TechValidate Research on Cisco Web Security

These pages present data that TechValidate has sourced via direct research with verified customers and users of Cisco Web Security. TechValidate stands behind the authenticity of all published data. Learn more »



4 Published TechFacts

2 Published Charts



Selected Research Highlights


Cisco Tetration Customer Statistic

67% of surveyed customers report that Tetration effectively helped them implement workload security without disrupting their business.

67%

Cisco Tetration Customer Research

What is the functionality you use most?

Application Dependency mapping & Policy Generation
83%
Flow Search
83%
Forensics
33%
Migration
33%
Policy analysis & enforcement
33%
Vulnerability Assessment
33%

Cisco Tetration Customer Testimonial

Tetration has made us more aware of assets on our network that we never knew we had. After working through iterations of our scope tree and utilizing the orchestrators within Tetration to pull vSphere tagging, we are able to clearly identify our applications. As all of our workloads have been clearly identified, we’re able to better isolate workloads with vulnerabilities and take action as needed.

Tetration has also assisted with our server procurement process by identifying servers that had been forgotten.

IT Systems Analyst, Large Enterprise Healthcare Company

Cisco Tetration Customer Research

Are you using currently Tetration as SaaS or On-Prem?

On-prem: 86%
SaaS: 14%


More to Explore



About Cisco Web Security

Cisco Web Security Appliance (WSA), powered by Cisco Talos, protects you by automatically blocking risky sites and testing unknown sites before allowing users to link to them, helping with compliance.

Cisco Web Security Website   Cisco Website