McKee Foods

McKee solved several operational challenges with Stealthwatch, including improving network performance, enhancing its network security posture, increasing efficiency in the identification of security threats, increased correlation of user identity and activity and increasing flow collection, monitoring and analysis.

Challenges

Solved the following operational challenges with Stealthwatch:

  • Improved in network performance
  • Enhanced network security posture
  • Increased efficiency in the identification of security threats
  • Increased correlation of user identity and activity
  • Increased flow collection, monitoring and analysis

Use Case

Primarily uses Stealthwatch in the following ways:

  • Network forensics
  • Security forensics
  • Application performance monitoring
  • Network performance monitoring

Used Stealthwatch to detect or prevent the following security threats:

  • Advanced persistent threats
  • Network malware or virus
  • Suspicious user behavior
  • External hacking attempt
  • Data loss/ exfiltration
  • Command and control traffic/ botnets
  • Network reconnaissance

Is doing the following with Stealthwatch deployment:

  • Monitoring a centralized network with a large number of satellite or retail locations
  • Monitoring traffic within a virtual environment
  • Monitoring traffic within a data center, physical and virtual

Results

Chose Stealthwatch for the following capabilities:

  • Behavior-based security monitoring
  • Real-time flow monitoring capabilities
  • Internal visibility
  • Forensics
  • Scalability

Selected Stealthwatch over the following vendors:

  • NetScout
  • In-house monitoring solution
  • Open source solution

Meets enterprise requirements by utilizing the following Stealthwatch benefits:

  • Scalability and flexibility
  • Improved incident response and threat management
  • Enterprise-wide visibility into network activity
  • Deployment and support simplicity
  • Enterprise-wide user monitoring
  • Forensic analysis

Reduced the time it took to mitigate a security incident by 50 percent to 74 percent by deploying Stealthwatch.

Rated the following Stealthwatch capabilities as compared to competing vendors:

  • Network Security: Much Better
  • Performance Monitoring: Much Better
  • Scalability: Much Better
  • Network Visibility: Much Better
  • Innovation: Better

We have used [Stealthwatch] to consolidate several tools including replacing our IDS system and reducing costs and time to locate network problems. It provides much greater visibility across our network of anomalies and problems than we have ever had.

Greg Sutherland, Sr. IT Manager