Challenges

  • Solved the following operational challenges with Stealthwatch by Lancope:
    • Enhanced network security posture
    • Improved forensic analysis
    • Increased flow collection, monitoring and analysis

Use Case

  • Primarily uses Stealthwatch by Lancope in the following ways:
    • Incident response
    • Network forensics
    • Security forensics
  • Used Stealthwatch to detect or prevent the following security threats:
    • Network malware or virus
    • Suspicious user behavior
    • External hacking attempt
    • Compromised host
    • Network reconnaissance
  • Is doing the following with Stealthwatch by Lancope deployment:
    • Monitoring a centralized network with a large number of satellite or retail locations
    • Operating in a classified network with strictly controlled access to specific segments

Results

  • Chose Stealthwatch by Lancope for the following capabilities:
    • Behavior-based security monitoring
    • Real-time flow monitoring capabilities
    • Internal visibility
  • Selected Stealthwatch by Lancope over the following vendors:
    • Q1 Labs / IBM
    • Riverbed Cascade / Mazu Networks
    • Arbor Networks
    • In-house monitoring solution
    • Open source solution
  • Meets enterprise requirements by utilizing the following Stealthwatch by Lancope benefits:
    • Real-time threat detection and correlation with user identity data
    • Enterprise-wide visibility into network activity
    • Deployment and support simplicity
    • Forensic analysis
  • Rated the following Stealthwatch by Lancope capabilities as compared to competing vendors:
    • Network Security: Better
    • Performance Monitoring: Better
    • Scalability: Better
    • Network Visibility: Better
    • Innovation: Better

Testimonials

“[Lancope’s Stealthwatch] validates the fact that when a system is compromised/virused – we have the network information to back it up in the form of flows.”

Source:

Joe Zertuche, Security Officer, Stanford University