Cisco Cisco Tetration Analytics G1 Data Sheet

Page of 10
 
 
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. 
Page 1 of 10 
Data Sheet 
Cisco Tetration Analytics 
The Cisco Tetration Analytics
™ 
platform simplifies implementation of a secure 
zero-trust model in an application-centric world using pervasive visibility and 
behavior-based application insight. 
Product Overview 
Applications are driving data center infrastructure today. Applications are dynamic, with virtualization, 
containerized, and workload mobility technologies, and with constantly changing communication patterns between 
application components. Because of these technology advancements, 76 percent of data center traffic is east-west 
traffic
. In addition, today’s data centers demand a hyper-available network with no scheduled downtime. This 
dynamic environment contributes to three main challenges: 
● 
The need for pervasive visibility of traffic across the entire data center infrastructure, including servers and 
extending all the way to processes 
● 
The need to understand communications and dependencies for all applications in the data center 
● 
The need to implement a secure zero-trust using whitelist policy model in a heterogeneous network 
environment  
The new Cisco Tetration Analytics platform is designed to address these challenges through comprehensive traffic 
telemetry collection and advanced analytics using an algorithmic approach. The platform is designed to collect 
telemetry information at line rate at data center scale. The algorithmic approach includes unsupervised machine-
learning techniques and behavioral analysis, providing a turn-key solution. This solution is designed to: 
● 
Process millions of flow events per second, apply intelligent algorithms, and provide actionable insights in 
minutes 
● 
Capture and store hundreds of billions of telemetry records without aggregation to enable long-term 
forensics analysis 
● 
Provide complete visibility into application components, communications, and dependencies to enable 
implementation of a zero-trust model in the network 
Cisco Tetration
 telemetry information is collected using sensors. Two types of sensors are used: hardware 
sensors and software (host) sensors. With these two types of sensors, this platform is designed to support both 
existing (brownfield) and new (greenfield) data center infrastructure.