Cisco Secure Workload Reviews
Cisco Secure Workload

Cisco Secure WorkloadFormerly TetrationPricing

Learn More

Cisco Secure Workload Pricing Overview

N/A
Unavailable

What is Cisco Secure Workload?

The Cisco Secure Workload (formerly Tetration) platform offers holistic workload protection for multicloud data centers by enabling a zero-trust model using segmentation. This approach allows users to identify security incidents faster, contain lateral movement, and reduce the attack surface.…

Offerings

  • Does not haveFree Trial
  • Does not haveFree/Freemium Version
  • HasPremium Consulting/Integration Services

Entry-level set up fee?

  • No setup fee

For the latest information on pricing, visit https://www.cisco.com/c/en/us/products/collateral/data-center-analytics/tetration-analytics/datasheet-c78-737256.html#Softwarelicensing

Cisco Secure Workload software is licensed based on the number of workload equivalents or devices (endpoints) depending on the agent or sensor type being used. Telemetry data can be collected using agents, supported by other supported sensors or collectors, in any combination. Policy enforcement is enabled through agents with enforcement capability with infrastructure enforcement delivered through Cisco Secure Firewall Integration, Application Delivery Controllers (ADCs), and Security Groups in public cloud infrastructure or orchestrated via streamed Kafka policy. Workload is defined as a virtual machine, bare-metal server, or container host and includes server and desktop operating systems.

Would you like us to let the vendor know that you want pricing?

Cisco Secure Workload Alternatives Pricing

The following is a quick overview of editions offered by other software in similar categories

GoodAccess

What is GoodAccess?

GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scale. By leveraging a Low-Code/No-Code approach, GoodAccess delivers a hardware-free, rapid deployment…

F5 Distributed Cloud Bot Defense

N/A
Unavailable

What is F5 Distributed Cloud Bot Defense?

F5 Distributed Cloud Bot Defense (formerly Shape Defense, acquired January 2020) provides security to protect a website from bots, fake users, and unauthorized transactions, preventing large scale fraud and eroded user experiences. Companies get visibility, detection and mitigation outcomes to…

GitGuardian Internal Monitoring

What is GitGuardian Internal Monitoring?

GitGuardian Internal Monitoring helps organizations detect and fix vulnerabilities in source code at every step of the software development lifecycle. With GitGuardian’s policy engine, security teams can monitor and enforce rules across their VCS, DevOps tools, and infrastructure-as-code…