Cisco Secure Network Analytics Primary Use Case
JT
reviewer2108079
Development Manager at a healthcare company with 10,001+ employees
We're currently using it to figure out what is happening in our network. For example, to see whether there's any incorrect traffic in our network. We are also using it to monitor traffic coming from the internet into our network.
We have about 30,000 end users and about 60,000 end devices in the network. We are located in the capital area and have 30 hospitals and 200 other sites.
View full review »DB
Douglas Bentley
Assistant Director of IT at University of Rochester Medical Center
We use this solution for NetFlow statistics.
View full review »We have a number of users that deployed both fixed hubs and satellite sites. Cisco Secure Network Analytics enables us to get full visibility and detect general threats on both types of sites. Regardless of whether a site is deployed overseas or back home, we want one single solution to be able to collect the telemetry, make a decision on it, and report it in a meaningful way. We also want the solution to be able to pipe it to tools that we can use to fight threats.
Buyer's Guide
Cisco Secure Network Analytics
April 2024
Learn what your peers think about Cisco Secure Network Analytics. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.
- Monitoring
- Security
It is a monitoring solution and network, because many times what we see is circuit oversaturation. Then, we want to know why and where it is coming from.
We were using Stealthwatch before the upgrade, since it came out. We have a good partnership with Cisco. We have NAS engineers. We have a quarterly meeting with Cisco. Generally, when they come out with a new solution, like when Stopwatch first came out, we jump on board. Therefore, we have been with it for awhile.
View full review »RH
Rob Hartstone
Network Operations Manager at Philips Electronics
Our primary use of Stealthwatch is for a secure remediation of systems that are causing problems on our internal network.
View full review »JT
Jerome TOUTEE
Former Employee of Orange Business Services as Head of Security Engineering at a comms service provider with 5,001-10,000 employees
We use the solution to improve the security of private hosting and network management systems. We can detect data exfiltration by analyzing statistics and identifying obsolete protocols and applications. It also helps us graph traffic metrics with valuable insights into routing and flows.
View full review »We use StealthWatch for telemetry on the cybersecurity side. It's also used for CCTV, IoT, and all the other stuff that isn't connected to the network. There is a cloud version of StealthWatch, but we use the on-prem solution.
TB
Travis Bugh
Senior Director of Architecture and Engineering at Trace3
We use Stealthwatch primarily to secure customers' endpoint devices, in order to provide more visibility into their security vectors. We determine where they are getting attacked, if they are getting attacked, how to prevent it, how to fight it, etc. We are really trying to take the fight to the administrator and be a little more proactive, as opposed to being so reactive with security events.
JS
JosephSullivan
Manager at Indiana University Health
We use Stealthwatch mainly for security.
View full review »SK
ShehreyarKhan
Senior Operations Consultant at NNIT
We use Cisco Secure Network Analytics to collect network data, which we then send to our cybersecurity team for analysis. It is a basic use case that focuses on monitoring network traffic for potential security threats and providing our team with the information they need to detect and respond to issues.
AA
Directorb5e9
Director Network Services at a consultancy with 1,001-5,000 employees
Our primary use for this solution is to help protect against threats on our network.
View full review »BS
reviewer1123185
Director of Network and Telecom Services at a healthcare company with 10,001+ employees
We use the solution primarily for IDS/IPS.
View full review »JD
reviewer1467678
Enterprise Information Security Architect at a agriculture with 5,001-10,000 employees
From a security perspective, we are watching for behind the scenes data exfiltration, or tubulous, or malicious network traffic, that our other tools may not be detecting at a basic network layer.
We are also using it for performance issues in trying to figure out if a site is experiencing issues with slowness. Also, we try to determine things like whether we are exceeding the bandwidth of the link or whether there is a bottleneck or something that's not negotiating correctly on the network.
Also, we use it for TAP to try and do inline network traffic analysis from a security perspective or from a performance perspective as well.
View full review »AK
AK11
Sales director at Future Point Technologies
Using Cisco Secure Network Analytics has revolutionized our network security. The integration with SRTIntel provides unparalleled visibility, going beyond imagination. SNA, along with the SMA feature, offers detailed insights and call relations, enabling effective threat detection and response. The combination with endpoint protection gives us precise control over traffic, ensuring a robust defense against cyber threats.
View full review »EF
NetworkM6238
Network Manager at a financial services firm with 1,001-5,000 employees
Our primary use is to monitor our network, especially our remote branches.
View full review »ML
Mark Lavine
Airway Transportation Service Specialist at Federal Aviation Administration
Five engineers and I were testing this solution. We were looking for an NDR solution. We're cyber threat hunters, so we're looking to provide cyber hunting services for our clients. We're in the market for a network detection response solution so that we can monitor network traffic and analyze anomalies or anything that may be on the network that looks like normal traffic. We were using Stealthwatch to get a feel for it and to see whether or not it was going to be something that we would use in the future.
SG
Shannon Greim
Engineer at Charter Communications, Inc.
We mainly use this solution for diagnostic information.
View full review »AR
Technicab71a
Technical Consultant at a tech services company with 501-1,000 employees
We use this solution primarily for the TLS audit in our on-premise environment, and to assist our customers.
View full review »AM
SeniorCoeaa2
Senior Consultant at a manufacturing company with 10,001+ employees
Our primary use case for this solution is security.
View full review »RU
Robert Ufer
Network Architect at Henry Ford health system
We use Cisco Stealthwatch for device compliance and device auditing. It's part of our overall strategy. We have been consolidating down. Our security team is over-packed. We're trying to leverage what we have and move the blame away from us on the network side.
View full review »SJ
Steffen Jensen
IT Network Engineer at a logistics company with 10,001+ employees
Our primary use for Stealthwatch is to provide insights into what traffic is flowing through the network for our security operations center. With that, they can go and enforce security.
View full review »ER
Forensic60e5
Forensic Analyst at a pharma/biotech company with 1,001-5,000 employees
We implemented Stealthwatch Cloud in order to provide our analysts with an additional tool for security monitoring.
View full review »JC
reviewer1603941
Chief Technology Officer at a tech services company with 51-200 employees
Our primary use case of Stealthwatch is for flow analysis, to see what's running on the network and to check for anomalous behavior. Stealthwatch runs in the background and analyzes flows, producing summary reports based on the information it receives. You can look for anything that's out of place, for example, background checking on a file transfer where there's a query as to whether it's a legitimate transfer. It's quite a powerful tool that questions what's going on. We are integrators and I'm the chief technology officer. We're gold partners with Cisco.
UN
Director7b47
Director of Operations at a manufacturing company with 1,001-5,000 employees
Our primary uses for this solution are threat management and traffic management.
View full review »FK
Finn Kristensen
Architect at Atea A/S
We provide this solution to our customers to give them visibility into their network.
View full review »MG
Mark Green
Network Operations Manager at a tech company with 10,001+ employees
Our primary use for this solution is to provide operational metrics. In terms of the analytics and threat detection capabilities, it basically cures our day-to-day for everything that we do. It helps us out tremendously.
View full review »KP
Ken Poteate
Security Analysist at Amwins Group
We really just use the product for behavior analytics of our employees. When we have issues or when there is some type of an investigation from a security perspective, we pull up Stealthwatch and start trying to see what that user was doing. If there are any anomalies in their activities we have to take action to correct it.
We don't need to monitor every device. The reports show everything that person's doing and what device they're running, et cetera, and we really only need specific things.
That was one of our problems in the initial deployment. We tried to overcome that by redeploying. I'm not sure exactly sure that it helped a lot. We're getting more data, but I'm not really sure it gives us a true picture.
JC
LeadNetwd213
Lead Network Engineer at a retailer with 1,001-5,000 employees
The security team uses it more than we do. I don't work on it that much. We have a couple uses for Stealthwatch: gathering security data and sending logs. I believe there is a gatherer that we have that has all of our logs sitting there. That's basically all we use them for.
View full review »WR
NetworkE7689
Network Engineer at a government with 1,001-5,000 employees
We use Cisco Stealthwatch as our primary NetFlow collector. We use it for data analysis and for any issues that arise that require NetFlow data.
VS
reviewer1265118
Network and Security with 10,001+ employees
We are using it on-prem and there are two flow sensors on the fabric site, and one flow collector, and one management center. Stealthwatch is integrated with the Cisco ISE. We use it to monitor for any anomaly behavior and analyze results.
Stealthwatch sends relay packets to Cisco ISE, and Cisco ISE auto-remediates behavioral analytics. Any weak spot can be quarantined or shut down. We are using the Stealthwatch and Cisco ISE integration, and it's very useful on the network.
CK
reviewer1122849
Manager, Network Engineering & Telecommunications at a healthcare company with 1,001-5,000 employees
We use Cisco Stealthwatch mostly for network visibility and security. I believe the solution reduces false-positives by flagging it as potential threats.
View full review »JS
James Stout
Network Engineer at Oracle Corporation
This is a security solution for us and our customers. We use it for port monitoring aggregation and doing captures.
View full review »BG
Brian Grainer
Manager of Digital Communications at Memorial Hermann Healthcare System
We use Cisco Stealthwatch for security and network analytics. The solution saves you time, money, and administrative work. If we have the device support, it means that I don't have to send someone in a car to go to be local on the site and look at whatever the issue is.
View full review »JM
SrNetworbb7a
Sr Network Engineer at a insurance company with 5,001-10,000 employees
Our primary use case for Stealthwatch is endpoint security.
SD
NetworkMed21
Network Manager at a healthcare company with 1,001-5,000 employees
Our primary use case of this solution is for troubleshooting network issues.
View full review »JQ
Joaquin Quinata
Network Manager Administrator at a financial services firm with 501-1,000 employees
Stealthwatch is primarily a network monitoring tool.
View full review »MM
reviewer1287867
PMO Department at a comms service provider with 1,001-5,000 employees
We are a system integrator and a partner of Cisco. We are providing Network Detection and Response (NDR) solutions, and depending on a customer's requirement, we propose it. This product was launched recently, and it is new in the Cisco portfolio. We have supplied this solution to some of the customers.
It is used for network protection for those segments that are not covered by the firewall. It is used for doing ransomware detection in terms of east-west traffic. A firewall can't detect that because it is mostly focused on north-south traffic. So, in the segments that are left out from the firewall, the StealthWatch network detection platform is able to see the malware that is sent to the devices.
DK
Dale Keehan
Network Engineer at UC San Diego Health System
For our organization, Cisco Stealthwatch is more of a confirmation of what is happening on our network, or compliance. And in addition to that, it helps us to troubleshoot issues. We get to see where traffic is flowing and it helps us figure out problems.
View full review »RF
SeniorNe4b79
Senior Network Engineer at a comms service provider
Our primary use case for this solution is to work on it so that we can learn enough about it to sell it to our customers.
View full review »JW
NetworkAcb23
Network Administrator at a mining and metals company with 1,001-5,000 employees
Our primary use case for this solution is to monitor east, west, north, and south traffic so that we can see what's going on in the network internally. You don't get that granularity with anything else. We have an ASA that gets north and south traffic. So we're just really interested in this one by itself.
View full review »AM
Associat85b7
Associate Director Network Services at a pharma/biotech company with 10,001+ employees
We use Stealthwatch to identify any risk or vulnerabilities in the environment.
View full review »JC
ServiceE8f27
Service Engineer at a tech company with 10,001+ employees
We mainly use Cisco Stealthwatch in our organization for bandwidth monitoring and other issues we experience on our networks. When someone reports an issue, this solution helps us to determine what's going on in the network by checking the cell blocks and see if there are any issues.
View full review »- ID managers
- Flow replicators
- Flow sensors
- Thick client
SA
NetworkSddc6
Network Section Chief at a government with 1,001-5,000 employees
We use Cisco Stealthwatch to do NetFlow across our enterprise network. Cisco Stealthwatch helps our cybersecurity guys detect threats across the network.
View full review »ML
reviewer1489326
National Offering Lead - Security Practice at a computer software company with 501-1,000 employees
We are resellers, we provide solutions for our clients.
We use Stealthwatch for network segmentation use-cases, data analytics around exfiltration, encrypted threat analytics, map phishing, scans. and as a tripwire on top of all of the other security controls that are available.
View full review »RG
Rafael-Garcia
Infosec Manager at a energy/utilities company with 1,001-5,000 employees
Our main reason for using Stealthwatch is it gives us visibility.
View full review »LW
NetworkEd59a
Network Engineer at a tech services company
The primary use case for Cisco Stealthwatch is for us to sell it.
View full review »MP
reviewer1330293
Senior Security Engineer at a tech services company with 501-1,000 employees
We use Cisco Stealthwatch to monitor network traffic and make network traffic analytics on east, west, north, and south traffic in our company.
View full review »SL
NetworkAe7fe
Network Administrator at a retailer with 1,001-5,000 employees
Our primary use case is for it to run our call center 24/7 365 days a year.
View full review »RH
SrNetworab58
Sr. Network Engineer at a tech services company with 10,001+ employees
Our primary use case for Cisco Stealthwatch is to ensure net flow.
View full review »JH
reviewer1151310
Chief Consultant at a tech services company with 11-50 employees
We are a system integrator and I have implemented this solution for one of our customers.
This solution is normally used for anomaly detection and malware detection.
It is deployed on-premises.
View full review »My customers buy Stealthwatch for traffic analysis.
View full review »JB
reviewer1432242
Ingenieria at a tech services company with 11-50 employees
We primarily handle the design, implementation, and support for the solution and we also manage collaboration, routing and switching, security products, et cetera.
View full review »Buyer's Guide
Cisco Secure Network Analytics
April 2024
Learn what your peers think about Cisco Secure Network Analytics. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.