Compare Cisco Tetration vs. FortiDDoS

Cisco Tetration is ranked 3rd in Cloud and Data Center Security with 8 reviews while FortiDDoS is ranked 8th in DDoS with 4 reviews. Cisco Tetration is rated 8.6, while FortiDDoS is rated 8.8. The top reviewer of Cisco Tetration writes "Saves time, resists attacks, and allocates resources properly". On the other hand, the top reviewer of FortiDDoS writes "The security is good but it should be more user-friendly and more affordable". Cisco Tetration is most compared with VMware NSX, Illumio Adaptive Security Platform and GuardiCore, whereas FortiDDoS is most compared with Arbor DDoS, Fortinet FortiWeb and Radware DefensePro.
Cancel
You must select at least 2 products to compare!
Cisco Tetration Logo
4,943 views|3,198 comparisons
FortiDDoS Logo
1,916 views|1,259 comparisons
Most Helpful Review
Find out what your peers are saying about VMware, Trend Micro, Cisco and others in Cloud and Data Center Security. Updated: November 2019.
378,124 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network.The most valuable feature of this solution is security.The product offers great visibility into the network so we can enforce security measures.The most valuable feature of the solution is that we don't have to do packet captures on the network.A complete and powerful micro-segmentation solution.Instead of proving that all the access control lists are in place and all the EPGs are correct, we can just point the auditor to a dashboard and point out that there aren't any escaped conversations. It saves an enormous, enormous amount of time.Scalability is its most valuable feature.By using Tetration insight, we are able to get the latency on our level accounts and we can determine whatever the issue is with the application latency itself.

Read more »

I find the interface easy to use.It allows me to see all the traffic on my network.This solution can protect Layer 3, Layer 4 and Layer 7 attacks of applications for us.Among its key features: Detects and mitigates DDoS attacks at L3 to L7; negligible to zero false-positives; Generates and sends reports without the need for an expensive third-party solution.

Read more »

Cons
The multi-tenancy, redundancy, backup and restore functionalities, as well as the monitoring aspects of the solution, need improvement. The solution offers virtually no enterprise-grade possibility for monitoring.The interface is really helpful for technical people, but it is not user-friendly.The emailed notifications are either hard to find or they are not available. Search capabilities can be improved.I'd like to see better documentation for advanced features. The documentation is fairly basic. I would also like to see better integration with other applications.It has an uninviting interface.They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem. The issue with the price comes from the fact that you have to have it with enormous storage and enormous computes.It is not so easy to use and configure. It needs a bunch of further resources to work, which is mainly the biggest downside of it. The deployment is huge.It is highly scalable, but there is a limitation that it is only available on Cisco devices.

Read more »

The solution can be a little more user-friendly and it can be more affordable.I would like to see analytics, big data.I find that there have been issues in the past year with the solution hanging. It freezes often.All the thresholds that need to be configured should be included in the default so that user will not forget or misconfigure.

Read more »

Pricing and Cost Advice
It is not cheap and pricing may limit scalability.Pricing depends on the scope of the application and the features. Larger installations save more.The price is outrageous. If you have money to throw at the product, then do it.The pricing is a bit higher than we anticipated.

Read more »

Information Not Available
report
Use our free recommendation engine to learn which Cloud and Data Center Security solutions are best for your needs.
378,124 professionals have used our research since 2012.
Ranking
Views
4,943
Comparisons
3,198
Reviews
7
Average Words per Review
456
Avg. Rating
8.6
8th
out of 27 in DDoS
Views
1,916
Comparisons
1,259
Reviews
4
Average Words per Review
221
Avg. Rating
8.8
Top Comparisons
Compared 34% of the time.
Compared 25% of the time.
Compared 39% of the time.
Compared 10% of the time.
Compared 10% of the time.
Also Known As
Fortinet DDoS
Learn
Cisco
Fortinet
Overview

Cisco Tetration offers holistic workload protection for multicloud data centers by enabling a zero-trust model using segmentation. This approach allows you to identify security incidents faster, contain lateral movement and reduce your attack surface. Its infrastructure-agnostic approach supports both on-premises and public cloud workloads.

Distributed Denial of Service (DDoS) attacks are ever-evolving and use a variety of technologies. To successfully combat these attacks, you need a dynamic, multi-layered security solution. FortiDDoS protects from both known and zero day attacks with very low latency. It’s easy to deploy and manage, and includes comprehensive reporting and analysis tools.

Offer
Learn more about Cisco Tetration
Learn more about FortiDDoS
Sample Customers
ADP, University of North Carolina Charlotte (UNCC)Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Top Industries
VISITORS READING REVIEWS
Software R&D Company28%
Comms Service Provider22%
Government7%
Retailer5%
No Data Available
Find out what your peers are saying about VMware, Trend Micro, Cisco and others in Cloud and Data Center Security. Updated: November 2019.
378,124 professionals have used our research since 2012.
We monitor all Cloud and Data Center Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Sign Up with Email