Compare Aporeto vs. Cisco Tetration

Aporeto is ranked 10th in Cloud Workload Security with 1 review while Cisco Tetration is ranked 3rd in Cloud Workload Security with 8 reviews. Aporeto is rated 9.0, while Cisco Tetration is rated 8.6. The top reviewer of Aporeto writes "Helps secure our client's Linux workloads on any infrastructure, with end-to-end encryption". On the other hand, the top reviewer of Cisco Tetration writes "Saves time, resists attacks, and allocates resources properly". Aporeto is most compared with , whereas Cisco Tetration is most compared with VMware NSX, Illumio Adaptive Security Platform and GuardiCore.
Cancel
You must select at least 2 products to compare!
Aporeto Logo
32 views|5 comparisons
Cisco Tetration Logo
4,472 views|2,930 comparisons
Most Helpful Review
Find out what your peers are saying about Check Point, Threat Stack, Cisco and others in Cloud Workload Security. Updated: October 2019.
372,906 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
The dynamic workload identity creation, attestation, and assignment is the best feature. In addition, the application dependency map across heterogeneous environments for compliance is a striking feature.

Read more »

The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network.The most valuable feature of this solution is security.The product offers great visibility into the network so we can enforce security measures.The most valuable feature of the solution is that we don't have to do packet captures on the network.A complete and powerful micro-segmentation solution.Instead of proving that all the access control lists are in place and all the EPGs are correct, we can just point the auditor to a dashboard and point out that there aren't any escaped conversations. It saves an enormous, enormous amount of time.Scalability is its most valuable feature.By using Tetration insight, we are able to get the latency on our level accounts and we can determine whatever the issue is with the application latency itself.

Read more »

Cons
More documentation with real-world use cases would be helpful.

Read more »

The multi-tenancy, redundancy, backup and restore functionalities, as well as the monitoring aspects of the solution, need improvement. The solution offers virtually no enterprise-grade possibility for monitoring.The interface is really helpful for technical people, but it is not user-friendly.The emailed notifications are either hard to find or they are not available. Search capabilities can be improved.I'd like to see better documentation for advanced features. The documentation is fairly basic. I would also like to see better integration with other applications.It has an uninviting interface.They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem. The issue with the price comes from the fact that you have to have it with enormous storage and enormous computes.It is not so easy to use and configure. It needs a bunch of further resources to work, which is mainly the biggest downside of it. The deployment is huge.It is highly scalable, but there is a limitation that it is only available on Cisco devices.

Read more »

Pricing and Cost Advice
The purchasing process was easy and quick. It is a very economical solution.

Read more »

It is not cheap and pricing may limit scalability.Pricing depends on the scope of the application and the features. Larger installations save more.The price is outrageous. If you have money to throw at the product, then do it.The pricing is a bit higher than we anticipated.

Read more »

report
Use our free recommendation engine to learn which Cloud Workload Security solutions are best for your needs.
372,906 professionals have used our research since 2012.
Ranking
10th
Views
32
Comparisons
5
Reviews
1
Average Words per Review
398
Avg. Rating
9.0
3rd
Views
4,472
Comparisons
2,930
Reviews
7
Average Words per Review
456
Avg. Rating
8.6
Top Comparisons
Compared 34% of the time.
Compared 24% of the time.
Learn
Aporeto
Cisco
Overview

The Aporeto platform protects cloud applications from attack by authenticating and authorizing all communications with a cryptographically signed identity assigned to every workload. Aporeto alleviates reliance on un-manageable error-prone IP white-list policies. A distributed homogenous security policy is enforced per workload independent of network or infrastructure configuration, enabling uniform security orchestration across multi-cloud environments.

Cisco Tetration offers holistic workload protection for multicloud data centers by enabling a zero-trust model using segmentation. This approach allows you to identify security incidents faster, contain lateral movement and reduce your attack surface. Its infrastructure-agnostic approach supports both on-premises and public cloud workloads.

Offer
Learn more about Aporeto
Learn more about Cisco Tetration
Sample Customers
Informatica, Etherparty, Exact TransactionsADP, University of North Carolina Charlotte (UNCC)
Top Industries
No Data Available
VISITORS READING REVIEWS
Software R&D Company29%
Comms Service Provider19%
Retailer6%
Financial Services Firm5%
Find out what your peers are saying about Check Point, Threat Stack, Cisco and others in Cloud Workload Security. Updated: October 2019.
372,906 professionals have used our research since 2012.
We monitor all Cloud Workload Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Sign Up with Email