![]() ![]() The tool also caused CPU spikes on our production machine, and we were seriously considering moving to another product." "Its price is okay for us, but it can always be better. We didn't like that as we always want a solution that can fit smoothly into the setup without causing problems, especially where security is concerned. Eventually, we had to shut down the Exploit Prevention system. We didn't find a fix during troubleshooting, and Cisco couldn't offer one either. ![]() The Linux agent has conflicts with other solutions, including the Exploit Prevention system found in Windows servers. That would definitely be a big step." "The Linux agent is a simple offline classic agent, and it doesn't support Secure Boot, which is important to have on a Linux machine. I have full trust in the new 3000 series of firewalls where we would also be able to look more into the traffic that we're monitoring and get more security layers in our services. They continue to innovate in the right way." "On the firewall level, they were lagging a little bit behind, but they are running up again. We think that Cisco covers all of the security aspects on the market. When I open the dashboard right now, I see a million things and they are not always the things that I need." "The GUI needs improvement, it's not good." "We don't have issues. "They could improve the main dashboard to more clearly show me the things that I want to see. More Webroot Business Endpoint Protection Pros → It has been a low-resource tool and the continuous updates in the past have made it attractive from the standpoint of the trust level on the protection." "Probably, compared to other antivirus programs, what we like about it is it is lightweight." "They have a lot of features integrated from way back, which shows that the product developers know exactly what they're doing." "The solution is very simple and straightforward to use." McAfee and Norton use a lot of resources." "Its ease of installation is valuable. It doesn't take over the system like McAfee or Norton. It is very easy to define and set the policies based on the user groups, it does not take up a lot of resources in operation, and has provided us with a good track record of protection." "Webroot's tech support is pretty good they've given me some pointers." "Doesn't consume resources or affect the computer performance at all." "It is pretty unintrusive. It allows for research into a threat, and you can chart your progress on how you're resolving it." So, it's protecting us very well from a lot of hackers, malware, and especially ransomware." "It is extensive in terms of providing visibility and insights into threats. We can use two-factor authentication with another platform, and we can authenticate with two-factor." "The most valuable feature at this moment is that Cisco AMP or Cisco Secure Endpoint solution is delivering a lot of things, and I always say to a lot of customers that if we didn't have Cisco AMP, we probably would have had ransomware somewhere. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us." "The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great." "The VPN is most valuable. Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. I can track everything that happens on our server from my PC or device. ![]() I found that quite good." "appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst. It has behavioral analytics, so you can be more proactive toward zero-day threats. "The biggest lesson that I have learned from using this product is that there is a lot more malware slipping through my email filters than I expected." "The most valuable feature is signature-based malware detection." "The best feature that we found most valuable, is actually the security product for the endpoint, formerly known as AMP. ![]()
0 Comments
Leave a Reply. |