-
"[Lancope’s StealthWatch] validates the fact that when a system is compromised/virused – we have the network information to back it up in the form of flows."
-
"Greater visibility and the ability to zero in on the problem quickly. Ability to trace incidents back to source."
-
"We knew that the volume of new attacks and the vectors used were only going to increase, so we chose to stay ahead of the curve with a behavioral analysis system. I believe behavior and anomaly-based solutions will be most effective long term. StealthWatch was the only solution we tested …
-
"UNC-Chapel Hill is a unique research and learning environment that enthusiastically supports innovative technologies. We use StealthWatch’s ability to accommodate large volumes of data to understand network traffic at a higher level. The increased visibility contributes to the identification of infected machines and enables us to proactively plan for new …
-
"[My favorite aspect of the StealthWatch Solution is ] being able to see what is on the wire."
-
"With its behavior-based approach, StealthWatch can cost-effectively scale by leveraging our current network infrastructure and analyzing NetFlow from our Cisco routers and Enterasys switches.StealthWatch impressed us with its ability to provide visibility of the internal network from the core to the edges, enabling us to quickly remediate any issue [StealthWatch] …
-
"[Lancope] allows our engineers to address network performance issues faster and the StealthWatch System has made our network more technically visible in our reports."
-
"[My favorite aspect of the StealthWatch Solution is it gives an] overview of the network."
-
"[StealthWatch] has the ability to drill down into information from a single console."
-
"StealthWatch has helped us to enforce policy...any organization should have it on the short list of requirements."
-
"StealthWatch has been tremendously effective in providing unique visibility for enhanced understanding of our network and security posture. StealthWatch played a key role in the detection of several devices that were infected with the Blaster Virus. Through its powerful correlation ability, StealthWatch worked directly with our firewalls and IDS to …
-
"The anomaly based protection has been very instrumental in identifying security threats both internally and externally."
-
"StealthWatch is one of the first high quality IPV6 solutions for monitoring and visualizing network traffic. With its ability to analyze both NetFlow and sFlow data, StealthWatch quickly shows us the 'who, what, when and where' of network traffic."
-
"StealthWatch has dramatically increased our network visibility. We’ve gone from analyzing 10 percent of network connections to 95 percent or higher. Tasks, which we used to avoid because of the effort required, are now performed quickly and efficiently using StealthWatch. A NetFlow analysis tool of some sort is a ‘must …
-
"Upon implementation, StealthWatch immediately alerted us to port-scanning activities on our network and identified several infected machines that had entered through VPN access. StealthWatch allows us to know what is continuously happening on the network. Similar to a mechanic who needs the right tools to fix a car, we use …