57 Lancope Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • "StealthWatch has helped us to enforce policy...any organization should have it on the short list of requirements."

  • "StealthWatch provides our team with actionable network performance metrics that help increase system availability and lower IT operating costs."

  • "The breadth of information StealthWatch affords in conjunction with both definable and built-in heuristics—helps us view all traffic flowing across our networks and security devices. With StealthWatch, we can identify security threats, capture statistics and data streams for capacity planning, enforce usage policies, and solve performance problems much faster. It also enables our staff to respond to network threats and outages quickly and intelligently, reducing business impact."

  • "We knew that the volume of new attacks and the vectors used were only going to increase, so we chose to stay ahead of the curve with a behavioral analysis system. I believe behavior and anomaly-based solutions will be most effective long term. StealthWatch was the only solution we tested that does not rely on canned signature-matching techniques to identify risky network traffic... StealthWatch is now the single point of reference when we’re trying to resolve security challenges or observe new trends that may cause performance issues later on. We can tailor the system reporting to include as much or as little data as we choose. Furthermore, StealthWatch is an integral part of the network access control."

  • "StealthWatch reduces problem-solving from days to seconds."

  • “I like having access to the highly trained staff to help us talk through alerts and issues that we have on our network. "

  • "StealthWatch provides us with the actionable insight we need to more quickly and confidently address the full spectrum of network and security issues we are faced with on a daily basis."

  • "StealthWatch has dramatically increased our network visibility. We’ve gone from analyzing 10 percent of network connections to 95 percent or higher. Tasks, which we used to avoid because of the effort required, are now performed quickly and efficiently using StealthWatch. A NetFlow analysis tool of some sort is a ‘must have’ for any network and security operations team, and StealthWatch is the product to consider if you demand the best technology available. Like using a mobile phone, once you’ve seen StealthWatch in action, you’ll wonder how you possibly lived without it."

  • "Northern Illinois needed a secure appliance that could alert to most kinds of malicious traffic and that required no more than 30 minutes per day to manage. After tuning, StealthWatch required only 15 minutes a day to manage and did not demand signature-updates."

  • "StealthWatch has saved us a great deal of time, especially with extremely complex troubleshooting. In addition, we are using StealthWatch to gain application awareness, which enables us to quickly identify and respond to unauthorized application usage."

  • "The StealthWatch FlowSensor VE provides enterprise visibility to help improve security and performance in the virtual environment, while preserving IT cost savings and minimizing complexity through ease of deployment as a VMware virtual appliance."

  • "StealthWatch can look at NetFlow and monitor the entire network. [It] has already had an immediate and positive impact on our network. StealthWatch excels at providing a wealth of useful, actionable information about what is happening on the network. Cancer Research UK uses StealthWatch to quickly identify threats and affected hosts and servers, mitigate attacks and perform forensic analysis in order to maintain high network availability."

  • "Upon implementation, StealthWatch immediately alerted us to port-scanning activities on our network and identified several infected machines that had entered through VPN access. StealthWatch allows us to know what is continuously happening on the network. Similar to a mechanic who needs the right tools to fix a car, we use StealthWatch to fix our network."

  • "UNC-Chapel Hill is a unique research and learning environment that enthusiastically supports innovative technologies. We use StealthWatch’s ability to accommodate large volumes of data to understand network traffic at a higher level. The increased visibility contributes to the identification of infected machines and enables us to proactively plan for new applications and needs."

  • "The anomaly based protection has been very instrumental in identifying security threats both internally and externally."