![]() ![]()
We think that Cisco covers all of the security aspects on the market. SYMANTEC ENDPOINT PROTECTION CLOUD EXCLUSIONS LICENSEInstead of paying a license for one computer, I have to license two computers until I manually go in, search for all the duplicate entries, and clean them out myself." "We don't have issues. SYMANTEC ENDPOINT PROTECTION CLOUD EXCLUSIONS UPGRADEIf you have a computer and you upgrade from Windows 7 to Windows 10, or you upgrade your agent from version 6 to 7, it creates a new instance in there instead of updating the information. That way you could get a more accurate device count, so you're not having an inflated number." "It could be improved in connection with artificial intelligence and IoT." "The GUI needs improvement, it's not good." "The thing I hate the most, which they have not fixed, is when it creates duplicate entries within a console. Cisco should understand the need for continuous updates on the custom Cisco exclusions and the custom applications that come out-of-the-box with the AMP for Endpoints." "An easier way to do deduplication of machines, or be alerted to the fact that there's more than one instance of a machine, would be useful. The tool also caused CPU spikes on our production machine, and we were seriously considering moving to another product." "We had a lot of noise at the beginning, and we had to turn it down based on exclusions, application whitelisting, and excluding unknown benign applications. We didn't like that as we always want a solution that can fit smoothly into the setup without causing problems, especially where security is concerned. ![]() ![]() Eventually, we had to shut down the Exploit Prevention system. We didn't find a fix during troubleshooting, and Cisco couldn't offer one either. The Linux agent has conflicts with other solutions, including the Exploit Prevention system found in Windows servers. SYMANTEC ENDPOINT PROTECTION CLOUD EXCLUSIONS OFFLINE"The Linux agent is a simple offline classic agent, and it doesn't support Secure Boot, which is important to have on a Linux machine. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us." Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. SYMANTEC ENDPOINT PROTECTION CLOUD EXCLUSIONS PCI can track everything that happens on our server from my PC or device. It should protect all kinds of things that might happen on the servers, things that I cannot see." "appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst. Because Secure Endpoint has a connection to it, we get protected by it right then and there." "I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. On the backend, Talos checks all the signatures, all the malware, and for any attacks going on around the world. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP." "Definitely, the best feature for Cisco Secure Endpoint is the integration with Talos. ![]() It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. We're able to dig in and really understand how things came to be and where to focus our efforts." "Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. It allows for research into a threat, and you can chart your progress on how you're resolving it." "Device Trajectory is one of the most valuable features. "The most valuable feature is signature-based malware detection." "The biggest lesson that I have learned from using this product is that there is a lot more malware slipping through my email filters than I expected." "It is extensive in terms of providing visibility and insights into threats. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |