Cisco Secure Workload Overview

Cisco Secure Workload is the #4 ranked solution in our list of top Microsegmentation Software tools. It is most often compared to VMware NSX: Cisco Secure Workload vs VMware NSX

What is Cisco Secure Workload?

Achieve the security required for today's heterogeneous multicloud environment with Cisco Secure Workload (formerly Tetration). Protect workloads across any cloud, application, and workload--anywhere. Automate and implement a secure zero-trust model for micro-segmentation based on application behavior and telemetry. Proactively detect and remediate indicators of compromise to minimize the impact to your business.

Cisco Secure Workload is also known as Cisco Tetration.

Buyer's Guide

Download the Cloud and Data Center Security Buyer's Guide including reviews and more. Updated: July 2021

Cisco Secure Workload Customers

ADP, University of North Carolina Charlotte (UNCC)

Cisco Secure Workload Video

Pricing Advice

What users are saying about Cisco Secure Workload pricing:
  • "The price is based on how many computers you're going to install it on."

Filter Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Brice ABRIOUX
Information Security Engineer at ENEDIS
Real User
Top 20
A secure and stable solution for our on-premises network analytics

What is our primary use case?

We have an on-premises deployment.

Pros and Cons

  • "The most valuable feature of this solution is security."
  • "The interface is really helpful for technical people, but it is not user-friendly."

What other advice do I have?

You need to have a team with a good understanding of your information systems in order to have benefits with this kind of solution. My advice for anybody who is implementing this solution is to define what you want to use, and what you need from the tool. You can't have rules that are too strict in the beginning because otherwise, you can't go to production. Over time, you will have a clear view of what is ongoing with your information system. This allows you to improve step-by-step. This is a long-term approach. This is a good solution, but it should be more user-friendly and easier to deploy…
Kunal Puri
Solutions Architect at Liberty Global
Real User
Top 20
Simple to deploy and provides good application visibility along with micro-segmentation feature

What is our primary use case?

We have many use cases for Cisco Tetration. Examples of this are micro-segmentation and the visibility of applications.

Pros and Cons

  • "The most valuable feature is micro-segmentation, which is the most important with respect to visibility."
  • "There is some overlap between Cisco Tetration and AppDynamics and I need to have a single pane of glass, rather than have to jump between different tools."

What other advice do I have?

The suitability of Cisco Tetration depends on the strategy of any given organization. If your organization has a micro-segmentation strategy then this is a good solution. It works to improve visibility by creating connection metrics between applications and having the proper policy in place. Overall, this is a really good product and I am happy with it. I would rate this solution a nine out of ten.
Find out what your peers are saying about Cisco, VMware, Guardicore and others in Cloud and Data Center Security. Updated: July 2021.
523,535 professionals have used our research since 2012.
BA
CTO at a tech vendor with 11-50 employees
Real User
Top 10
A solution with a straightforward setup, offering 100% telemetry coverage and good machine learning

Pros and Cons

  • "The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network."
  • "The multi-tenancy, redundancy, backup and restore functionalities, as well as the monitoring aspects of the solution, need improvement. The solution offers virtually no enterprise-grade possibility for monitoring."

What other advice do I have?

We use the on-premises deployment model along with MSSP, a service provider. I would rate the solution eight out of ten.