Compare Cisco Tetration Analytics to Illumio Core
Illumio Core (formerly ASP) delivers live visibility and adaptive segmentation that works on anything (virtual machines, bare-metal, and containers), anywhere (data center, private or public cloud) by activating and centrally managing the native security controls in the workload. Illumio does this for the world’s largest, most demanding computing environments with no dependency on the network or hypervisor.
https://www.illumio.com/resource-center/guide-comparing-illumio-asp-and-cisco-tetration-analytics

Capabilities
Capabilities
CISCO TETRATION ANALYTICS
ILLUMIO CORE
Primary Use Case
Analytics
VISIBILITY
Live visibility into application components, communications, and dependencies across any data center and cloud
Automatic generation of the application dependency map
Visibility aids the development and monitoring of micro-segmentation policy
Visualizes over 2000 concurrent workloads in an application dependency map
Real-time vulnerability map to understand potential attack paths and visualize which applications connect on vulnerable ports
Calculates exposure scores to quantify how many upstream workloads can potentially exploit vulnerabilites on any workload
Role-based views (e.g., by application owner, location)
Network performance monitoring
SEGMENTATION
Macro-segmentation (geo, environment, zone)
Micro-segmentation (application, application tier, workload)
Nano-segmentation (port/protocol, container)
Process-based segmentation for dynamic port applications (e.g., Domain Controller)
Encrypts data in transit between workloads
Automatically generates micro-segmenation policy to constrain or block vulnerabilities
SECURITY POLICY MODEL
Strict allowlist "Zero Trust" policy model
Automatic policy generation
Automatically generate policies for an application in just seconds
(takes 2 min - 12 hours)
Build and test policies before enforcement
Policy template library (e.g., Domain Controller, Sharepoint, etc.)
Any new workload from anywhere automatically inherit policy
Incorporates user identity in the security policy
Integrate with 3rd party vulnerability data for vulnerability-based security policy
SCALE & AVAILABILITY
Scales to 5,000 workloads (servers required for redundant policy controller)
(6 servers)
Scales to 10,000 workloads (servers required for redundant policy controller)
(36 servers)
Scales to 25,000 workloads (servers required for redundant policy controller)
(36 servers)
Scales greater than 25,000 workloads (servers required for redundant policy controller)
High availability and policy management across geographies