Cisco Secure Workload Valuable Features

JM
Partner at a consultancy with 1-10 employees

I used to be a big fan of Cisco Secure Workload and Cisco Tetration Platform. I used to really like it. However, the product has undergone significant modifications since then. Certain pieces of it have been moved into Cisco SD-Access, and the original DVR of the network functionality has been moved. As a result, the product has changed a lot since I was most familiar with it.

Regarding features, it's quite similar to scanning tools as it catalogs vulnerabilities and identifies their locations on your endpoints within the network. It operates on an agent-based system and uses a catalog and scoring function to determine where known vulnerabilities exist.

View full review »
BA
Information Security Engineer at ENEDIS

The most valuable feature of this solution is security. We check processes on the different components of the virtual machines.

View full review »
SG
Post Sales Manager at Vcom Teachnologies

The product provides multiple-device integration.

View full review »
Buyer's Guide
Cisco Secure Workload
April 2024
Learn what your peers think about Cisco Secure Workload. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,667 professionals have used our research since 2012.
RR
Senior Manager Cloud Ops and Engineering at a comms service provider with 10,001+ employees

The telemetry gives me the visibility on the particular path. It helps to analyze the whole fabric itself. I also get to know what condition we have and on which interfaces. We look at heavy traffic so we can share the particular load across to other interfaces as well.

View full review »
KP
Solutions Architect at Liberty Global

The most valuable feature is micro-segmentation, which can be used to deploy endpoint security along with the visibility of application and connection matrix

This product is simple to deploy, and provides visibility of connectivity between the endpoints/application.

View full review »
FH
Works at a comms service provider with 10,001+ employees

The most valuable feature is the auditing. They prove that we don't have out of scope conversations between servers that are not allowed.

View full review »
Boris REYES - PeerSpot reviewer
Sales Manager at Compuequip DOS

The solution is very user-friendly, which clients appreciate. 

The UI and GUI are fine.

It's stable. 

We can scale the product.

Technical support is helpful and responsive. 

View full review »
Muhammad  Marakkoottathil - PeerSpot reviewer
Regional Presales Consultant (INS Division) at GBM

Secure Workload's best feature is that it's an end-to-end offering from Cisco.

View full review »
PR
Data Center Manager at Cox Communications

The most valuable feature of the solution is that we don't have to do packet captures on the network. 

View full review »
it_user1045743 - PeerSpot reviewer
Sr. Regional Director, US East at a tech services company with 11-50 employees

While automated micro-segmentation is in itself valuable, application dependency mapping is time-saving and efficient. 

View full review »
JM
Network Engineer at a media company with 1,001-5,000 employees

The most valuable feature right now is to do with having visibility on the network — especially on our servers — and to be able to enforce some type of security measures. This is mostly to combat processes that shouldn't be running on the servers.

The data analytics and all the data that it gathers are very useful. It creates a fast turn around to improve the speed of decision making so we can decide what we need to do to remain secure.

View full review »
DV
Brand Manager at Comtrade Group

Scalability is its most valuable feature.

View full review »
BA
CTO at a tech vendor with 11-50 employees

The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network. 

Other valuable features include vast support for annotations, flexible user applications, machine learning, automatic classification, and hierarchical policies.

View full review »
Buyer's Guide
Cisco Secure Workload
April 2024
Learn what your peers think about Cisco Secure Workload. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,667 professionals have used our research since 2012.