This has improved our security significantly, from 10% of signature-based technology security to 99.9% of the current one which we are running. We actually switched from legacy signature-based solutions to threat intelligence-based and machine learning-based solutions, which is Cisco Secure. In terms of business, our company feels safer. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP." "Cisco has definitely improved our organization a lot. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. We can use two-factor authentication with another platform, and we can authenticate with two-factor." "The most valuable feature is signature-based malware detection." "Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. Because Secure Endpoint has a connection to it, we get protected by it right then and there." "The VPN is most valuable. On the backend, Talos checks all the signatures, all the malware, and for any attacks going on around the world. It allows for research into a threat, and you can chart your progress on how you're resolving it." "The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great." "Definitely, the best feature for Cisco Secure Endpoint is the integration with Talos. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us." "It is extensive in terms of providing visibility and insights into threats. Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. I can track everything that happens on our server from my PC or device. "appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst.
0 Comments
Leave a Reply. |