Other then providing micro segmentation capabilities the dashboard provides all required information in single windows for configured workload. With insight feature we even get process/file/hash/vulnerabilities details. Integration with Vulnerability management solutions even give capabilities to block or quarantine machine based on policy such as particular CVE
The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network.
Cisco Secure Workload offers advanced auditing, micro-segmentation, and network visibility, automating policy presentation for improved security. It enhances application dependency mapping and provides comprehensive telemetry with strategic policy enforcement.Cisco Secure Workload specializes in automating micro-segmentation, data center management, and traffic analysis. Its capabilities facilitate application dependency mapping and enhance internal micro-segmentation, providing invaluable...
The product provides multiple-device integration.
Generally speaking, Cisco support is considered one of the best in the networking products and stack.
It's stable.
Other then providing micro segmentation capabilities the dashboard provides all required information in single windows for configured workload. With insight feature we even get process/file/hash/vulnerabilities details. Integration with Vulnerability management solutions even give capabilities to block or quarantine machine based on policy such as particular CVE
The most valuable feature is micro-segmentation, which is the most important with respect to visibility.
The most valuable feature of this solution is security.
The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network.
The product offers great visibility into the network so we can enforce security measures.
The most valuable feature of the solution is that we don't have to do packet captures on the network.
A complete and powerful micro-segmentation solution.