Cisco Tetration Customer Research
What is the functionality you use most?
Application Dependency mapping & Policy Generation |
|
|
Flow Search |
|
|
Forensics |
|
|
Migration |
|
|
Policy analysis & enforcement |
|
|
Vulnerability Assessment |
|
4 Published TechFacts
2 Published Charts
Cisco Tetration Customer Testimonial
Before Tetration, we didn’t have the viability to correctly identify application dependency traffic in order to create segmentation policies. By using the Tetration tool we were able to gain that visibility and test the effectiveness of segmentation (enforcement) policies before applying the Host-based firewall policies via Tetration. We have applied this segmentation now to 20 of our 130 applications.
— IT Architect, S&P 500 Aerospace & Defense Company
Cisco Web Security Website Cisco Website