Coming October 25: PeerSpot Awards will be announced! Learn more
2019-06-17T08:45:00Z
Julia Frohwein - PeerSpot reviewer
Senior Director of Delivery at PeerSpot (formerly IT Central Station)
  • 0
  • 18

What do you like most about Cisco Stealthwatch?

Hi Everyone,

What do you like most about Cisco Stealthwatch?

Thanks for sharing your thoughts with the community!

43
PeerSpot user
43 Answers
Gerald Jimenez - PeerSpot reviewer
IT Operations Supervisor at Aboitiz Equity Ventures, Inc.
Real User
Top 5
2022-05-26T10:57:00Z
26 May 22

StealthWatch lets me see the ports running in and out and the country. It has excellent reporting, telemetry, and artificial intelligence features. With the telemetry, I can set thresholds to detect sudden changes and the alarms go through the PLC parts. I can see all the ports running on that trunk.

MM
PMO Department at a comms service provider with 1,001-5,000 employees
Real User
Top 20
2022-02-17T13:00:00Z
17 February 22

It provides good visibility to the customers. People are still evaluating it, but it provides visibility and helps them to take action to remediate and mitigate the issues that are highlighted on the dashboard. It has good integration with the Cisco switching platform.

JC
Chief Technology Officer at a tech services company with 51-200 employees
MSP
Top 20
2021-06-25T19:18:40Z
25 June 21

Great network monitoring, looking at anomaly detection and evaluation.

ML
National Offering Lead - Security Practice at a computer software company with 501-1,000 employees
MSP
2021-02-11T14:58:47Z
11 February 21

We find that Stealthwatch can detect the unseen.

JB
Ingenieria at a tech services company with 11-50 employees
Real User
2021-02-07T11:03:51Z
07 February 21

Overall, the implementation is very good.

JD
Enterprise Information Security Architect at a agriculture with 5,001-10,000 employees
Real User
Top 10
2021-01-14T23:25:17Z
14 January 21

It has definitely helped us improve our mean time to resolution on network issues.

Learn what your peers think about Cisco Secure Network Analytics. Get advice and tips from experienced pros sharing their opinions. Updated: September 2022.
632,611 professionals have used our research since 2012.
JS
Senior Security Consultant at a tech services company with 51-200 employees
Real User
2020-11-02T05:52:00Z
02 November 20

It's easy to set up. The deployment takes one or two days. You need to collect the data from a device and then direct it to the portal.

JH
Chief Consultant at a tech services company with 11-50 employees
Consultant
2019-09-23T06:34:00Z
23 September 19

The most valuable feature is anomaly detection, where it finds things that are not allowed internally.

SL
Network Administrator at a retailer with 1,001-5,000 employees
Real User
2019-07-02T06:57:00Z
02 July 19

Most of the engineers I've worked with have been really good. Very knowledgeable and easy to work with.

SD
Network Manager at a healthcare company with 1,001-5,000 employees
Real User
2019-07-02T06:57:00Z
02 July 19

It does change the way we troubleshoot and it is relatively easy to use once you learn it. I would recommend it to someone considering it.

Toufeik Choukri - PeerSpot reviewer
PIC for Cyber Security at a university with 51-200 employees
Real User
2019-06-23T09:40:00Z
23 June 19

There are already many functionalities, so I don't think there is anything to improve.

EF
Network Manager at a financial services firm with 1,001-5,000 employees
Real User
2019-06-17T08:46:00Z
17 June 19

The most valuable feature we got out of Stealthwatch is to be able to, while troubleshooting, go deep into one of our interfaces and verify what the bandwidth is and if there's any activity there that's causing problems.

Rafael-Garcia - PeerSpot reviewer
Infosec Manager at a energy/utilities company with 1,001-5,000 employees
Real User
2019-06-17T08:46:00Z
17 June 19

Stability is the most valuable feature we have seen in this solution.

Rob Hartstone - PeerSpot reviewer
Network Operations Manager at Philips Electronics
Real User
2019-06-17T08:46:00Z
17 June 19

The fact that it can identify down to an IP address of a system that is causing problems, or potentially causing problems, is very valuable.

JW
Network Administrator at a mining and metals company with 1,001-5,000 employees
Real User
2019-06-17T08:46:00Z
17 June 19

The most valuable feature of this solution is data hoarding because it catches threats on a frequent basis that we had no idea of.

JC
Lead Network Engineer at a retailer with 1,001-5,000 employees
Real User
2019-06-17T08:46:00Z
17 June 19

The ability to send data flow from other places and have them all in one place is very valuable for us.

RF
Senior Network Engineer at a comms service provider
Real User
2019-06-17T08:46:00Z
17 June 19

The most valuable feature about this solution is that it gives me insight of my network.

AA
Director Network Services at a consultancy with 1,001-5,000 employees
Real User
2019-06-17T08:46:00Z
17 June 19

The most valuable feature is having visibility into the data segments throughout our network.

Ken Poteate - PeerSpot reviewer
Security Analysist at Amwins Group
Real User
2019-06-17T08:46:00Z
17 June 19

It has improved our internal knowledge of what's going on with the network, and that's helpful.

Finn Kristensen - PeerSpot reviewer
Architect at Atea A/S
Real User
2019-06-17T08:46:00Z
17 June 19

The most valuable features provided by this solution are visibility and information.

AR
Technical Consultant at a tech services company with 501-1,000 employees
Consultant
2019-06-17T08:46:00Z
17 June 19

The most valuable features are encrypted threat analysis and the ability to run jobs on entire flows.

UN
Director of Operations at a manufacturing company with 1,001-5,000 employees
Real User
2019-06-17T08:46:00Z
17 June 19

The most valuable features of this solution are the logging, keeping threats under control, and keeping our data and environment secure.

MG
Network Operations Manager at Symantec Corporation
Real User
2019-06-17T08:46:00Z
17 June 19

This product alleviates the day-to-day headaches for us, in regards to metrics.

BS
Director of Networking and Telecom at a healthcare company with 1,001-5,000 employees
Real User
2019-06-17T08:46:00Z
17 June 19

It's a dependable product that is able to pinpoint where we have vulnerabilities if they occur.

Douglas Bentley - PeerSpot reviewer
Assistant Director of IT at University of Rochester Medical Center
Real User
2019-06-17T08:46:00Z
17 June 19

Using the Cognitive Analytics feature, we have complete visibility that we didn’t have before.

RH
Sr. Network Engineer at Science Applications International Corporation
Real User
2019-06-17T08:46:00Z
17 June 19

Cisco Stealthwatch provides the solutions analytics and threat detection capabilities that I am looking for. It has also improved the network visibility of our organization.

WR
Network Engineer at a government with 1,001-5,000 employees
Real User
2019-06-17T08:45:00Z
17 June 19

The search options on Cisco Stealthwatch are the most valuable. You can get very granular with it, down to the kilobits or the seconds if you want. The product supports any time frame that you need, so that is nice.

SA
Network Section Chief at a government with 1,001-5,000 employees
Real User
2019-06-17T08:45:00Z
17 June 19

Cisco Stealthwatch has reduced the amount of time to detect an immediate threat.

BG
Manager of Digital Communications at Memorial Hermann Healthcare System
Real User
2019-06-17T08:45:00Z
17 June 19

The solution has increased our threat detection rate. Cisco Stealthwatch has not reduced our incident response times. It has not reduced the amount of time it takes us to detect immediate threats. It has reduced false positives.

SG
Engineer at Charter Communications, Inc.
Real User
2019-06-17T08:45:00Z
17 June 19

Being able to identify specific date closed across the network is invaluable.

TB
Senior Director of Architecture and Engineering at Trace3
Real User
2019-06-17T08:45:00Z
17 June 19

The most valuable part is that Stealthwatch is part of a portfolio of security devices from Cisco. Cisco literally can touch every single end point, every single ingress and egress point in the network. Nobody else has that.

DK
Network Engineer at UC San Diego Health System
Real User
2019-06-17T08:45:00Z
17 June 19

The most valuable feature of this solution is the way the net flow is being merged together in a single pane. That's been extremely useful for us, because can see what's going on with traffic in one single place.

JC
Service Engineer at Microsoft
Real User
2019-06-17T08:45:00Z
17 June 19

Using this solution has helped us to detect and identify viruses or malicious activity in the network early on.

Robert Ufer - PeerSpot reviewer
Network Architect at Henry Ford health system
Real User
2019-06-17T08:45:00Z
17 June 19

The solution's analytics and thrust detection capabilities are good. We're still adjusting it. It's a little hypersensitive, but it is working right now.

LW
Network Engineer at a tech services company
Real User
2019-06-17T08:45:00Z
17 June 19

I believe this solution has reduced our incident response time.

AM
Associate Director Network Services at a pharma/biotech company with 10,001+ employees
Real User
2019-06-17T08:45:00Z
17 June 19

The most valuable feature is its alerts and dashboard.

CK
Manager, Network Engineering & Telecommunications at a healthcare company with 1,001-5,000 employees
Real User
2019-06-17T08:45:00Z
17 June 19

The solution reduces the amount of time it takes to detect and remediate threats.

JQ
Network Manager Administrator at a financial services firm with 501-1,000 employees
Real User
2019-06-17T08:45:00Z
17 June 19

It is a good application, providing for real-time monitoring of the organization of data. It can basically identify points of peak traffic where possible issues are being caused.

SJ
IT Network Engineer at a logistics company with 10,001+ employees
Real User
2019-06-17T08:45:00Z
17 June 19

The feature most valuable for us is to gain visibility of what is actually floating through, so we can stop it based on whether it's good or bad traffic.

JS
Network Engineer at Oracle Corporation
Real User
2019-06-17T08:45:00Z
17 June 19

It has been pretty stable since we deployed it, and everything seems to be working fine.

JM
Sr Network Engineer at a insurance company with 5,001-10,000 employees
Real User
2019-06-17T08:45:00Z
17 June 19

Being able to graph and show data to management has improved our organization. We can show the data to the higher-ups. It shows them that it's picking up on these anomalies and doing its job.

AM
Senior Consultant at a manufacturing company with 10,001+ employees
Real User
2019-06-17T08:45:00Z
17 June 19

The most valuable feature is integration.

JS
Manager at Indiana University Health
Real User
2019-06-17T08:45:00Z
17 June 19

Stealthwatch has greatly improved our network visibility, in terms of bandwidth, malware, and PCI violations.

Related Questions
CW
Founder & CEO with 51-200 employees
Feb 11, 2020
I'm building a next-gen AI powered threat intelligence platform and am wondering what features are missing from existing products on the market and how much customers are paying for their security tools. I'm also conducting research on pricing models. What is the preferred method of payment, i.e. based on number of endpoints, storage used, user-based, flat fee subscription based? Thank you ...
2 out of 9 answers
DJ
CEO & Founder at a tech services company with 1-10 employees
26 August 19
Raffael Marty, Vice President, Forcepoint Research and Intelligence, said: "There is no artificial intelligence in the field of information security, and it is unlikely to be developed in 2019." Most of unsupervised machine learning-based network anomaly detection solution does not provide why the anomaly has been aroused and whether the anomaly is malicious or not. Most of such solution's pricing model is based on number of endpoints but I prefer to have flat fee subscription-based.
ImadTaha - PeerSpot reviewer
Group CIO with 10,001+ employees
26 August 19
I that feel there are two old problems still there in the market: 1-Vendors don't talk to each other. 2-Whoever is focusing on endpoint is missing the network and human side and the opposite is also true. I love, for example, what Darktrace is doing in the network side and the playback option to know what happened in my network during a long holiday, for example, things will never be caught by a second-generation AV but I need to have a solid 2nd gen. AV besides the total high cost of Darktrace which by the way is worth it for IT pros but not for business owners. We need to have something like virus total but for risks and threats beyond viruses where all vendors work on this and all endpoint customers with different vendors connect to it to be secured.
Ariel Lindenfeld - PeerSpot reviewer
Director of Content at PeerSpot (formerly IT Central Station)
Jul 08, 2020
Let the community know what you think. Share your opinions now!
2 out of 3 answers
AM
User at HIA
25 May 20
Network Performance, bandwidth utilisation, data flow speed, Bottlenecks, nodes issues, network medium issues, segmentation efficiency, distributed network requirement as a solution, multicast required as a solution or re design it.
WC
CTO with 501-1,000 employees
04 June 20
It depends what your environment is. We have very good experiences with two solutions. When you're using Cisco Networking, their Stealthwatch solution (also part of their EA, a full NBA/ADS* solution) does a very good job and gets more and more integrated in their Networking, Security and Admission Control solutions. When you are looking for a less expensive solution, we have very good experiences with Flowmon, a spin off from the University of Brno (Tsjech Republic) and a very mature NBA/ADS* solution as well. In NL Flowmon is successfully in use by education, healthcare, finance and transportation. *NBA/ADS: Network Behavior Analysis / Anomaly Detection System.
Download Free Report
Download our free Cisco Secure Network Analytics Report and get advice and tips from experienced pros sharing their opinions. Updated: September 2022.
DOWNLOAD NOW
632,611 professionals have used our research since 2012.