BITDEFENDER VS MCAFEE UPGRADEIf you have a computer and you upgrade from Windows 7 to Windows 10, or you upgrade your agent from version 6 to 7, it creates a new instance in there instead of updating the information. "It could be improved in connection with artificial intelligence and IoT." "This product has issues with the number of false positives that it reports." "The thing I hate the most, which they have not fixed, is when it creates duplicate entries within a console. It should protect all kinds of things that might happen on the servers, things that I cannot see." Because Secure Endpoint has a connection to it, we get protected by it right then and there." "The entirety of our network infrastructure is Cisco and the most valuable feature is the integration." "I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. On the backend, Talos checks all the signatures, all the malware, and for any attacks going on around the world. We're able to dig in and really understand how things came to be and where to focus our efforts." "Definitely, the best feature for Cisco Secure Endpoint is the integration with Talos. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us." "Device Trajectory is one of the most valuable features. Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. BITDEFENDER VS MCAFEE PCI can track everything that happens on our server from my PC or device. Once a threat was detected, being able to do the threat lookups and the live tracking was really useful." "The most valuable feature is signature-based malware detection." "appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst. We had Umbrella in place and we were using Anåonnect as well as Firepower. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP." "The integration with other Cisco products seemed to be really effective. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. "Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |