Try our new research platform with insights from 80,000+ expert users
Cisco Secure Workload Logo

Cisco Secure Workload pros and cons

Vendor: Cisco
4.3 out of 5
873 followers
Post review

Pros & Cons summary

Buyer's Guide

Get pricing advice, tips, use cases and valuable features from real users of this product.
Get the report

Prominent pros & cons

PROS

Cisco Secure Workload provides enhanced visibility into network activities, ensuring comprehensive security measures are enforceable.
It offers micro-segmentation, significantly improving the handling of network traffic and visibility.
Cisco Secure Workload supports scalability as a notable feature, accommodating growing network demands seamlessly.
It eliminates the need for manual checks of control lists by offering direct auditor access to dashboards, vastly saving time.
The platform ensures 100% telemetry coverage, offering non-intermittent, complete insights into network and endpoint activities.

CONS

Cisco Secure Workload is only available on Cisco devices, limiting its scalability.
High initial hardware investment and cost due to the need for extensive storage and computing power present a price point issue.
Email notifications are either hard to find or unavailable, and search capabilities need improvement.
Documentation for advanced features is basic, with room for better integration with other applications.
Monitoring, multi-tenancy, redundancy, backup, and restore functionalities require significant improvements.
 

Cisco Secure Workload Pros review quotes

Torben Nissen Ernst - PeerSpot reviewer
Apr 25, 2024
The only use case I can see that makes sense is micro-segmentation. I think there are other use cases for it. The main purpose of the product is to do micro-segmentation by collecting IP. That could be done by installing an agent, and then you have all the communication coming in and out. You could also use some flow sensors installed in the network that receive a copy of the traffic and then report that back to the system.
it_user1045743 - PeerSpot reviewer
May 28, 2019
A complete and powerful micro-segmentation solution.
BA
Sep 24, 2019
The most valuable feature of this solution is security.
Learn what your peers think about Cisco Secure Workload. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,053 professionals have used our research since 2012.
reviewer2163369 - PeerSpot reviewer
Apr 24, 2023
Generally speaking, Cisco support is considered one of the best in the networking products and stack.
KP
Apr 13, 2020
The most valuable feature is micro-segmentation, which is the most important with respect to visibility.
RR
Oct 24, 2018
By using Tetration insight, we are able to get the latency on our level accounts and we can determine whatever the issue is with the application latency itself.
FH
Feb 3, 2019
Instead of proving that all the access control lists are in place and all the EPGs are correct, we can just point the auditor to a dashboard and point out that there aren't any escaped conversations. It saves an enormous, enormous amount of time.
NetworkEfaaf - PeerSpot reviewer
Jun 19, 2019
The product offers great visibility into the network so we can enforce security measures.
Boris REYES - PeerSpot reviewer
Oct 25, 2022
It's stable.
reviewer1037232 - PeerSpot reviewer
Sep 30, 2021
The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network.
 

Cisco Secure Workload Cons review quotes

Torben Nissen Ernst - PeerSpot reviewer
Apr 25, 2024
There's room for improvement when it comes to Cisco Secure Workload. A couple of internal areas could be refined a little bit. They are trying to solve it, depending on where you suppose the agent is. Suppose you have the agent on both the server and the client, which could be the front-end server or web server connecting to the. In that case, if those two are communicating on RPC, the server can look into its configuration. It could go down and find the configuration file on the FTP server and then set the policies to it. But there are a lot of different FTP servers out there. It's also a complex case for the tool to support all FTP servers.
it_user1045743 - PeerSpot reviewer
May 28, 2019
It has an uninviting interface.
BA
Sep 24, 2019
The interface is really helpful for technical people, but it is not user-friendly.
Learn what your peers think about Cisco Secure Workload. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,053 professionals have used our research since 2012.
reviewer2163369 - PeerSpot reviewer
Apr 24, 2023
There was a controversy when Cisco reduced the amount of data they kept, and the solution became quite cost-intensive, which made its adoption challenging….Although they have modified it now, I preferred the previous version, and I wish all the functionality were back under the same product.
KP
Apr 13, 2020
There is some overlap between Cisco Tetration and AppDynamics and I need to have a single pane of glass, rather than have to jump between different tools.
RR
Oct 24, 2018
It is highly scalable, but there is a limitation that it is only available on Cisco devices.
FH
Feb 3, 2019
They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem. The issue with the price comes from the fact that you have to have it with enormous storage and enormous computes.
NetworkEfaaf - PeerSpot reviewer
Jun 19, 2019
The emailed notifications are either hard to find or they are not available. Search capabilities can be improved.
Boris REYES - PeerSpot reviewer
Oct 25, 2022
The integration could be better, especially with different types of solutions.
reviewer1037232 - PeerSpot reviewer
Sep 30, 2021
The multi-tenancy, redundancy, backup and restore functionalities, as well as the monitoring aspects of the solution, need improvement. The solution offers virtually no enterprise-grade possibility for monitoring.