"We needed a robust system to monitor and protect our network investment and Lancope has come to our aid in a pinch, getting StealthWatch up and running quickly. We are able to watch more baseball than monitors because of [StealthWatch]. Having [StealthWatch] in place and having everything run smoothly, it was great for us to have time and go out and watch these playoff games."
"The breadth of information StealthWatch affords in conjunction with both definable and built-in heuristics—helps us view all traffic flowing across our networks and security devices. With StealthWatch, we can identify security threats, capture statistics and data streams for capacity planning, enforce usage policies, and solve performance problems much faster. It also enables our staff to respond to network threats and outages quickly and intelligently, reducing business impact."
"StealthWatch enables us to know what is happening across our entire network 24/7."
"StealthWatch has helped us to enforce policy...any organization should have it on the short list of requirements."
"Stealthwatch provides an holistic view of our network rather than a specific link or part of the network. The rich functionality together with the superb customer support gives us an excellent tool for combating security issues on the network."
“We are still in the deployment phase of StealthWatch and in the process of 'dialing it in.' It has helped us in identifying threats and network troubleshooting though."
"StealthWatch vigilantly watches our network traffic and alerts us to anything unwanted or unexpected so that we can take action quickly. With our network organized into different zones and sub-zones, StealthWatch’s intuitive GUI makes it easy to spot exactly where and when something is happening on the network in real time."
"We knew that the volume of new attacks and the vectors used were only going to increase, so we chose to stay ahead of the curve with a behavioral analysis system. I believe behavior and anomaly-based solutions will be most effective long term. StealthWatch was the only solution we tested that does not rely on canned signature-matching techniques to identify risky network traffic... StealthWatch is now the single point of reference when we’re trying to resolve security challenges or observe new trends that may cause performance issues later on. We can tailor the system reporting to include as much or as little data as we choose. Furthermore, StealthWatch is an integral part of the network access control."
"With its behavior-based approach, StealthWatch can cost-effectively scale by leveraging our current network infrastructure and analyzing NetFlow from our Cisco routers and Enterasys switches.StealthWatch impressed us with its ability to provide visibility of the internal network from the core to the edges, enabling us to quickly remediate any issue [StealthWatch] streamlines the remediation process and reduces incident investigation by more than half... StealthWatch took advantage of Aurora’s already existing router and traffic infrastructure, making it a wise investment."