TechValidate Research on Cisco Web Security


Cisco Tetration Customer Testimonial

Tetration has made us more aware of assets on our network that we never knew we had. After working through iterations of our scope tree and utilizing the orchestrators within Tetration to pull vSphere tagging, we are able to clearly identify our applications. As all of our workloads have been clearly identified, we’re able to better isolate workloads with vulnerabilities and take action as needed.

Tetration has also assisted with our server procurement process by identifying servers that had been forgotten.

IT Systems Analyst, Large Enterprise Healthcare Company





About This Data

This data was sourced directly from a verified user of Cisco Web Security by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on Cisco Web Security