Cisco Tetration Customer Research
What is the functionality you use most?
Application Dependency mapping & Policy Generation |
|
|
Flow Search |
|
|
Forensics |
|
|
Migration |
|
|
Policy analysis & enforcement |
|
|
Vulnerability Assessment |
|
4 Published TechFacts
2 Published Charts
Cisco Tetration Customer Testimonial
Tetration has made us more aware of assets on our network that we never knew we had. After working through iterations of our scope tree and utilizing the orchestrators within Tetration to pull vSphere tagging, we are able to clearly identify our applications. As all of our workloads have been clearly identified, we’re able to better isolate workloads with vulnerabilities and take action as needed.
Tetration has also assisted with our server procurement process by identifying servers that had been forgotten.
— IT Systems Analyst, Large Enterprise Healthcare Company
Cisco Web Security Website Cisco Website