Cisco Tetration platform
        Security use cases
                                                                                       Advanced security
                                                                                                           Software
                                                                               Process security
                                                                                                           inventory baseline
                                                                                         Segmentation
                                                                                             Application                  Policy
                                                                 Whitelist policy
                                                                                             segmentation                 compliance
           Cisco Tetration                                                                   Insights
                                                                 Visibility and              Process inventory            Application insight
                                                                 forensics