Compare Cisco Secure Workload vs. Unisys Stealth

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Palo Alto Networks, VMware, Guardicore and others in Microsegmentation Software. Updated: May 2021.
510,204 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
"It is not cheap and pricing may limit scalability.""The price is based on how many computers you're going to install it on."

More Cisco Secure Workload Pricing and Cost Advice »

Information Not Available
report
Use our free recommendation engine to learn which Microsegmentation Software solutions are best for your needs.
510,204 professionals have used our research since 2012.
Questions from the Community
Top Answer: Other then providing micro segmentation capabilities the dashboard provides all required information in single windows for configured workload. With insight feature we even get… more »
Top Answer: Support for all OS as currently they do not support AIX which is normally base OS for any critical Banking Workload  Solution should be able to provide micro Segmentation policy based on process… more »
Top Answer: Micro Segmentation is 1 of the important use case which organization go with Cisco ACI for Agentless  They also got Cisco Tetration for Agent based approach 
Ask a question

Earn 20 points

Ranking
Views
9,807
Comparisons
5,564
Reviews
6
Average Words per Review
484
Rating
8.8
Views
325
Comparisons
196
Reviews
0
Average Words per Review
0
Rating
N/A
Popular Comparisons
Also Known As
Cisco Tetration
Learn More
Overview

Achieve the security required for today's heterogeneous multicloud environment with Cisco Secure Workload (formerly Tetration). Protect workloads across any cloud, application, and workload--anywhere. Automate and implement a secure zero-trust model for micro-segmentation based on application behavior and telemetry. Proactively detect and remediate indicators of compromise to minimize the impact to your business.

Unisys Stealth products and services offer cybersecurity solutions that maximize your security posture, maintain regulatory compliance and protect your organization.

Offer
Learn more about Cisco Secure Workload
Learn more about Unisys Stealth
Sample Customers
ADP, University of North Carolina Charlotte (UNCC)
ACH Colombia, Air France KLM, ANBIMA, ANGKASA, Banco de Costa Rica, Barksdale Federal Credit Union, Banestes, Bancolombia
Top Industries
VISITORS READING REVIEWS
Comms Service Provider39%
Computer Software Company21%
Financial Services Firm6%
Insurance Company4%
VISITORS READING REVIEWS
Computer Software Company34%
Comms Service Provider25%
Educational Organization6%
Performing Arts6%
Company Size
REVIEWERS
Small Business22%
Large Enterprise78%
VISITORS READING REVIEWS
Small Business3%
Midsize Enterprise13%
Large Enterprise85%
No Data Available
Find out what your peers are saying about Palo Alto Networks, VMware, Guardicore and others in Microsegmentation Software. Updated: May 2021.
510,204 professionals have used our research since 2012.

Cisco Secure Workload is ranked 4th in Microsegmentation Software with 5 reviews while Unisys Stealth is ranked 9th in Microsegmentation Software. Cisco Secure Workload is rated 8.6, while Unisys Stealth is rated 0.0. The top reviewer of Cisco Secure Workload writes "A secure and stable solution for our on-premises network analytics". On the other hand, Cisco Secure Workload is most compared with VMware NSX, Guardicore Centra, Illumio Adaptive Security Platform, Prisma Cloud by Palo Alto Networks and vRealize Network Insight, whereas Unisys Stealth is most compared with Zscaler Private Access, Illumio Adaptive Security Platform, VMware NSX, Okta Workforce Identity and Guardicore Centra.

See our list of best Microsegmentation Software vendors.

We monitor all Microsegmentation Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.