic and its File Sharing Index accurately identifies machines running P2P applications."
"We have used Lancope to consolidate several tools including replacing our IDS system and reducing costs and time to locate network problems. It provides much greater visibility across our network of anomalies and problems than we have ever had."
"We knew that the volume of new attacks and the vectors used were only going to increase, so we chose to stay ahead of the curve with a behavioral analysis system. I believe behavior and anomaly-based solutions will be most effective long term. StealthWatch was the only solution we tested that does not rely on canned signature-matching techniques to identify risky network traffic... StealthWatch is now the single point of reference when we’re trying to resolve security challenges or observe new trends that may cause performance issues later on. We can tailor the system reporting to include as much or as little data as we choose. Furthermore, StealthWatch is an integral part of the network access control."
"We are dependent on [StealthWatch by Lancope’s] ‘Alarm and Target (Alarm Report by Type)’ for security analysis and detection."
"We purchased Lancope due to a sense of urgency brought about by the results of an external penetration test. Our organization is relatively small, and the IT focus had been on everything but security for a while. Lancope immediately made clear its ROI due to the overwhelming visibility it provided to events that would likely had never been noticed had we not integrated Stealthwatch into our environment. It is hard to pick a favorite aspect at this juncture besides the Stealthwatch solution as a whole."
“I like having access to the highly trained staff to help us talk through alerts and issues that we have on our network. "
"[Lancope] allows our engineers to address network performance issues faster and the StealthWatch System has made our network more technically visible in our reports."
"StealthWatch provides us with the actionable insight we need to more quickly and confidently address the full spectrum of network and security issues we are faced with on a daily basis."
"StealthWatch is one of the first high quality IPV6 solutions for monitoring and visualizing network traffic. With its ability to analyze both NetFlow and sFlow data, StealthWatch quickly shows us the 'who, what, when and where' of network traffic."
"StealthWatch is a network-spanning visibility platform."
"StealthWatch has helped us to enforce policy...any organization should have it on the short list of requirements."