Eset business endpoint security5/31/2023 ![]() ![]() This has improved our security significantly, from 10% of signature-based technology security to 99.9% of the current one which we are running. We actually switched from legacy signature-based solutions to threat intelligence-based and machine learning-based solutions, which is Cisco Secure. In terms of business, our company feels safer. ![]() So, it's protecting us very well from a lot of hackers, malware, and especially ransomware." "Cisco has definitely improved our organization a lot. I found that quite good." "The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices." "The most valuable feature at this moment is that Cisco AMP or Cisco Secure Endpoint solution is delivering a lot of things, and I always say to a lot of customers that if we didn't have Cisco AMP, we probably would have had ransomware somewhere. It has behavioral analytics, so you can be more proactive toward zero-day threats. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP." "The best feature that we found most valuable, is actually the security product for the endpoint, formerly known as AMP. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It should protect all kinds of things that might happen on the servers, things that I cannot see." "Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. ![]() Because Secure Endpoint has a connection to it, we get protected by it right then and there." "I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. ![]() On the backend, Talos checks all the signatures, all the malware, and for any attacks going on around the world. "Definitely, the best feature for Cisco Secure Endpoint is the integration with Talos. ![]()
0 Comments
Leave a Reply. |