Try our new research platform with insights from 80,000+ expert users
Cisco Secure Workload Logo

Cisco Secure Workload Reviews

Vendor: Cisco
4.3 out of 5

What is Cisco Secure Workload?

Featured Cisco Secure Workload reviews

Cisco Secure Workload mindshare

As of July 2025, the mindshare of Cisco Secure Workload in the Cloud and Data Center Security category stands at 13.8%, up from 12.4% compared to the previous year, according to calculations based on PeerSpot user engagement data.
Cloud and Data Center Security

PeerResearch reports based on Cisco Secure Workload reviews

TypeTitleDate
CategoryCloud and Data Center SecurityJul 26, 2025Download
ProductReviews, tips, and advice from real usersJul 26, 2025Download
ComparisonCisco Secure Workload vs Akamai Guardicore SegmentationJul 26, 2025Download
ComparisonCisco Secure Workload vs VMware NSXJul 26, 2025Download
ComparisonCisco Secure Workload vs SentinelOne Singularity Cloud SecurityJul 26, 2025Download
Suggested products
TitleRatingMindshareRecommending
Wiz4.5N/A95%22 interviewsAdd to research
Microsoft Defender for Cloud4.0N/A94%78 interviewsAdd to research
 
 
Key learnings from peers

Valuable Features

Room for Improvement

ROI

Pricing

Popular Use Cases

Service and Support

Deployment

Scalability

Stability

Review data by company size

By reviewers
By visitors reading reviews

Top industries

By visitors reading reviews
Computer Software Company
24%
Manufacturing Company
10%
Financial Services Firm
9%
Government
8%
Insurance Company
6%
Energy/Utilities Company
5%
Healthcare Company
4%
University
3%
Educational Organization
3%
Performing Arts
2%
Comms Service Provider
2%
Hospitality Company
2%
Retailer
2%
Real Estate/Law Firm
2%
Transportation Company
2%
Construction Company
2%
Non Profit
2%
Logistics Company
2%
Legal Firm
1%
Outsourcing Company
1%
Wholesaler/Distributor
1%
Pharma/Biotech Company
1%
Media Company
1%
Recreational Facilities/Services Company
1%
Consumer Goods Company
1%
Aerospace/Defense Firm
1%

Compare Cisco Secure Workload with alternative products

Learn more about Cisco Secure Workload

Cisco Secure Workload customers

Related questions

 

Cisco Secure Workload reviews

Sort by:
Raj Metkar - PeerSpot user
Director, Head of Networks at MUFG, EMEA
Verified user of Cisco Secure Workload
Sep 25, 2024
Discover internal application dependencies and create a dependency map
Torben Nissen Ernst - PeerSpot user
Technical Solutions Architect - Cyber & Cloud Security Expert at Secure Cloud
Verified user of Cisco Secure Workload
Sep 4, 2024
Useful for micro-segmentation and policy creation

Pros

"The only use case I can see that makes sense is micro-segmentation. I think there are other use cases for it. The main purpose of the product is to do micro-segmentation by collecting IP. That could be done by installing an agent, and then you have all the communication coming in and out. You could also use some flow sensors installed in the network that receive a copy of the traffic and then report that back to the system. "

Cons

"There's room for improvement when it comes to Cisco Secure Workload. A couple of internal areas could be refined a little bit. They are trying to solve it, depending on where you suppose the agent is. Suppose you have the agent on both the server and the client, which could be the front-end server or web server connecting to the. In that case, if those two are communicating on RPC, the server can look into its configuration. It could go down and find the configuration file on the FTP server and then set the policies to it. But there are a lot of different FTP servers out there. It's also a complex case for the tool to support all FTP servers. "
Find out what your peers are saying about Cisco Secure Workload. Updated July 2025
863,641 professionals have used our research since 2012.
PeerSpot user
Partner at a consultancy with 1-10 employees
Verified user of Cisco Secure Workload
Apr 25, 2023
A solution that provides good technical support but its high cost makes it challenging for users to adopt it

Pros

"Generally speaking, Cisco support is considered one of the best in the networking products and stack."

Cons

"There was a controversy when Cisco reduced the amount of data they kept, and the solution became quite cost-intensive, which made its adoption challenging….Although they have modified it now, I preferred the previous version, and I wish all the functionality were back under the same product."
Muhammad  Marakkoottathil - PeerSpot user
Regional Presales Consultant (INS Division) at GBM
Verified user of Cisco Secure Workload
Nov 17, 2022
End-to-end offering but dashboard could be more user-friendly

Pros

"Secure Workload's best feature is that it's an end-to-end offering from Cisco."

Cons

"Secure Workload is a little complicated to use, and the dashboard isn't intuitive, so it takes a while to learn how to use it."
SG
Post Sales Manager at Vcom Teachnologies
Verified user of Cisco Secure Workload
Jan 16, 2024
A highly scalable and stable product that enables multiple-device integration and micro-segmentation

Pros

"The product provides multiple-device integration."

Cons

"The product must be integrated with the cloud."
Boris REYES - PeerSpot user
Sales Manager at Compuequip DOS
Verified user of Cisco Secure Workload
Nov 6, 2022
User-friendly with a good UI and helpful support

Pros

"It's stable. "

Cons

"The integration could be better, especially with different types of solutions."
BA
Information Security Engineer at ENEDIS
Verified user of Cisco Secure Workload
Sep 24, 2019
Product version discussed: Tetration-M
A secure and stable solution for our on-premises network analytics

Pros

"The most valuable feature of this solution is security."

Cons

"The interface is really helpful for technical people, but it is not user-friendly."
PeerSpot user
CTO at a tech vendor with 11-50 employees
Verified user of Cisco Secure Workload
Sep 30, 2021
Product version discussed: 3
A solution with a straightforward setup, offering 100% telemetry coverage and good machine learning

Pros

"The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network. "

Cons

"The multi-tenancy, redundancy, backup and restore functionalities, as well as the monitoring aspects of the solution, need improvement. The solution offers virtually no enterprise-grade possibility for monitoring. "