Cisco Secure Workload vs. Unisys Stealth
Cisco Secure Workload vs. Unisys Stealth
Product | Rating | Most Used By | Product Summary | Starting Price |
---|---|---|---|---|
Cisco Secure Workload | N/A | The Cisco Secure Workload (formerly Tetration) platform offers holistic workload protection for multicloud data centers by enabling a zero-trust model using segmentation. This approach allows users to identify security incidents faster, contain lateral movement, and reduce the attack surface. Tetration's infrastructure-agnostic approach supports both on-premises and public cloud workloads. | N/A | |
Unisys Stealth | N/A | Unisys offers the Stealth product cybersecurity and software-defined microsegmentation suite providing zero trust network access, designed to protect the enterprise network, cloud services, and data via cloaking and encryption, provide network visibility, and also provide detection and correlation for advanced threat prevention. | N/A |
Cisco Secure Workload | Unisys Stealth | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Editions & Modules | No answers on this topic | No answers on this topic | ||||||||||||||
Offerings |
| |||||||||||||||
Entry-level Setup Fee | No setup fee | No setup fee | ||||||||||||||
Additional Details | Cisco Secure Workload software is licensed based on the number of workload equivalents or devices (endpoints) depending on the agent or sensor type being used. Telemetry data can be collected using agents, supported by other supported sensors or collectors, in any combination. Policy enforcement is enabled through agents with enforcement capability with infrastructure enforcement delivered through Cisco Secure Firewall Integration, Application Delivery Controllers (ADCs), and Security Groups in public cloud infrastructure or orchestrated via streamed Kafka policy. Workload is defined as a virtual machine, bare-metal server, or container host and includes server and desktop operating systems. | — | ||||||||||||||
More Pricing Information |
Cisco Secure Workload | Unisys Stealth | |
---|---|---|
Top Pros | No answers on this topic | |
Top Cons |
| No answers on this topic |
Cisco Secure Workload | Unisys Stealth | |
---|---|---|
Small Businesses | No answers on this topic | ThreatLocker Score 9.0 out of 10 |
Medium-sized Companies | No answers on this topic | Palo Alto Networks Prisma Access Score 8.7 out of 10 |
Enterprises | No answers on this topic | Palo Alto Networks Prisma Access Score 8.7 out of 10 |
All Alternatives | View all alternatives | View all alternatives |
Cisco Secure Workload | Unisys Stealth | |
---|---|---|
ScreenShots | Cisco Secure Workload Screenshots |