Software Secure Workload
Activity Configure

Get Started with Cisco Secure Workload

Last updated: Jun 09, 2025

Get Started with Cisco Secure Workload

Today’s networks include applications running in a hybrid multicloud environment that uses bare metal, virtualization, and cloud-based and container-based workloads. The key challenge in such an environment is improving application and data security without compromising on agility. Cisco Secure Workload provides comprehensive workload protection by bringing security closer to applications and tailoring the security posture that is based on the application behavior. Secure Workload achieves this tailoring by using advanced machine learning and behavior analysis techniques. It provides a ready-to-use solution to support the following security use cases:

  • Implement a zero-trust model with microsegmentation policies that allow only traffic that is required for business purposes.

  • Identify anomalies on workloads using behavioral baselining and analysis.

  • Detect Common Vulnerabilities and Exposures in the software packages that are installed on the servers.

  • Recommend quarantining of servers if vulnerabilities persist after enforcing policies and blocking communication.

Workloads and IP Addresses in Secure Workload

In Cisco Secure Workload, a workload can be an agent workload (software agents installed on hosts or workloads) or an agentless cloud workload (cloud connectors-Azure, AWS or GCP). IP addresses refer to the IPs that are not associated with agent workloads or agentless cloud workloads.


 

Due to recent GUI updates, some of the images or screenshots used in the user guide may not fully reflect the current design of the product. We recommend using this guide in conjunction with the latest version of the software for the most accurate visual reference.


 

To view the End User License Agreement and Supplemental End User License Agreement for your product, see End User License Agreement and Supplemental End User License Agreements.