2019-06-17T08:45:00Z
it_user434868 - PeerSpot reviewer
Senior Director of Delivery at a tech services company with 51-200 employees
  • 0
  • 418

What is your primary use case for Cisco Stealthwatch?

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

42
PeerSpot user
42 Answers
Gerald Jimenez - PeerSpot reviewer
IT Operations Supervisor at Aboitiz Equity Ventures, Inc.
Real User
Top 5
2022-05-26T10:57:00Z
May 26, 2022

We use StealthWatch for telemetry on the cybersecurity side. It's also used for CCTV, IoT, and all the other stuff that isn't connected to the network. There is a cloud version of StealthWatch, but we use the on-prem solution.

Search for a product comparison
MM
PMO Department at a comms service provider with 1,001-5,000 employees
Real User
Top 20
2022-02-17T13:00:00Z
Feb 17, 2022

We are a system integrator and a partner of Cisco. We are providing Network Detection and Response (NDR) solutions, and depending on a customer's requirement, we propose it. This product was launched recently, and it is new in the Cisco portfolio. We have supplied this solution to some of the customers. It is used for network protection for those segments that are not covered by the firewall. It is used for doing ransomware detection in terms of east-west traffic. A firewall can't detect that because it is mostly focused on north-south traffic. So, in the segments that are left out from the firewall, the StealthWatch network detection platform is able to see the malware that is sent to the devices.

JC
Chief Technology Officer at a tech services company with 51-200 employees
MSP
Top 20
2021-06-25T19:18:40Z
Jun 25, 2021

Our primary use case of Stealthwatch is for flow analysis, to see what's running on the network and to check for anomalous behavior. Stealthwatch runs in the background and analyzes flows, producing summary reports based on the information it receives. You can look for anything that's out of place, for example, background checking on a file transfer where there's a query as to whether it's a legitimate transfer. It's quite a powerful tool that questions what's going on. We are integrators and I'm the chief technology officer. We're gold partners with Cisco.

ML
National Offering Lead - Security Practice at a computer software company with 501-1,000 employees
MSP
2021-02-11T14:58:47Z
Feb 11, 2021

We are resellers, we provide solutions for our clients. We use Stealthwatch for network segmentation use-cases, data analytics around exfiltration, encrypted threat analytics, map phishing, scans. and as a tripwire on top of all of the other security controls that are available.

JB
Ingenieria at a tech services company with 11-50 employees
Real User
2021-02-07T11:03:51Z
Feb 7, 2021

We primarily handle the design, implementation, and support for the solution and we also manage collaboration, routing and switching, security products, et cetera.

JD
Enterprise Information Security Architect at a agriculture with 5,001-10,000 employees
Real User
Top 10
2021-01-14T23:25:17Z
Jan 14, 2021

From a security perspective, we are watching for behind the scenes data exfiltration, or tubulous, or malicious network traffic, that our other tools may not be detecting at a basic network layer. We are also using it for performance issues in trying to figure out if a site is experiencing issues with slowness. Also, we try to determine things like whether we are exceeding the bandwidth of the link or whether there is a bottleneck or something that's not negotiating correctly on the network. Also, we use it for TAP to try and do inline network traffic analysis from a security perspective or from a performance perspective as well.

Learn what your peers think about Cisco Secure Network Analytics. Get advice and tips from experienced pros sharing their opinions. Updated: December 2022.
656,474 professionals have used our research since 2012.
JS
Senior Security Consultant at a tech services company with 51-200 employees
Real User
2020-11-02T05:52:00Z
Nov 2, 2020

My customers buy Stealthwatch for traffic analysis.

JH
Chief Consultant at a tech services company with 11-50 employees
Consultant
2019-09-23T06:34:00Z
Sep 23, 2019

We are a system integrator and I have implemented this solution for one of our customers. This solution is normally used for anomaly detection and malware detection. It is deployed on-premises.

SL
Network Administrator at a retailer with 1,001-5,000 employees
Real User
2019-07-02T06:57:00Z
Jul 2, 2019

Our primary use case is for it to run our call center 24/7 365 days a year.

SD
Network Manager at a healthcare company with 1,001-5,000 employees
Real User
2019-07-02T06:57:00Z
Jul 2, 2019

Our primary use case of this solution is for troubleshooting network issues.

Rafael-Garcia - PeerSpot reviewer
Infosec Manager at a energy/utilities company with 1,001-5,000 employees
Real User
2019-06-17T08:46:00Z
Jun 17, 2019

Our main reason for using Stealthwatch is it gives us visibility.

RH
Sr. Network Engineer at Science Applications International Corporation
Real User
2019-06-17T08:46:00Z
Jun 17, 2019

Our primary use case for Cisco Stealthwatch is to ensure net flow.

EF
Network Manager at a financial services firm with 1,001-5,000 employees
Real User
2019-06-17T08:46:00Z
Jun 17, 2019

Our primary use is to monitor our network, especially our remote branches.

Rob Hartstone - PeerSpot reviewer
Network Operations Manager at Philips Electronics
Real User
2019-06-17T08:46:00Z
Jun 17, 2019

Our primary use of Stealthwatch is for a secure remediation of systems that are causing problems on our internal network.

JW
Network Administrator at a mining and metals company with 1,001-5,000 employees
Real User
2019-06-17T08:46:00Z
Jun 17, 2019

Our primary use case for this solution is to monitor east, west, north, and south traffic so that we can see what's going on in the network internally. You don't get that granularity with anything else. We have an ASA that gets north and south traffic. So we're just really interested in this one by itself.

JC
Lead Network Engineer at a retailer with 1,001-5,000 employees
Real User
2019-06-17T08:46:00Z
Jun 17, 2019

The security team uses it more than we do. I don't work on it that much. We have a couple uses for Stealthwatch: gathering security data and sending logs. I believe there is a gatherer that we have that has all of our logs sitting there. That's basically all we use them for.

RF
Senior Network Engineer at a comms service provider
Real User
2019-06-17T08:46:00Z
Jun 17, 2019

Our primary use case for this solution is to work on it so that we can learn enough about it to sell it to our customers.

AA
Director Network Services at a consultancy with 1,001-5,000 employees
Real User
2019-06-17T08:46:00Z
Jun 17, 2019

Our primary use for this solution is to help protect against threats on our network.

Ken Poteate - PeerSpot reviewer
Security Analysist at Amwins Group
Real User
2019-06-17T08:46:00Z
Jun 17, 2019

We really just use the product for behavior analytics of our employees. When we have issues or when there is some type of an investigation from a security perspective, we pull up Stealthwatch and start trying to see what that user was doing. If there are any anomalies in their activities we have to take action to correct it. We don't need to monitor every device. The reports show everything that person's doing and what device they're running, et cetera, and we really only need specific things. That was one of our problems in the initial deployment. We tried to overcome that by redeploying. I'm not sure exactly sure that it helped a lot. We're getting more data, but I'm not really sure it gives us a true picture.

Finn Kristensen - PeerSpot reviewer
Architect at Atea A/S
Real User
2019-06-17T08:46:00Z
Jun 17, 2019

We provide this solution to our customers to give them visibility into their network.

AR
Technical Consultant at a tech services company with 501-1,000 employees
Consultant
2019-06-17T08:46:00Z
Jun 17, 2019

We use this solution primarily for the TLS audit in our on-premise environment, and to assist our customers.

UN
Director of Operations at a manufacturing company with 1,001-5,000 employees
Real User
2019-06-17T08:46:00Z
Jun 17, 2019

Our primary uses for this solution are threat management and traffic management.

MG
Network Operations Manager at Symantec Corporation
Real User
2019-06-17T08:46:00Z
Jun 17, 2019

Our primary use for this solution is to provide operational metrics. In terms of the analytics and threat detection capabilities, it basically cures our day-to-day for everything that we do. It helps us out tremendously.

BS
Director of Networking and Telecom at a healthcare company with 1,001-5,000 employees
Real User
2019-06-17T08:46:00Z
Jun 17, 2019

We use the solution primarily for IDS/IPS.

Douglas Bentley - PeerSpot reviewer
Assistant Director of IT at University of Rochester Medical Center
Real User
2019-06-17T08:46:00Z
Jun 17, 2019

We use this solution for NetFlow statistics.

AM
Associate Director Network Services at a pharma/biotech company with 10,001+ employees
Real User
2019-06-17T08:45:00Z
Jun 17, 2019

We use Stealthwatch to identify any risk or vulnerabilities in the environment.

WR
Network Engineer at a government with 1,001-5,000 employees
Real User
2019-06-17T08:45:00Z
Jun 17, 2019

We use Cisco Stealthwatch as our primary NetFlow collector. We use it for data analysis and for any issues that arise that require NetFlow data.

BG
Manager of Digital Communications at Memorial Hermann Healthcare System
Real User
2019-06-17T08:45:00Z
Jun 17, 2019

We use Cisco Stealthwatch for security and network analytics. The solution saves you time, money, and administrative work. If we have the device support, it means that I don't have to send someone in a car to go to be local on the site and look at whatever the issue is.

SG
Engineer at Charter Communications, Inc.
Real User
2019-06-17T08:45:00Z
Jun 17, 2019

We mainly use this solution for diagnostic information.

TB
Senior Director of Architecture and Engineering at Trace3
Real User
2019-06-17T08:45:00Z
Jun 17, 2019

We use Stealthwatch primarily to secure customers' endpoint devices, in order to provide more visibility into their security vectors. We determine where they are getting attacked, if they are getting attacked, how to prevent it, how to fight it, etc. We are really trying to take the fight to the administrator and be a little more proactive, as opposed to being so reactive with security events.

DK
Network Engineer at UC San Diego Health System
Real User
2019-06-17T08:45:00Z
Jun 17, 2019

For our organization, Cisco Stealthwatch is more of a confirmation of what is happening on our network, or compliance. And in addition to that, it helps us to troubleshoot issues. We get to see where traffic is flowing and it helps us figure out problems.

JC
Service Engineer at Microsoft
Real User
2019-06-17T08:45:00Z
Jun 17, 2019

We mainly use Cisco Stealthwatch in our organization for bandwidth monitoring and other issues we experience on our networks. When someone reports an issue, this solution helps us to determine what's going on in the network by checking the cell blocks and see if there are any issues.

Robert Ufer - PeerSpot reviewer
Network Architect at Henry Ford health system
Real User
2019-06-17T08:45:00Z
Jun 17, 2019

We use Cisco Stealthwatch for device compliance and device auditing. It's part of our overall strategy. We have been consolidating down. Our security team is over-packed. We're trying to leverage what we have and move the blame away from us on the network side.

LW
Network Engineer at a tech services company
Real User
2019-06-17T08:45:00Z
Jun 17, 2019

The primary use case for Cisco Stealthwatch is for us to sell it.

SA
Network Section Chief at a government with 1,001-5,000 employees
Real User
2019-06-17T08:45:00Z
Jun 17, 2019

We use Cisco Stealthwatch to do NetFlow across our enterprise network. Cisco Stealthwatch helps our cybersecurity guys detect threats across the network.

CK
Manager, Network Engineering & Telecommunications at a healthcare company with 1,001-5,000 employees
Real User
2019-06-17T08:45:00Z
Jun 17, 2019

We use Cisco Stealthwatch mostly for network visibility and security. I believe the solution reduces false-positives by flagging it as potential threats.

JQ
Network Manager Administrator at a financial services firm with 501-1,000 employees
Real User
2019-06-17T08:45:00Z
Jun 17, 2019

Stealthwatch is primarily a network monitoring tool.

SJ
IT Network Engineer at a logistics company with 10,001+ employees
Real User
2019-06-17T08:45:00Z
Jun 17, 2019

Our primary use for Stealthwatch is to provide insights into what traffic is flowing through the network for our security operations center. With that, they can go and enforce security.

JS
Network Engineer at Oracle Corporation
Real User
2019-06-17T08:45:00Z
Jun 17, 2019

This is a security solution for us and our customers. We use it for port monitoring aggregation and doing captures.

JM
Sr Network Engineer at a insurance company with 5,001-10,000 employees
Real User
2019-06-17T08:45:00Z
Jun 17, 2019

Our primary use case for Stealthwatch is endpoint security.

AM
Senior Consultant at a manufacturing company with 10,001+ employees
Real User
2019-06-17T08:45:00Z
Jun 17, 2019

Our primary use case for this solution is security.

JS
Manager at Indiana University Health
Real User
2019-06-17T08:45:00Z
Jun 17, 2019

We use Stealthwatch mainly for security.

Related Questions
CW
Founder & CEO with 51-200 employees
Feb 11, 2020
I'm building a next-gen AI powered threat intelligence platform and am wondering what features are missing from existing products on the market and how much customers are paying for their security tools. I'm also conducting research on pricing models. What is the preferred method of payment, i.e. based on number of endpoints, storage used, user-based, flat fee subscription based? Thank you ...
2 out of 9 answers
DJ
CEO & Founder at a tech services company with 1-10 employees
Aug 26, 2019
Raffael Marty, Vice President, Forcepoint Research and Intelligence, said: "There is no artificial intelligence in the field of information security, and it is unlikely to be developed in 2019." Most of unsupervised machine learning-based network anomaly detection solution does not provide why the anomaly has been aroused and whether the anomaly is malicious or not. Most of such solution's pricing model is based on number of endpoints but I prefer to have flat fee subscription-based.
ImadTaha - PeerSpot reviewer
Group CIO with 10,001+ employees
Aug 26, 2019
I that feel there are two old problems still there in the market: 1-Vendors don't talk to each other. 2-Whoever is focusing on endpoint is missing the network and human side and the opposite is also true. I love, for example, what Darktrace is doing in the network side and the playback option to know what happened in my network during a long holiday, for example, things will never be caught by a second-generation AV but I need to have a solid 2nd gen. AV besides the total high cost of Darktrace which by the way is worth it for IT pros but not for business owners. We need to have something like virus total but for risks and threats beyond viruses where all vendors work on this and all endpoint customers with different vendors connect to it to be secured.
it_user434868 - PeerSpot reviewer
Senior Director of Delivery at a tech services company with 51-200 employees
May 26, 2022
Hi Everyone, What do you like most about Cisco Stealthwatch? Thanks for sharing your thoughts with the community!
2 out of 43 answers
SA
Network Section Chief at a government with 1,001-5,000 employees
Jun 17, 2019
Cisco Stealthwatch has reduced the amount of time to detect an immediate threat.
WR
Network Engineer at a government with 1,001-5,000 employees
Jun 17, 2019
The search options on Cisco Stealthwatch are the most valuable. You can get very granular with it, down to the kilobits or the seconds if you want. The product supports any time frame that you need, so that is nice.
Related Articles
Davina Becker - PeerSpot reviewer
Content Editor at PeerSpot
Sep 8, 2022
Network Traffic Analysis (NTA) monitors network availability and activity. It can identify anomalies, including security and operational issues. It uses network communications to detect and investigate security threats as well as malicious or anomalous behaviors within the network. It uses a combination of behavioral modeling, machine learning, and rule-based detection. This helps to create a...
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Apr 6, 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why. You can read user reviews for the Top 8 Network Detection and Response (ND...
Related Articles
Davina Becker - PeerSpot reviewer
Content Editor at PeerSpot
Sep 8, 2022
5 Challenges that Can be Solved with Network Traffic Analysis (NTA)
Network Traffic Analysis (NTA) monitors network availability and activity. It can identify anom...
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Apr 6, 2022
Top 8 Network Detection and Response (NDR) Tools for 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to...
Download Free Report
Download our free Cisco Secure Network Analytics Report and get advice and tips from experienced pros sharing their opinions. Updated: December 2022.
DOWNLOAD NOW
656,474 professionals have used our research since 2012.