Cisco Stealthwatch Valuable Features

Consulta004b
Consultant at a healthcare company with 1,001-5,000 employees
Visibility. The ability to look East and West. To see what is passing through your circuits, where it is coming from, and how big it is. This is pretty key for us. It is the network. From a security standpoint, it is seeing pockets as well. Visibility is very key for us. View full review »
Travis Bugh
Senior Director of Architecture and Engineering at Trace3
The most valuable part is that Stealthwatch is part of a portfolio of security devices from Cisco, so while some of the competition may have other products that could be better or provide a better administrative experience, they don't have the breadth that Cisco does. Cisco literally can touch every single end point, every single ingress and egress point in the network. Nobody else has that. Stealthwatch has analytics and threat protection capabilities up there with the industry best. It's a super powerful database on the backend, basically giving you access to all the latest and greatest threat detection events that are out there, and they're constantly being updated and monitored, so that's probably the best part about having something like that. View full review »
Technicab71a
Technical Consultant at a tech services company with 501-1,000 employees
The most valuable features are encrypted threat analysis and the ability to run jobs on entire flows. The reporting feature is helpful for creating documentation because you can export relevant information and paste it into the back of the report. I’ve found that the solution's analytics and threat detection capabilities are very useful. I would like it to be able to better integrate with Firepower, but it meets the needs that it was promising from the beginning. View full review »
Find out what your peers are saying about Cisco, Darktrace, Vectra AI and others in Intrusion Detection and Prevention Software. Updated: October 2019.
370,655 professionals have used our research since 2012.
NetworkAcb23
Network Administrator at a mining and metals company with 1,001-5,000 employees
The most valuable feature of this solution is data hoarding because it catches threats on a frequent basis that we had no idea of. Like if certain hosts were talking to certain hosts. With this tool, we got that kind of information and it allows us to see when two hosts are talking when they shouldn't be talking at all. View full review »
NetworkE7689
Network Engineer at a government with 1,001-5,000 employees
The search options on Cisco Stealthwatch are the most valuable. You can get very granular with it, down to the kilobits or the seconds if you want. The product supports any time frame that you need, so that is nice. The solution affects network visibility in our company across all of our data, including our data center. All data transfers pass through our NetFlow collector. It's very easy to pinpoint any network anomalies or any type of suspicious behavior. NetFlow is very good at detecting those spikes and traffic. View full review »
Robert Ufer
Network Architect at Henry Ford health system
The most valuable feature is the level of visibility and the automation behind it. We don't have to go chasing things down. View full review »
Directorb5e9
Director Network Services at a consultancy with 1,001-5,000 employees
The most valuable feature is having visibility into the data segments throughout our network. Using the encrypted traffic analysis has given us more intelligence on the data that we're seeing, and provides us with even greater visibility. We can now see stuff that we haven't been able to see. There is an encrypted analytics feature that gives us visibility into some of the encrypted traffic. View full review »
LeadNetwd213
Lead Network Engineer at a retailer with 1,001-5,000 employees
The ability to send data flow from other places and have them all in one place is very valuable for us. View full review »
Director9b3e
Director of Networking and Telecom at a healthcare company with 1,001-5,000 employees
Being able to look at the Layer 7 application and get information about intrusion attempts is the most valuable feature for us. View full review »
Dale Keehan
Network Engineer at UC San Diego Health System
The most valuable feature of this solution is the way the net flow is being merged together in a single pane. That's been extremely useful for us because we can see what's going on with traffic in one single place. I also believe the solution has increased our organization's threat protection rate. The actual threat reports are run by our Infosec security person, but we are actually using this solution for that too. We're having reports generated so that our network engineering doesn't have to do the review. That team is responsible for reviewing reports and then we work with them to locate and do the next steps. View full review »
Ken Poteate
Security Analysist at Amwins Group
The ability to see a real-time picture of the network is the most valuable for us. View full review »
NetworkSddc6
Network Section Chief at a government with 1,001-5,000 employees
The solution has probably increased our incident response rate a little bit. We're seeing extra traffic on the network as opposed to before. Cisco Stealthwatch has reduced the amount of time to detect an immediate threat. View full review »
Forensic60e5
Forensic Analyst at a pharma/biotech company with 1,001-5,000 employees
It enables a holistic view of network traffic and general packet analysis. It's easy to identify anomalies without the use of signatures. The way in which we implemented Stealthwatch Cloud has enabled my team to analyze traffic behind proxies. View full review »
Joaquin Quinata
Network Manager Administrator at a financial services firm with 501-1,000 employees
It is a good application, providing for real-time monitoring of the organization of data. It can basically identify points of peak traffic where possible issues are being caused. View full review »
NetworkM6238
Network Manager at a financial services firm with 1,001-5,000 employees
The most valuable feature we got out of Stealthwatch is to be able to, while troubleshooting, go deep into one of our interfaces and verify what the bandwidth is and if there's any activity there that's causing problems. In terms of their analytics, we use the stats that we get from the tool itself to see that we're using a high utilization of the tool. As far as troubleshooting, it helps us to analyze some of the effects that our customers are seeing. View full review »
NetworkEd59a
Network Engineer at a tech services company
The features I find most valuable about Cisco Stealthwatch its integration with the pxGrid and all of our other devices that are tied in with pxGrid, so they can communicate with each other and be able to dynamically change, quarantine a suspicious device, or do whatever necessary in case of a malware attack or similar problem. View full review »
Rob Hartstone
Network Operations Manager at Philips Electronics
The fact that it can identify down to an IP address of a system that is causing problems, or potentially causing problems, is very valuable. Its analytics and threat detection capabilities are also pretty good. Stealthwatch finds things that we don't normally see. There are false positives but it's pretty good at catching things that are doing bad things. View full review »
Mark Green
Network Operations Manager at a tech company with 10,001+ employees
The most valuable feature of this solution is the reporting, in terms of operational metrics and what I can show to the execs. View full review »
Steffen Jensen
IT Network Engineer at a logistics company with 10,001+ employees
The feature most valuable for us is to gain visibility of what is actually floating through, so we can stop it based on whether it's good or bad traffic. Their analytics and threat detection capabilities are good, too. View full review »
Finn Kristensen
Architect at Atea A/S
The most valuable features provided by this solution are visibility and information. The solution's analytics and threat detection capabilities are good. Network visibility is also really good. The encrypted traffic analytics work well, I don't see any problem with it. The time to value is very good, and it is based on visibility. For example, one of our customers was locked by Ransomware and it cost them two million Danish Krones (approximately $300,000 USD). The shipper was not able to send anything until we got everything working. It has reduced the amount of time it takes to detect and remediate threats, although it is hard to tell by how much. If you’re under attack and you get visibility then you know it, and you can take precautions as fast as possible. View full review »
Brian Grainer
Manager of Digital Communications at Memorial Hermann Healthcare System
The analytics and threat detection capabilities of Cisco Stealthwatch are pretty good. It gives us good visibility of the information. It is easy to use and to the point. View full review »
Director7b47
Director of Operations at a manufacturing company with 1,001-5,000 employees
The most valuable features of this solution are the logging, keeping threats under control, and keeping our data and environment secure. View full review »
Shannon Greim
Engineer at Charter Communications, Inc.
Being able to identify specific data closed across the network is invaluable. Their analytics and threat detection capabilities are good. We're able to pick out the individual traffic flows for specific users and even individual sessions across the network and reconstruct timelines of activity after the fact, if needed, or use the data in real time to plan out network capacity and growth. View full review »
Chad Koopmeiners
Network Manager at NorthBay HealthCare
The features I find most valuable is the deep level of knowledge that we get on every device as well as what other devices it's talking to. Analytics and threat detection capabilities are a little overwhelming. I would say it's about average. The solution reduces the amount of time it takes to detect and remediate threats. View full review »
Douglas Bentley
Assistant Director of IT at University of Rochester Medical Center
The most valuable feature is the graphical analytics that it provides for mobile data. The solution's analytics and threat detection capabilities are fantastic. View full review »
SeniorNe4b79
Senior Network Engineer at a comms service provider
The most valuable feature about this solution is that it gives me insight into my network. It has great analytics and threat protection capabilities to detect faults and find viruses and trions. I can definitely say that this solution saves us time, money and administrative work. When it comes to time to value, it gets new insights, so it's worth the time and it allows me to know more of what's going on in the network. View full review »
NetworkMed21
Network Manager at a healthcare company with 1,001-5,000 employees
The most valuable features are its abilities to analyze data streams and determining what is inside those data streams to troubleshoot a problem. It is also easy to use. View full review »
SeniorCoeaa2
Senior Consultant at a manufacturing company with 10,001+ employees
The most valuable feature is integration. View full review »
SrNetworbb7a
Sr Network Engineer at a insurance company with 5,001-10,000 employees
The most valuable feature is its ability to track anomalies in real time. It increases our time-to-value ratios. View full review »
JosephSullivan
Manager at Indiana University Health
The single most valuable feature we get out of Stealthwatch is visibility. Also, analytics and threat protection capabilities are good, so far. View full review »
Associat85b7
Associate Director Network Services at a pharma/biotech company with 10,001+ employees
The most valuable feature is its alerts and dashboard. The solution's analytics and threat detection capabilities are also pretty reasonable. View full review »
NetworkAe7fe
Network Administrator at a retailer with 1,001-5,000 employees
There's a lot of stuff on the new version we haven't had the chance to work with yet. View full review »
Bill Guilford
Senior Information Security Engineer at a transportation company with 10,001+ employees
NetFlow: The beginning of any security investigation starts with NetFlow data. View full review »
reviewer1151310
Chief Consultant at a tech services company with 11-50 employees
The most valuable feature is anomaly detection, where it finds things that are not allowed internally. View full review »
SrNetworab58
Sr. Network Engineer at a tech services company with 10,001+ employees
The most valuable feature of this solution is that it give us insight into what's happening in our network. View full review »
Toufeik Choukri
PIC for Cyber Security at a university with 51-200 employees
The Cisco IOS is very important because that is what we have to teach our students. View full review »
Rafael-Garcia
Infosec Manager at a energy/utilities company with 1,001-5,000 employees
Stability is the most valuable feature we have seen in this solution. View full review »
Find out what your peers are saying about Cisco, Darktrace, Vectra AI and others in Intrusion Detection and Prevention Software. Updated: October 2019.
370,655 professionals have used our research since 2012.
Sign Up with Email