Compare Cisco Tetration vs. Unisys Stealth

Cancel
You must select at least 2 products to compare!
Cisco Tetration Logo
9,228 views|5,426 comparisons
Unisys Stealth Logo
125 views|62 comparisons
Most Helpful Review
Use Unisys Stealth? Share your opinion.
Find out what your peers are saying about VMware, Palo Alto Networks, Cisco and others in Microsegmentation Software. Updated: September 2020.
442,517 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
"The pricing is a bit higher than we anticipated.""The price is outrageous. If you have money to throw at the product, then do it.""Pricing depends on the scope of the application and the features. Larger installations save more.""It is not cheap and pricing may limit scalability.""The price is based on how many computers you're going to install it on."

More Cisco Tetration Pricing and Cost Advice »

Information Not Available
report
Use our free recommendation engine to learn which Microsegmentation Software solutions are best for your needs.
442,517 professionals have used our research since 2012.
Questions from the Community
Top Answer: The most valuable feature is micro-segmentation, which is the most important with respect to visibility.
Top Answer: The price is based on how many installation of software sensors you're going to install it on.
Top Answer: There is some overlap between Cisco Tetration and AppDynamics and there are few DC tools, It would be great to have a single pane of glass, rather than have to jump between different tools.
Ask a question

Earn 20 points

Ranking
Views
9,228
Comparisons
5,426
Reviews
8
Average Words per Review
462
Avg. Rating
8.6
Views
125
Comparisons
62
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
Popular Comparisons
Compared 30% of the time.
Compared 24% of the time.
Learn
Cisco
Unisys
Overview

Cisco Tetration offers holistic workload protection for multicloud data centers by enabling a zero-trust model using segmentation. This approach allows you to identify security incidents faster, contain lateral movement and reduce your attack surface. Its infrastructure-agnostic approach supports both on-premises and public cloud workloads.

Unisys Stealth products and services offer cybersecurity solutions that maximize your security posture, maintain regulatory compliance and protect your organization.

Offer
Learn more about Cisco Tetration
Learn more about Unisys Stealth
Sample Customers
ADP, University of North Carolina Charlotte (UNCC)ACH Colombia, Air France KLM, ANBIMA, ANGKASA, Banco de Costa Rica, Barksdale Federal Credit Union, Banestes, Bancolombia
Top Industries
VISITORS READING REVIEWS
Comms Service Provider37%
Computer Software Company27%
Insurance Company4%
Retailer3%
No Data Available
Company Size
REVIEWERS
Small Business22%
Large Enterprise78%
VISITORS READING REVIEWS
Small Business2%
Midsize Enterprise12%
Large Enterprise87%
No Data Available
Find out what your peers are saying about VMware, Palo Alto Networks, Cisco and others in Microsegmentation Software. Updated: September 2020.
442,517 professionals have used our research since 2012.
Cisco Tetration is ranked 3rd in Microsegmentation Software with 9 reviews while Unisys Stealth is ranked 9th in Microsegmentation Software. Cisco Tetration is rated 8.6, while Unisys Stealth is rated 0.0. The top reviewer of Cisco Tetration writes "Saves time, resists attacks, and allocates resources properly". On the other hand, Cisco Tetration is most compared with VMware NSX, Guardicore Centra, Illumio Adaptive Security Platform, vRealize Network Insight and Prisma Cloud by Palo Alto Networks, whereas Unisys Stealth is most compared with Zscaler Private Access and Okta Workforce Identity.

See our list of best Microsegmentation Software vendors.

We monitor all Microsegmentation Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.