When we onboarded Cisco Secure Workload, the usual use case was to discover internal application dependencies and create a dependency map for Cisco ACI. As the network team, we chose to implement ACI in a network-centric mode rather than an application-centric mode. However, we soon realized that Cisco Secure Workload's capabilities extend far beyond discovering dependency maps. We use it for internal micro-segmentation. After evaluating it, we began using the agent-based solution across our server estate to protect our internal servers from each other and internal users. Today, our primary use case for the product is micro-segmentation within our internal network.
We offer this solution to financial institutions. It complements the infrastructure of Cisco, routers, switches, and endpoints. This is part of the suite of solutions that we offer.
Cisco Secure Workload is a cloud and data security solution that offers a zero-trust policy of keeping an organization’s application workloads safe and secure throughout the entire on-premise and cloud data center ecosystems.
Cisco Secure Workload will consistently provide protection by discovering workload process anomalies, stopping threats immediately, minimizing the risk threat surface, and aborting any lateral movement.
Today’s ecosystems are very elastic, and in the...
When we onboarded Cisco Secure Workload, the usual use case was to discover internal application dependencies and create a dependency map for Cisco ACI. As the network team, we chose to implement ACI in a network-centric mode rather than an application-centric mode. However, we soon realized that Cisco Secure Workload's capabilities extend far beyond discovering dependency maps. We use it for internal micro-segmentation. After evaluating it, we began using the agent-based solution across our server estate to protect our internal servers from each other and internal users. Today, our primary use case for the product is micro-segmentation within our internal network.
The solution is used for data communication and consultancy for ECS.
Usually, when somebody has a big Cisco shop, they'll deal with Cisco solutions.
Micro Segmentation is 1 of the important use case which organization go with Cisco ACI for Agentless
They also got Cisco Tetration for Agent based approach
We offer this solution to financial institutions. It complements the infrastructure of Cisco, routers, switches, and endpoints. This is part of the suite of solutions that we offer.
We have many use cases for Cisco Tetration. Examples of this are micro-segmentation and the visibility of applications.
We have an on-premises deployment.
Our primary use case is for process discovery and for the data center.
Our primary use case for the Cisco Tetration solution is for troubleshooting network incidents.
The product is primarily used for automating micro-segmentation.