"We had certain compliance and usage issues. We're able to dig in and really understand how things came to be and where to focus our efforts." "The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices." Once a threat was detected, being able to do the threat lookups and the live tracking was really useful." "Device Trajectory is one of the most valuable features. We had Umbrella in place and we were using Anåonnect as well as Firepower. It allows for research into a threat, and you can chart your progress on how you're resolving it." "The integration with other Cisco products seemed to be really effective. It should protect all kinds of things that might happen on the servers, things that I cannot see." "It is extensive in terms of providing visibility and insights into threats. Because Secure Endpoint has a connection to it, we get protected by it right then and there." "The most valuable feature is signature-based malware detection." "I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. On the backend, Talos checks all the signatures, all the malware, and for any attacks going on around the world. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us." "Definitely, the best feature for Cisco Secure Endpoint is the integration with Talos. Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. I can track everything that happens on our server from my PC or device. "appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |