I'm glad that the ransomware solution is built into it. You don't have to really manage or update the signature." "Technical support is good." "I like the fact that it has the ransomware solution in there. Easy to deploy, comes with updates, and comes with Windows updates. Overall, it has all the features that we need. "The antivirus features are very useful." "I like that it's easy to deploy because it already comes with Windows 10. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems." "The entirety of our network infrastructure is Cisco and the most valuable feature is the integration." You don't want to be spending time working out how to block something. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This helps you understand and nail down what the threat is and how to fix it." "The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices." "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. Therefore, it gives you great detail, a timeline, and continuity of events leading up to whatever the incident is, and then, after. Then, after the event, something else was launched by whatever the threat was. For example, you have the event, but you see that the event was launched by Google Chrome, which was launched by something else. You can see what other applications were incorporated into the execution of the threat. You can see what happened after the threat. You can get onto the device trajectory to look at a threat, but you can also see what happened prior to the threat. We're able to dig in and really understand how things came to be and where to focus our efforts." "The visibility and insight this solution gives you into threats is pretty granular. This is what makes the solution a valuable tool as far as I'm concerned." "The most valuable feature is signature-based malware detection." "Device Trajectory is one of the most valuable features. You still have the ability to manage and remediate things. No matter where the device is, AMP has still got coverage on it and is protecting it. You get protection and reporting with it. AMP will work anywhere in the world, as long as it has an Internet connection. You don't have to be VPNed into the environment for AMP to work. It doesn't matter where the device is in regards to whether it's inside or outside of your network environment, especially right now when everybody's remote and taken their laptops home. And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source." "One of the best features of AMP is its cloud feature. "Among the most valuable features are the exclusions.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |