Cisco Tetration dramatically simplifies your zero-trust operations. Using behavior-based application insight and machine learning, it allows customers to build dynamic segmentation policy models and automate policy enforcement. Its infrastructure agnostic approach supports both on-premise and public cloud workloads.
Collects meta data from every packet and every flow along with process information. Using a unique indexing approach, search and explore tens of billions of flow records with natural-language techniques. Get actionable insight in less than a second.
Get real-time telemetry data from application components and use behavior-analysis algorithms. Identify application groups and their communication patterns and service dependencies. Get automated whitelist policy for segmentation anywhere.
Enforce consistent policy across on-premises data centers and public and private clouds to enable application segmentation. Continuously monitor for compliance deviations and identify them in minutes in your production network.
Easily create your own custom apps on the platform by using comprehensive, detailed telemetry data in the data lake. Receive out-of-box notification or generate your own custom notifications. Allow querying information using RESTful API.
Platform designed to support any data center infrastructure at scale. Analyzes millions of events per second and provides actionable insight near real-time. Retain and search billions of records long term without loss of granularity.
Choose Tetration-M (8 RU) appliance for up to 4000 workloads, a larger Tetration platform (39 RU) for up to 12,000 workloads, or a virtual appliance form factor running on Amazon AWS for up to 1,000 workloads.
Cisco Services help you quickly achieve value and gain the benefits of comprehensive adoption and optimized policies.
Tom Edsall, GM and SVP of Insieme Business Unit, discusses new features.
Experts cover the solution architecture and then walk through a technical demo.
See how Tetration uses telemetry, maps app dependencies and recommends whitelist policy.
Understand how sensors are used for telemetry, app behavior analysis, and enforcement.
IDC reveals the results that we’ve achieved using Tetration in our data centers.