Back to Top

StealthWatch - maintenance ( 2 years )

Mfg. Part: SWA-SUP-001-DUP | CDW Part: 3944451 | UNSPSC: 43232804
Request PricingCall

This item was discontinued on October 25, 2016.

Sales Assistance

800.800.4239 Mon-Fri 7am-7:30pm CT

Answer within 24 hours.


Have leasing questions? Let us know how can we help.

Note: Leasing is available to businesses only. Leasing is not available to individuals.
Mon-Fri 7am-7:30pm CT
  • Maintenance ( 2 years )
  • 1 user
  • Win
View More
Product Overview
Main Features
  • Maintenance ( 2 years )
  • 1 user
  • Win
StealthWatch is the first and only flow-based solution to combine powerful network performance monitoring with behavior-based anomaly detection to deliver total network visibility, ensuring network security, performance and availability. This flowbased approach enables cost-effective protection of hosts and networks without requiring probes, agents or continuous signature updates.

StealthWatch leverages existing network infrastructure investment by analyzing NetFlow and sFlow inherent in Cisco, Juniper, Foundry, Extreme or HP ProCurve network environments. As flows enter the StealthWatch System, flow collectors generate and track over 90 unique flow statistics to build a baseline of behavior exhibited by network hosts.

Applying a series of over 130 proprietary behavioral algorithms to the flow statistics, StealthWatch generates an index or "point system" for suspicious network activity called the Concern Index. The patent-pending Concern Index prioritizes suspicious host behavior and allows for threshold-driven response and automated mitigation actions using existing routers, switches or firewalls to quarantine or remove hosts.

Lancope's innovative user identity tracking technology integrates user identity and system awareness into the StealthWatch System, tying flow data, alarms, alerts and host behaviors directly to the actual user responsible for the activity. User identity tracking overcomes troublesome environments such as DHCP and VPN address pools. At the click of a mouse, StealthWatch operators can quickly reveal both which user and which system is logged into a network node or view a given user's network activity.

Adding to Cart...
12/15/2017 5:52:57 PM
^ Back to Top

Maximum 300 characters
An account manager will email you within one business day to confirm your request.

Your Quote has been submitted

What Happens Next? A confirmation email is on its way. Within one business day, you will be contacted by an Account Manager to finalize your quote.


Something went wrong.

Please try again later.