![]() ![]() ![]() ![]() We can get to it from anywhere, which is really helpful. In addition, they do traditional signature and heuristic detection a lot better than Microsoft and some other players in that space." "Being able to cloud manage it from just a cloud login is valuable. "Provides successful ransomware shut down operations." "I was very satisfied with Malwarebytes in terms of its antivirus abilities." "When it comes to frontend protections, it has some of the best definitions. It should protect all kinds of things that might happen on the servers, things that I cannot see." It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP." "The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great." "I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. Once a threat was detected, being able to do the threat lookups and the live tracking was really useful." "Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. We had Umbrella in place and we were using Anåonnect as well as Firepower. "The biggest lesson that I have learned from using this product is that there is a lot more malware slipping through my email filters than I expected." "The most valuable feature is signature-based malware detection." "It's quite simple, and the advantage I see is that I get the trajectory of what happened inside the network, how a file has been transmitted to the workstation, and which files have got corrupted." "The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices." "The integration with other Cisco products seemed to be really effective. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |