Lancope StealthWatch System At-a-Glance Improve Visibility Across the Network to Enhance

advertisement
At-a-Glance
Lancope StealthWatch
System
Improve Visibility Across the Network to Enhance
Threat Detection
Today’s enterprise network is more complex and distributed than ever
before. New security challenges arise weekly. The ever-evolving threat
landscape, along with trends such as cloud computing and the Internet of
Things, further complicates the situation. Unfortunately, as more and more
users and devices are added to the network, gaining visibility into what’s
going on is harder to achieve. And you can’t protect what you can’t see.
Benefits
• Gain visibility across all network
conversations, including eastwest and north-south traffic,
to detect both internal and
external threats
• Conduct advanced security
analytics and obtain in-depth
context to detect a wide range
of anomalous behaviors that
may signify an attack
• Accelerate and improve
threat detection, incident
response, and forensics across
the entire network
• Enable deeper forensic
investigations with audit
histories of network activity
Seeing into all traffic flows, applications, users, and devices that are
known and unknown is critical to determine whether there may be
anomalous behavior occurring on your network. Using sophisticated
behavioral analytics, the StealthWatch System transforms data from
existing infrastructure into actionable intelligence for improved network
visibility and security and accelerated incident response.
Continuous Network Traffic Analysis for Accelerated
Incident Response and Forensics
The StealthWatch System dramatically improves network visibility,
security, and response times to questionable incidents across the entire
network. It helps security operations staff gain real-time situational
awareness of all users, devices, and traffic on the network, in the
data center, and in the cloud. And it allows security teams to quickly
and effectively respond to threats before, during, and after a security
incident by providing real-time, continuous monitoring and pervasive
views into all network traffic.
Applying context-aware security analysis to automatically detect
anomalous behaviors, StealthWatch can identify a wide range of attacks,
including malware, zero-day attacks, distributed denial-of-service (DDoS)
attempts, advanced persistent threats (APTs), and insider threats.
• Simplify compliance, network
segmentation, performance
monitoring, and capacity
planning by extending visibility
across the network
© 2016 Cisco and/or its affiliates. All rights reserved.
nce
At-a-Glance
“Immediately upon deployment,
StealthWatch uncovered 400
misbehaving hosts and helped
reduce network threats by 90
percent.”
Dartmouth College
“MEMC Electronic Materials,
Inc. has experienced an
improvement in network
baselining, real-time threat
detection, incident response,
forensic investigations, and
network troubleshooting with
StealthWatch.”
Brian Barry
Security Manager,
MEMC Electronic Materials, Inc.
“Lancope’s StealthWatch
System is a product that
provides so much insight
into what is really happening
within your network, and gives
the best blend of advance
notice of problems combined
with historic reporting using
standard flow data.”
StealthWatch does all this by providing:
• Deep visibility across the network perimeter, interior, data center, and
private and public cloud
• A simplified understanding of normal network behavior by using
NetFlow to establish a baseline for easily pinpointing anomalous
behavior
• Continuous monitoring of devices, applications, and users throughout
distributed networks
• Advanced security analytics and intelligence to detect a wide range of
behaviors that could signify an attack
• Acceleration of incident response times with real-time
threat detection
• Superior forensic investigations with comprehensive network
audit trails
• Simplified capabilities for network planning, segmentation,
diagnostics, and compliance validation
• Integration with the network infrastructure, Cisco® Identity Services
Engine, and hardware supporting Cisco TrustSec® technology to use
the network as a security sensor and enforcer
Next Steps
StealthWatch collects and analyzes massive amounts of network
data to deliver comprehensive visibility and protection for even the
largest, most dynamic networks. To learn more about StealthWatch,
visit www.cisco.com/go/stealthwatch or contact your local Cisco
account representative.
Steve Mould
Senior IT Architect, Experian
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of
Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/
go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
C45-736510-00 04/16
Download