Cisco Secure Network Analytics Primary Use Case

JT
Development Manager at a healthcare company with 10,001+ employees

We're currently using it to figure out what is happening in our network. For example, to see whether there's any incorrect traffic in our network. We are also using it to monitor traffic coming from the internet into our network.

We have about 30,000 end users and about 60,000 end devices in the network. We are located in the capital area and have 30 hospitals and 200 other sites.

View full review »
DB
Assistant Director of IT at University of Rochester Medical Center

We use this solution for NetFlow statistics.

View full review »
Richard Payne - PeerSpot reviewer
Senior Cyber Scientist at a government with 10,001+ employees

We have a number of users that deployed both fixed hubs and satellite sites. Cisco Secure Network Analytics enables us to get full visibility and detect general threats on both types of sites. Regardless of whether a site is deployed overseas or back home, we want one single solution to be able to collect the telemetry, make a decision on it, and report it in a meaningful way. We also want the solution to be able to pipe it to tools that we can use to fight threats.

View full review »
Buyer's Guide
Cisco Secure Network Analytics
April 2024
Learn what your peers think about Cisco Secure Network Analytics. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.
Rainier S. - PeerSpot reviewer
Head of Integration Engineering / Enterprise Technology & Innovation at a healthcare company with 10,001+ employees
  • Monitoring
  • Security

It is a monitoring solution and network, because many times what we see is circuit oversaturation. Then, we want to know why and where it is coming from.

We were using Stealthwatch before the upgrade, since it came out. We have a good partnership with Cisco. We have NAS engineers. We have a quarterly meeting with Cisco. Generally, when they come out with a new solution, like when Stopwatch first came out, we jump on board. Therefore, we have been with it for awhile.

View full review »
RH
Network Operations Manager at Philips Electronics

Our primary use of Stealthwatch is for a secure remediation of systems that are causing problems on our internal network.

View full review »
JT
Former Employee of Orange Business Services as Head of Security Engineering at a comms service provider with 5,001-10,000 employees

We use the solution to improve the security of private hosting and network management systems. We can detect data exfiltration by analyzing statistics and identifying obsolete protocols and applications. It also helps us graph traffic metrics with valuable insights into routing and flows.

View full review »
Gerald Jimenez - PeerSpot reviewer
IT Operations Supervisor at Aboitiz Equity Ventures, Inc.

We use StealthWatch for telemetry on the cybersecurity side. It's also used for CCTV, IoT, and all the other stuff that isn't connected to the network. There is a cloud version of StealthWatch, but we use the on-prem solution.

View full review »
TB
Senior Director of Architecture and Engineering at Trace3

We use Stealthwatch primarily to secure customers' endpoint devices, in order to provide more visibility into their security vectors. We determine where they are getting attacked, if they are getting attacked, how to prevent it, how to fight it, etc. We are really trying to take the fight to the administrator and be a little more proactive, as opposed to being so reactive with security events.

View full review »
JS
Manager at Indiana University Health

We use Stealthwatch mainly for security.

View full review »
SK
Senior Operations Consultant at NNIT

We use Cisco Secure Network Analytics to collect network data, which we then send to our cybersecurity team for analysis. It is a basic use case that focuses on monitoring network traffic for potential security threats and providing our team with the information they need to detect and respond to issues.

View full review »
AA
Director Network Services at a consultancy with 1,001-5,000 employees

Our primary use for this solution is to help protect against threats on our network.

View full review »
BS
Director of Network and Telecom Services at a healthcare company with 10,001+ employees

We use the solution primarily for IDS/IPS.

View full review »
JD
Enterprise Information Security Architect at a agriculture with 5,001-10,000 employees

From a security perspective, we are watching for behind the scenes data exfiltration, or tubulous, or malicious network traffic, that our other tools may not be detecting at a basic network layer.

We are also using it for performance issues in trying to figure out if a site is experiencing issues with slowness. Also, we try to determine things like whether we are exceeding the bandwidth of the link or whether there is a bottleneck or something that's not negotiating correctly on the network.

Also, we use it for TAP to try and do inline network traffic analysis from a security perspective or from a performance perspective as well.

View full review »
AK
Sales director at Future Point Technologies

Using Cisco Secure Network Analytics has revolutionized our network security. The integration with SRTIntel provides unparalleled visibility, going beyond imagination. SNA, along with the SMA feature, offers detailed insights and call relations, enabling effective threat detection and response. The combination with endpoint protection gives us precise control over traffic, ensuring a robust defense against cyber threats.

View full review »
EF
Network Manager at a financial services firm with 1,001-5,000 employees

Our primary use is to monitor our network, especially our remote branches.

View full review »
ML
Airway Transportation Service Specialist at Federal Aviation Administration

Five engineers and I were testing this solution. We were looking for an NDR solution. We're cyber threat hunters, so we're looking to provide cyber hunting services for our clients. We're in the market for a network detection response solution so that we can monitor network traffic and analyze anomalies or anything that may be on the network that looks like normal traffic. We were using Stealthwatch to get a feel for it and to see whether or not it was going to be something that we would use in the future.

View full review »
SG
Engineer at Charter Communications, Inc.

We mainly use this solution for diagnostic information.

View full review »
AR
Technical Consultant at a tech services company with 501-1,000 employees

We use this solution primarily for the TLS audit in our on-premise environment, and to assist our customers.

View full review »
AM
Senior Consultant at a manufacturing company with 10,001+ employees

Our primary use case for this solution is security.

View full review »
RU
Network Architect at Henry Ford health system

We use Cisco Stealthwatch for device compliance and device auditing. It's part of our overall strategy. We have been consolidating down. Our security team is over-packed. We're trying to leverage what we have and move the blame away from us on the network side.

View full review »
SJ
IT Network Engineer at a logistics company with 10,001+ employees

Our primary use for Stealthwatch is to provide insights into what traffic is flowing through the network for our security operations center. With that, they can go and enforce security.

View full review »
ER
Forensic Analyst at a pharma/biotech company with 1,001-5,000 employees

We implemented Stealthwatch Cloud in order to provide our analysts with an additional tool for security monitoring.

View full review »
JC
Chief Technology Officer at a tech services company with 51-200 employees

Our primary use case of Stealthwatch is for flow analysis, to see what's running on the network and to check for anomalous behavior. Stealthwatch runs in the background and analyzes flows, producing summary reports based on the information it receives. You can look for anything that's out of place, for example, background checking on a file transfer where there's a query as to whether it's a legitimate transfer. It's quite a powerful tool that questions what's going on. We are integrators and I'm the chief technology officer. We're gold partners with Cisco. 

View full review »
UN
Director of Operations at a manufacturing company with 1,001-5,000 employees

Our primary uses for this solution are threat management and traffic management.

View full review »
FK
Architect at Atea A/S

We provide this solution to our customers to give them visibility into their network.

View full review »
MG
Network Operations Manager at a tech company with 10,001+ employees

Our primary use for this solution is to provide operational metrics. In terms of the analytics and threat detection capabilities, it basically cures our day-to-day for everything that we do. It helps us out tremendously.

View full review »
KP
Security Analysist at Amwins Group

We really just use the product for behavior analytics of our employees. When we have issues or when there is some type of an investigation from a security perspective, we pull up Stealthwatch and start trying to see what that user was doing. If there are any anomalies in their activities we have to take action to correct it.

We don't need to monitor every device. The reports show everything that person's doing and what device they're running, et cetera, and we really only need specific things.

That was one of our problems in the initial deployment. We tried to overcome that by redeploying. I'm not sure exactly sure that it helped a lot. We're getting more data, but I'm not really sure it gives us a true picture.

View full review »
JC
Lead Network Engineer at a retailer with 1,001-5,000 employees

The security team uses it more than we do. I don't work on it that much. We have a couple uses for Stealthwatch: gathering security data and sending logs. I believe there is a gatherer that we have that has all of our logs sitting there. That's basically all we use them for.

View full review »
WR
Network Engineer at a government with 1,001-5,000 employees

We use Cisco Stealthwatch as our primary NetFlow collector. We use it for data analysis and for any issues that arise that require NetFlow data.

View full review »
VS
Network and Security with 10,001+ employees

We are using it on-prem and there are two flow sensors on the fabric site, and one flow collector, and one management center. Stealthwatch is integrated with the Cisco ISE. We use it to monitor for any anomaly behavior and analyze results.

Stealthwatch sends relay packets to Cisco ISE, and Cisco ISE auto-remediates behavioral analytics. Any weak spot can be quarantined or shut down. We are using the Stealthwatch and Cisco ISE integration, and it's very useful on the network.

View full review »
CK
Manager, Network Engineering & Telecommunications at a healthcare company with 1,001-5,000 employees

We use Cisco Stealthwatch mostly for network visibility and security. I believe the solution reduces false-positives by flagging it as potential threats.

View full review »
JS
Network Engineer at Oracle Corporation

This is a security solution for us and our customers. We use it for port monitoring aggregation and doing captures.

View full review »
BG
Manager of Digital Communications at Memorial Hermann Healthcare System

We use Cisco Stealthwatch for security and network analytics. The solution saves you time, money, and administrative work. If we have the device support, it means that I don't have to send someone in a car to go to be local on the site and look at whatever the issue is.

View full review »
JM
Sr Network Engineer at a insurance company with 5,001-10,000 employees

Our primary use case for Stealthwatch is endpoint security.

View full review »
SD
Network Manager at a healthcare company with 1,001-5,000 employees

Our primary use case of this solution is for troubleshooting network issues.

View full review »
JQ
Network Manager Administrator at a financial services firm with 501-1,000 employees

Stealthwatch is primarily a network monitoring tool.

View full review »
MM
PMO Department at a comms service provider with 1,001-5,000 employees

We are a system integrator and a partner of Cisco. We are providing Network Detection and Response (NDR) solutions, and depending on a customer's requirement, we propose it. This product was launched recently, and it is new in the Cisco portfolio. We have supplied this solution to some of the customers.

It is used for network protection for those segments that are not covered by the firewall. It is used for doing ransomware detection in terms of east-west traffic. A firewall can't detect that because it is mostly focused on north-south traffic. So, in the segments that are left out from the firewall, the StealthWatch network detection platform is able to see the malware that is sent to the devices.

View full review »
DK
Network Engineer at UC San Diego Health System

For our organization, Cisco Stealthwatch is more of a confirmation of what is happening on our network, or compliance. And in addition to that, it helps us to troubleshoot issues. We get to see where traffic is flowing and it helps us figure out problems.

View full review »
RF
Senior Network Engineer at a comms service provider

Our primary use case for this solution is to work on it so that we can learn enough about it to sell it to our customers.

View full review »
JW
Network Administrator at a mining and metals company with 1,001-5,000 employees

Our primary use case for this solution is to monitor east, west, north, and south traffic so that we can see what's going on in the network internally. You don't get that granularity with anything else. We have an ASA that gets north and south traffic. So we're just really interested in this one by itself.

View full review »
AM
Associate Director Network Services at a pharma/biotech company with 10,001+ employees

We use Stealthwatch to identify any risk or vulnerabilities in the environment.

View full review »
JC
Service Engineer at a tech company with 10,001+ employees

We mainly use Cisco Stealthwatch in our organization for bandwidth monitoring and other issues we experience on our networks. When someone reports an issue, this solution helps us to determine what's going on in the network by checking the cell blocks and see if there are any issues.

View full review »
it_user735195 - PeerSpot reviewer
Senior Information Security Engineer at a transportation company with 10,001+ employees
  • ID managers
  • Flow replicators
  • Flow sensors
  • Thick client
View full review »
SA
Network Section Chief at a government with 1,001-5,000 employees

We use Cisco Stealthwatch to do NetFlow across our enterprise network. Cisco Stealthwatch helps our cybersecurity guys detect threats across the network.

View full review »
ML
National Offering Lead - Security Practice at a computer software company with 501-1,000 employees

We are resellers, we provide solutions for our clients.

We use Stealthwatch for network segmentation use-cases, data analytics around exfiltration, encrypted threat analytics, map phishing, scans. and as a tripwire on top of all of the other security controls that are available.

View full review »
RG
Infosec Manager at a energy/utilities company with 1,001-5,000 employees

Our main reason for using Stealthwatch is it gives us visibility.

View full review »
LW
Network Engineer at a tech services company

The primary use case for Cisco Stealthwatch is for us to sell it. 

View full review »
MP
Senior Security Engineer at a tech services company with 501-1,000 employees

We use Cisco Stealthwatch to monitor network traffic and make network traffic analytics on east, west, north, and south traffic in our company.

View full review »
SL
Network Administrator at a retailer with 1,001-5,000 employees

Our primary use case is for it to run our call center 24/7 365 days a year. 

View full review »
RH
Sr. Network Engineer at a tech services company with 10,001+ employees

Our primary use case for Cisco Stealthwatch is to ensure net flow.

View full review »
JH
Chief Consultant at a tech services company with 11-50 employees

We are a system integrator and I have implemented this solution for one of our customers.

This solution is normally used for anomaly detection and malware detection.

It is deployed on-premises.

View full review »
it_user1107381 - PeerSpot reviewer
Senior Security Consultant at a tech services company with 51-200 employees

My customers buy Stealthwatch for traffic analysis. 

View full review »
JB
Ingenieria at a tech services company with 11-50 employees

We primarily handle the design, implementation, and support for the solution and we also manage collaboration, routing and switching, security products, et cetera.

View full review »
Buyer's Guide
Cisco Secure Network Analytics
April 2024
Learn what your peers think about Cisco Secure Network Analytics. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.