TechValidate Research on Cisco Web Security


Cisco Tetration Customer Research

What is the functionality you use most?

Application Dependency mapping & Policy Generation
83%
Flow Search
83%
Forensics
33%
Migration
33%
Policy analysis & enforcement
33%
Vulnerability Assessment
33%




About This Data

This data was sourced directly from verified users of Cisco Web Security by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.

Respondent Details


More Research on Cisco Web Security