TechValidate Research on Cisco Web Security

These pages present data that TechValidate has sourced via direct research with verified customers and users of Cisco Web Security. TechValidate stands behind the authenticity of all published data. Learn more »



4 Published TechFacts

2 Published Charts



Selected Research Highlights


Cisco Tetration Customer Testimonial

Before Tetration, we didn’t have the viability to correctly identify application dependency traffic in order to create segmentation policies. By using the Tetration tool we were able to gain that visibility and test the effectiveness of segmentation (enforcement) policies before applying the Host-based firewall policies via Tetration. We have applied this segmentation now to 20 of our 130 applications.

IT Architect, S&P 500 Aerospace & Defense Company

Cisco Tetration Customer Statistic

67% of surveyed customers report that Tetration effectively helped them implement workload security without disrupting their business.

67%

Cisco Tetration Customer Research

What is the functionality you use most?

Application Dependency mapping & Policy Generation
83%
Flow Search
83%
Forensics
33%
Migration
33%
Policy analysis & enforcement
33%
Vulnerability Assessment
33%

Cisco Tetration Customer Research

Are you using currently Tetration as SaaS or On-Prem?

On-prem: 86%
SaaS: 14%


More to Explore



About Cisco Web Security

Cisco Web Security Appliance (WSA), powered by Cisco Talos, protects you by automatically blocking risky sites and testing unknown sites before allowing users to link to them, helping with compliance.

Cisco Web Security Website   Cisco Website