TechValidate Research on Cisco Web Security


Cisco Tetration Customer Testimonial

Before Tetration, we didn’t have the viability to correctly identify application dependency traffic in order to create segmentation policies. By using the Tetration tool we were able to gain that visibility and test the effectiveness of segmentation (enforcement) policies before applying the Host-based firewall policies via Tetration. We have applied this segmentation now to 20 of our 130 applications.

IT Architect, S&P 500 Aerospace & Defense Company





About This Data

This data was sourced directly from a verified user of Cisco Web Security by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on Cisco Web Security