"StealthWatch is one of the first high quality IPV6 solutions for monitoring and visualizing network traffic. With its ability to analyze both NetFlow and sFlow data, StealthWatch quickly shows us the 'who, what, when and where' of network traffic."
"StealthWatch has been tremendously effective in providing unique visibility for enhanced understanding of our network and security posture. StealthWatch played a key role in the detection of several devices that were infected with the Blaster Virus. Through its powerful correlation ability, StealthWatch worked directly with our firewalls and IDS to alert our information security and networks team about these misbehaving devices."
"StealthWatch is the only solution that could scale to our needs."
"StealthWatch vigilantly watches our network traffic and alerts us to anything unwanted or unexpected so that we can take action quickly. With our network organized into different zones and sub-zones, StealthWatch’s intuitive GUI makes it easy to spot exactly where and when something is happening on the network in real time."
"StealthWatch provides our team with actionable network performance metrics that help increase system availability and lower IT operating costs."
"StealthWatch has saved us a great deal of time, especially with extremely complex troubleshooting. In addition, we are using StealthWatch to gain application awareness, which enables us to quickly identify and respond to unauthorized application usage."
"The benefits of StealthWatch are felt enterprise-wide, as it helps keep our network secure and our staff productive. The network team greatly benefits from StealthWatch’s time-saving capabilities for network and forensic analysis; the security team is more confident that network-related incidents can be detected and quickly corrected; and management can be kept better informed."
"The breadth of information StealthWatch affords in conjunction with both definable and built-in heuristics—helps us view all traffic flowing across our networks and security devices. With StealthWatch, we can identify security threats, capture statistics and data streams for capacity planning, enforce usage policies, and solve performance problems much faster. It also enables our staff to respond to network threats and outages quickly and intelligently, reducing business impact."
"StealthWatch performed extremely well during the evaluation. Its non-intrusive approach to monitoring does not impact network performance, and StealthWatch has excellent reporting and alerting capabilities. The depth of analysis and information available from StealthWatch is astounding. The reports it produces either scheduled or on demand are excellent and easy to understand. Its ease of configuration and self-tuning reduces ongoing maintenance efforts. And its accuracy and integration within our existing environment provide ongoing security assurance for our network."
"The HP Vertica Analytics Platform is an integral component of Lancope StealthWatch because it enables the tool to handle the enormous volume of data it collects. HP Vertica’s analytical capabilities and fast query speeds help ensure we detect network security issues as quickly as possible."
"StealthWatch enables our support team to make strategic decisions about network and security management based on a unified view of network, security and user information across the enterprise. Not only does it provide network performance monitoring to ensure our applications run optimally, StealthWatch also identifies internal and external threats through behavior based algorithms."
"Network visibility is paramount for us and StealthWatch has greatly increased our network insight, especially with regard to internal traffic. The sheer amount of information StealthWatch provides is quite amazing and we are able to view our network in ways we never thought possible. The solution is helping us to proactively maintain a healthy, reliable network."
"[StealthWatch] has the ability to drill down into information from a single console."
"With StealthWatch in place, we’ve been able to reduce the time required for problem resolution from four or five hours down to just one hour. StealthWatch has brought us several compliance-related benefits as well. We use the advanced user identity tracking to monitor which users are dialing into particular servers and which users are making large data transfers. StealthWatch also enables us to identify, track and report on end users responsible for suspicious activity, including the files they accessed and when they gained access."
"StealthWatch has made our network team more productive. It automates many of the tedious analysis...offers more visibility and remains on duty 24/7."