Customer Testimonials

What Customers Are Saying about Lancope's StealthWatch

With several hundred customers worldwide, Lancope’s award-winning StealthWatch System delivers end-to-end visibility across physical and virtual networks to eliminate network blind spots and reduce total network and security management costs.

Learn how our customers are benefiting from StealthWatch — the leader in flow-based security, network and application performance monitoring.

Read full customer case studies here.

StealthWatch Customers Testimonials

Reveals Network Activity with Intuitive GUI

“StealthWatch vigilantly watches our network traffic and alerts us to anything unwanted or unexpected so that we can take action quickly. With our network organized into different zones and sub-zones, StealthWatch’s intuitive GUI makes it easy to spot exactly where and when something is happening on the network in real-time.”

AKH Vienna Hospital

Cost-Effectively Leverage Network Infrastructure

"With its behavior-based approach, StealthWatch can cost-effectively scale by leveraging our current network infrastructure and analyzing NetFlow from our Cisco routers and Enterasys switches. StealthWatch impressed us with its ability to provide visibility of the internal network from the core to the edges, enabling us to quickly remediate any issues. [StealthWatch] streamlines the remediation process and reduces incident investigation by more than half...StealthWatch took advantage of Aurora’s already existing router and traffic infrastructure, making it a wise investment.”

Aurora Health Care

Limitless Network Analysis Capabilities

“Before StealthWatch, we manually analyzed and correlated our network activity data. StealthWatch automatically gives us detailed network insight through a single, easy-to-use interface, aiding our security, network operations and compliance efforts. Like a Swiss Army knife, StealthWatch seems to offer limitless capabilities to dissect and analyze network behavior data. We can put this information to many different uses across our security, network and government business operations groups.”

BlueCross BlueShield of Tennessee

Quickly Mitigates Attacks

“StealthWatch can look at NetFlow and monitor the entire network. [It] has already had an immediate and positive impact on our network. StealthWatch excels at providing a wealth of useful, actionable information about what is happening on the network. Cancer Research UK uses StealthWatch to quickly identify threats and affected hosts and servers, mitigate attacks and perform forensic analysis in order to maintain high network availability.”

Cancer Research UK

Benefits Entire Enterprise

“The benefits of StealthWatch are felt enterprise-wide, as it helps keep our network secure and our staff productive. The network team greatly benefits from StealthWatch’s time-saving capabilities for network and forensic analysis; the security team is more confident that network-related incidents can be detected and quickly corrected; and management can be kept better informed."

Children’s Hospital and Health System

Saves Time By Detecting Anomalous Activity

“StealthWatch has saved us a great deal of time, especially with extremely complex troubleshooting. In addition, we are using StealthWatch to gain application awareness, which enables us to quickly identify and respond to unauthorized application usage.”

Concord Hospital

Alerts Appropriate Resource About Issue

“Before StealthWatch, our IT team was frustrated by lengthy problem resolution, a lack of audit trails and the inability to monitor user activity for HIPAA compliance. Identifying and solving network problems quickly is critical to our patient care. Moreover, StealthWatch has also benefited PSBC in other ways — from increased user accountability to improved cross-team collaboration between helpdesk, network services and developers. We even use StealthWatch to train new IT employees. Our team relies on StealthWatch to quickly identify a problem, distinguish between network and application cause and notify the right resource for expedient resolution. And because StealthWatch provides historical context of IP activity, we have the audit trails needed to definitively resolve even the most sporadic network issues.”

Puget Sound Blood Center

Provides Network and Security Insight

“On a daily basis, [StealthWatch] identified infected hosts in real time, enabling our security and network teams to mitigate risks and prevent further propagation. Unlike traditional security products, [StealthWatch] uncovered hidden traffic patterns and gave us valuable insight from a networking perspective that we use to continuously improve our security and network posture.”

Stanford University School of Medicine

Detect Bad Actors

"...I can immediately see who is misbehaving [on the network]. It is a great documented source for our incident reports."

TVID: 793-EEB-356


Stanford University School of Medicine

Prevents Potential Network Issues

“We knew that the volume of new attacks and the vectors used were only going to increase, so we chose to stay ahead of the curve with a behavioral analysis system. I believe behavior and anomaly-based solutions will be most effective long term. StealthWatch was the only solution we tested that does not rely on canned signature-matching techniques to identify risky network traffic... StealthWatch is now the single point of reference when we’re trying to resolve security challenges or observe new trends that may cause performance issues later on. We can tailor the system reporting to include as much or as little data as we choose. Furthermore, StealthWatch is an integral part of the network access control.”

Binghamton University

Distinguishes Trivial Network Incidents from Serious Events

“With limited staff responsible for monitoring, securing and optimizing such a large network, StealthWatch provides us with much needed visibility to do our jobs faster and more effectively. StealthWatch gives us better visibility of internal traffic and its file-sharing index accurately identifies machines running P2P applications. We also love StealthWatch’s scalability and its Concern Index feature, which quickly distinguishes risky from trivial network incidents and elevates serious security events.”

Details Individual User Traffic

“StealthWatch helps us make more informed decisions when presented with network anomalies. If a user complains of slow network connectivity, we can quickly research the issue with StealthWatch to see what kind of traffic a user’s machine is generating. Based on the amount of traffic and traffic type, we can make an informed decision about how to resolve the problem.”


Central Michigan University

Easily Audit Secure Zones

"[StealthWatch] allows us to gain internal network visibility… and easily audit our secure zones to ensure certain types of traffic are not leaving those networks."

TVID: 83A-000-B5F

Great Mapping Feature Allows Focus on Communication

“[The StealthWatch Solution is] very intuitive and easy to use, it allows us see our internal traffic and easily identify hosts that are communicating to places they shouldn’t. The mapping feature is great because it allows you to really focus on communication between specific host groups.”

TVID: 9B8-47C-755


Central Michigan University

StealthWatch drill down abilities

“[StealthWatch] has the ability to drill down into information from a single console.”

TVID: 02B-E47-FA1


Council Rock School District

Immediately Detects and Prevents Network Threats

“Immediately upon deployment, StealthWatch uncovered 400 misbehaving hosts and helped reduce network threats by 90 percent. Email worms, which used to propagate quickly, are now immediately stopped with StealthWatch. New attacks, for which no signatures exist, now fail to gain a foothold unlike before.”

Automatically Monitors Traffic and Behavior

“By automating the monitoring of traffic and alerting of suspicious behavior, StealthWatch does everything we were doing manually and 90 percent more…[StealthWatch has] caught many attacks for which no signatures are and never will be written.”


Dartmouth College

Generates Valuable Network Performance Reports

“By leveraging sFlow data from our Foundry routers and switches, StealthWatch offers tremendous visibility into the network core, generates valuable network performance reports and performs automated actions on network devices.”

Automatically Detect Worms with Worm Tracker

“What I like best about StealthWatch is the visibility into network traffic that it provides and the ability to perform automated actions if the traffic meets certain criteria. The Worm Tracker feature demonstrates StealthWatch’s ability to detect a worm even without knowing its signatures.”


Grafisch Lyceum

Drill down into actual flows

“[StealthWatch Solution provides us with] the powerful combination of security with performance visibility, [also allowing] the ability to drill down into the actual flow(s) related to an incident.”

TVID: F7B-7FE-405


Grafisch Lyceum

Blocks External Traffic from Network

“StealthWatch is an incredibly useful tool for blocking external reconnaissance traffic and locating compromised systems throughout our campus.”

Illinois State University

Eases Network and Security Manager Tasks

“StealthWatch has increased our visibility of internal network traffic ten-fold from 90MB per minute to 900MB per minute. StealthWatch helps our network and security managers view traffic patterns without having to deploy costly sniffers or LAN probes on every segment, and provides a rich source of data for security-related tasks.”

Naval Postgraduate School

Easily Managed Within Short-Time Span

“Northern Illinois needed a secure appliance that could alert to most kinds of malicious traffic and that required no more than 30 minutes per day to manage. After tuning, StealthWatch required only 15 minutes a day to manage and did not demand signature-updates.”

Northern Illinois University

Provides Network and Security Insight

“On a daily basis, [StealthWatch] identified infected hosts in real time, enabling our security and network teams to mitigate risks and prevent further propagation. Unlike traditional security products, [StealthWatch] uncovered hidden traffic patterns and gave us valuable insight from a networking perspective that we use to continuously improve our security and network posture.”

Stanford University School of Medicine

Detect Bad Actors

"...I can immediately see who is misbehaving [on the network]. It is a great documented source for our incident reports."

TVID: 793-EEB-356


Stanford University School of Medicine

Increased Network Visibility

“StealthWatch has dramatically increased our network visibility. We’ve gone from analyzing 10 percent of network connections to 95 percent or higher. Tasks, which we used to avoid because of the effort required, are now performed quickly and efficiently using StealthWatch. A NetFlow analysis tool of some sort is a ‘must have’ for any network and security operations team, and StealthWatch is the product to consider if you demand the best technology available. Like using a mobile phone, once you’ve seen StealthWatch in action, you’ll wonder how you possibly lived without it.”

University of Adelaide

Improves Customer Service

"We have a large, complex network with a lot of unmanaged desktop machines. We knew viruses, bots and Trojans were hitting the network and that a significant amount of illegal file sharing was occurring, but we had no tools to detect unwanted or anomalous behavior. Nor did we have any tools that could analyze the type of traffic on our network. Now we simply access the StealthWatch Management Console for a consolidated view of network traffic and behavior. StealthWatch will improve our customer service and keep us more proactive when it comes to addressing network behavior and security incidents."

University of Manchester

Visibility - Functionality - Customer Support

“Stealthwatch provides an holistic view of our network rather than a specific link or part of the network. The rich functionality together with the superb customer support gives us an excellent tool for combating security issues on the network.”

TVID: B7D-0B6-335


University of Manchester

Supports Large Enteprises

“UNC-Chapel Hill is a unique research and learning environment that enthusiastically supports innovative technologies. We use StealthWatch’s ability to accommodate large volumes of data to understand network traffic at a higher level. The increased visibility contributes to the identification of infected machines and enables us to proactively plan for new applications and needs.”

University of North Carolina-Chapel Hill

Proactively Manages Network Thereby Increases Bandwidth

"The StealthWatch System proactively manages the utilization of our network, identifying and removing sources of inappropriate traffic. As a result, more bandwidth is available for productive use by the organizations connected to EMMAN. As StealthWatch alerts us in real-time to areas of high concern, the reliability and availability of our network is also enhanced."

University of Nottingham

Provides Amazing Network Insight

“Network visibility is paramount for us and StealthWatch has greatly increased our network insight, especially with regard to internal traffic. The sheer amount of information StealthWatch provides is quite amazing and we are able to view our network in ways we never thought possible. The solution is helping us to proactively maintain a healthy, reliable network.”

University of Westminster

Enhances Visibility of Network and Security Environments

“StealthWatch has been tremendously effective in providing unique visibility for enhanced understanding of our network and security posture. StealthWatch played a key role in the detection of several devices that were infected with the Blaster Virus. Through its powerful correlation ability, StealthWatch worked directly with our firewalls and IDS to alert our information security and networks team about these misbehaving devices."

Complements Existing Infrastructure

“We needed a next-generation solution, like StealthWatch, to complement and enhance our existing network infrastructure and ensure information security, which Chick-fil-A defines as the confidentiality, integrity and availability of information and resources.”


Chick-fil-A

Runs Smoothly and Quickly

"We needed a robust system to monitor and protect our network investment and Lancope has come to our aid in a pinch, getting StealthWatch up and running quickly. We are able to watch more baseball than monitors because of [StealthWatch]. Having [StealthWatch] in place and having everything run smoothly, it was great for us to have time and go out and watch these playoff games."

Detroit Tigers

Reduces Mean Time to Resolution

“With StealthWatch in place, we’ve been able to reduce the time required for problem resolution from four or five hours down to just one hour. StealthWatch has brought us several compliance-related benefits as well. We use the advanced user identity tracking to monitor which users are dialing into particular servers and which users are making large data transfers. StealthWatch also enables us to identify, track and report on end users responsible for suspicious activity, including the files they accessed and when they gained access.”

Brocade Networks

Captures Full Power of NetFlow

“NetFlow is an extremely useful and underused tool for maintaining and troubleshooting enterprise networks. Lancope captures the full power of NetFlow without requiring extensive time or resources from IT teams. In-depth flow data, application analysis and an easy-to-understand, graphical user interface make StealthWatch 6.0 a versatile tool for monitoring and responding to a wide variety of incidents.”

Amazing Summarized Views

“We also like some of the cool summarized views that Lancope provides. For example, we have all of our high-risk networks showing up in a 24hr graph, no-one in one of these networks is allowed to send data directly out to the internet; Lancope gives a great visual of that.”


Cisco Systems

Minimizes Complexity Through Easy Deployment

"The StealthWatch FlowSensor VE provides enterprise visibility to help improve security and performance in the virtual environment, while preserving IT cost savings and minimizing complexity through ease of deployment as a VMware virtual appliance."

VMware

HIgh Quality IPV6 Solution

"StealthWatch is one of the first high quality IPV6 solutions for monitoring and visualizing network traffic. With its ability to analyze both NetFlow and sFlow data, StealthWatch quickly shows us the 'who, what, when and where' of network traffic.

Telecommunications Software & Systems Group (TSSG)

Scalable Security Monitoring and Incident Response

"Telenor Norway’s data center network sustains more than a million packets per second in traffic. Conventional monitoring solutions cannot scale to inspect all that traffic, much less provide the ability to do after the fact investigations. Telenor Norway relies on flow collection and analysis from Lancope’s StealthWatch to deliver cost-effective network visibility, security monitoring and incident handling. StealthWatch enables security and incident response teams to remediate incidents faster than before, reducing downtime and the overall costs of managing networks and network services. Flow telemetry is central to Telenor’s security strategy; it is an essential requirement that the network is designed to deliver flow data to StealthWatch, by using network equipment that supports netflow."

Identifies Issues Effortlessly

“StealthWatch enables us to proactively identify issues in our data centers that would otherwise have required tremendous effort to uncover. It indicates which services are being attacked, then we evaluate whether these services require patching, re-configuration or other actions. During services outages, StealthWatch helps determine the root cause of the problem and whether it is a security incident or not. We are very pleased with its rich functionality compared with other products we reviewed, including robust security features, IP-to-country mapping, ad hoc graphing of service traffic, VMware support, extensive documentation and the intuitive Graphical User Interface.”


Telenor Norway

Proactive Security

"[StealthWatch is a] great way to see threats proactively."

TVID: 859-6F6-9AE


ViaSat, Inc.

Comprehensive View of Network Traffic

“Of all the solutions we evaluated, StealthWatch provided the most comprehensive view of our network traffic, along with the most flexible alerting and mitigation options. With its efficient, accessible reporting on all our network traffic, StealthWatch helps us tune our entire network for better performance and enhanced security.”

Eases Network Troubleshooting

“The raw flow visualization that StealthWatch provides is extremely useful for identifying patterns in our network traffic.  The easy access to raw traffic flows that StealthWatch provides makes general network troubleshooting much easier than I expected.”


WildBlue Communications

Understandable Analysis Reports

"StealthWatch performed extremely well during the evaluation. Its non-intrusive approach to monitoring does not impact network performance, and StealthWatch has excellent reporting and alerting capabilities. The depth of analysis and information available from StealthWatch is astounding. The reports it produces—either scheduled or on-demand—are excellent and easy to understand. Its ease of configuration and self-tuning reduces ongoing maintenance efforts. And its accuracy and integration within our existing environment provide ongoing security assurance for our network."

ElectraNet

Helps View All Traffic Across Network and Security Devices

“The breadth of information StealthWatch affords—in conjunction with both definable and built-in heuristics—helps us view all traffic flowing across our networks and security devices. With StealthWatch, we can identify security threats, capture statistics and data streams for capacity planning, enforce usage policies, and solve performance problems much faster. It also enables our staff to respond to network threats and outages quickly and intelligently, reducing business impact.”

Determines Security and Effectiveness of SCADA Changes

“There are considerable security risks associated with even the smallest changes to the system. StealthWatch proved its value immediately by helping us determine the security and effectiveness of our SCADA changes in real time. StealthWatch provides measurable results in days.”


Henry County Water & Sewerage Authority (HCWSA)

Complete Network Visibility for Global Enterprises

“Lancope’s solution has provided us with better visibility into network activity across our global enterprise. The near real-time data reporting and alerting capabilities enable our team to detect and respond quicker to security incidents as they occur.”

TVID: 436-FAD-940


Westinghouse Electric

Accommodates Multiple Departments Achieve Routine Tasks

“During testing, StealthWatch demonstrated the ability to detect unauthorized remote access, worm activity and root cause analysis of increases in WAN activity. All of these functions have aided our efforts to demonstrate compliance with the PCI Data Security Standard. I use StealthWatch to identify anomalous behavior and inappropriate activity; Customer Support uses it to research details in order to resolve user issues or complaints; and, the network group uses StealthWatch in conjunction with other tools to monitor WAN activity and performance.”

Seamlessly Monitors Network

“The StealthWatch Management Console is incredible. I love the way that you can just slice and dice information and right click and get different flow reports from endpoint to endpoint. The analytical capabilities are awesome. With just a few clicks, I can see exactly who is saturating an interface on the WAN, and what they are doing. I can drill down very quickly to see which systems a particular login ID is currently logged into and where it was used during a certain period of time.”


AirTran Airways

Lancope makes good on its ROI

“We purchased Lancope due to a sense of urgency brought about by the results of an external penetration test. Our organization is relatively small, and the IT focus had been on everything but security for a while. Lancope immediately made clear its ROI due to the overwhelming visibility it provided to events that would likely had never been noticed had we not integrated Stealthwatch into our environment. It is hard to pick a favorite aspect at this juncture besides the Stealthwatch solution as a whole.”

TVID: D98-CBB-A1C


Alpha Natural Resources

Reduces Mean Time to Resolution

“With StealthWatch in place, we’ve been able to reduce the time required for problem resolution from four or five hours down to just one hour. StealthWatch has brought us several compliance-related benefits as well. We use the advanced user identity tracking to monitor which users are dialing into particular servers and which users are making large data transfers. StealthWatch also enables us to identify, track and report on end users responsible for suspicious activity, including the files they accessed and when they gained access.”

Brocade Networks

Enhances Visibility of Network and Security Environments

“StealthWatch has been tremendously effective in providing unique visibility for enhanced understanding of our network and security posture. StealthWatch played a key role in the detection of several devices that were infected with the Blaster Virus. Through its powerful correlation ability, StealthWatch worked directly with our firewalls and IDS to alert our information security and networks team about these misbehaving devices."

Complements Existing Infrastructure

“We needed a next-generation solution, like StealthWatch, to complement and enhance our existing network infrastructure and ensure information security, which Chick-fil-A defines as the confidentiality, integrity and availability of information and resources.”


Chick-fil-A

Captures Full Power of NetFlow

“NetFlow is an extremely useful and underused tool for maintaining and troubleshooting enterprise networks. Lancope captures the full power of NetFlow without requiring extensive time or resources from IT teams. In-depth flow data, application analysis and an easy-to-understand, graphical user interface make StealthWatch 6.0 a versatile tool for monitoring and responding to a wide variety of incidents.”

Amazing Summarized Views

“We also like some of the cool summarized views that Lancope provides. For example, we have all of our high-risk networks showing up in a 24hr graph, no-one in one of these networks is allowed to send data directly out to the internet; Lancope gives a great visual of that.”


Cisco Systems

Continuously Updates Personnel About Network

"Upon implementation, StealthWatch immediately alerted us to port-scanning activities on our network and identified several infected machines that had entered through VPN access. StealthWatch allows us to know what is continuously happening on the network. Similar to a mechanic who needs the right tools to fix a car, we use StealthWatch to fix our network."

Provides Network Intelligence and Insight

“StealthWatch provides critical Network Intelligence to give us awareness and control of what is happening on the network. By gaining the power of knowledge through network insight, StealthWatch allows us to breathe easier about the health of our network.”


Colonial Properties

Runs Smoothly and Quickly

"We needed a robust system to monitor and protect our network investment and Lancope has come to our aid in a pinch, getting StealthWatch up and running quickly. We are able to watch more baseball than monitors because of [StealthWatch]. Having [StealthWatch] in place and having everything run smoothly, it was great for us to have time and go out and watch these playoff games."

Detroit Tigers

Remediate Problems within Seconds

"StealthWatch reduces problem-solving from days to seconds"

“With StealthWatch, we can stay ahead of potential attacks and breaches”


Edge Web Hosting

Understandable Analysis Reports

"StealthWatch performed extremely well during the evaluation. Its non-intrusive approach to monitoring does not impact network performance, and StealthWatch has excellent reporting and alerting capabilities. The depth of analysis and information available from StealthWatch is astounding. The reports it produces—either scheduled or on-demand—are excellent and easy to understand. Its ease of configuration and self-tuning reduces ongoing maintenance efforts. And its accuracy and integration within our existing environment provide ongoing security assurance for our network."

ElectraNet

StealthWatch System provides insight

“Lancope’s StealthWatch System is a product that provides so much insight into what is really happening within your network, and gives the best blend of advance notice of problems combined with historic reporting using standard flow data. Couple this with outstanding support, sales, marketing, and active collaboration with customers and it’s a winning solution.”

TVID: E99-122-5BB


Experian

Increases Team Productivity

“Unless you know what is happening on your network—the actual host conversations and the details about them—you cannot even begin to serve your users. StealthWatch not only provides basic details about the ‘who, what, when and where’ of network traffic, but it also enables us to focus on the all-important ‘why’ behind many network problems. Our team’s productivity has increased significantly because we now have time to focus on other projects instead of spending hours manually diagnosing network-related traffic problems.”

Isolates Abnormalities

“StealthWatch gives us much needed insight into the behavior of our network without the need to sift through countless logs of data. Now we can quickly determine why our network is slow. Even when the network seems to be running well, we know that StealthWatch will isolate any abnormal issues—like worms or a host infected by a bot—and notify us immediately.”


Gilbraltar Industries

Quickly Identify Threats

"StealthWatch helps bring the needle out of the haystack."

TVID: C10-49A-9C7


Global 500 Media & Entertainment Company

Helps View All Traffic Across Network and Security Devices

“The breadth of information StealthWatch affords—in conjunction with both definable and built-in heuristics—helps us view all traffic flowing across our networks and security devices. With StealthWatch, we can identify security threats, capture statistics and data streams for capacity planning, enforce usage policies, and solve performance problems much faster. It also enables our staff to respond to network threats and outages quickly and intelligently, reducing business impact.”

Determines Security and Effectiveness of SCADA Changes

“There are considerable security risks associated with even the smallest changes to the system. StealthWatch proved its value immediately by helping us determine the security and effectiveness of our SCADA changes in real time. StealthWatch provides measurable results in days.”


Henry County Water & Sewerage Authority (HCWSA)

Uses Behavior-Based Algorithms to Identify Network Threats

“StealthWatch enables our support team to make strategic decisions about network and security management based on a unified view of network, security and user information across the enterprise. Not only does it provide network performance monitoring to ensure our applications run optimally, StealthWatch also identifies internal and external threats through behavior-based algorithms.”

Oldcastle APG

Concern Index Correlates Alarms with Threat Levels

“StealthWatch offers the best capabilities for categorizing the threat level of network traffic. Its proprietary Concern Index correlates alarms with threat levels to indicate when malicious activity may be occurring. I found StealthWatch to be both intuitive and logical, as I easily navigated from a high-level view of security and traffic status indicators to the underlying insightful details. Upon installation, StealthWatch immediately identified minor system misconfigurations on the network, such as DNS and WINS settings as well as various unnecessary applications. It even highlighted some interesting traffic for further investigation. We were able to fix a number of network problems during the evaluation period.”

Rand McNally

Edge to Access Network Visibility

"[Lancope’s] anomaly-based protection has been very instrumental in identifying both internal and external security threats."
TVID: E27-DEE-231

United Auto Insurance Group

Minimizes Complexity Through Easy Deployment

"The StealthWatch FlowSensor VE provides enterprise visibility to help improve security and performance in the virtual environment, while preserving IT cost savings and minimizing complexity through ease of deployment as a VMware virtual appliance."

VMware

Complete Network Visibility for Global Enterprises

“Lancope’s solution has provided us with better visibility into network activity across our global enterprise. The near real-time data reporting and alerting capabilities enable our team to detect and respond quicker to security incidents as they occur.”

TVID: 436-FAD-940


Westinghouse Electric