It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP." "Device Trajectory is one of the most valuable features. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. Once a threat was detected, being able to do the threat lookups and the live tracking was really useful." "Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. We had Umbrella in place and we were using Anåonnect as well as Firepower. Because Secure Endpoint has a connection to it, we get protected by it right then and there." "The integration with other Cisco products seemed to be really effective. On the backend, Talos checks all the signatures, all the malware, and for any attacks going on around the world. So, it's protecting us very well from a lot of hackers, malware, and especially ransomware." "Definitely, the best feature for Cisco Secure Endpoint is the integration with Talos. It allows for research into a threat, and you can chart your progress on how you're resolving it." "The most valuable feature at this moment is that Cisco AMP or Cisco Secure Endpoint solution is delivering a lot of things, and I always say to a lot of customers that if we didn't have Cisco AMP, we probably would have had ransomware somewhere. "It is extensive in terms of providing visibility and insights into threats.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |