Because Secure Endpoint has a connection to it, we get protected by it right then and there." On the backend, Talos checks all the signatures, all the malware, and for any attacks going on around the world. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us." "Definitely, the best feature for Cisco Secure Endpoint is the integration with Talos. Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. I can track everything that happens on our server from my PC or device. It should protect all kinds of things that might happen on the servers, things that I cannot see." "appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst. We're able to dig in and really understand how things came to be and where to focus our efforts." "I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. Once a threat was detected, being able to do the threat lookups and the live tracking was really useful." "Device Trajectory is one of the most valuable features. We had Umbrella in place and we were using Anåonnect as well as Firepower. So, it's protecting us very well from a lot of hackers, malware, and especially ransomware." "The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices." "It's quite simple, and the advantage I see is that I get the trajectory of what happened inside the network, how a file has been transmitted to the workstation, and which files have got corrupted." "The integration with other Cisco products seemed to be really effective. "The most valuable feature at this moment is that Cisco AMP or Cisco Secure Endpoint solution is delivering a lot of things, and I always say to a lot of customers that if we didn't have Cisco AMP, we probably would have had ransomware somewhere.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |