![]() We can use two-factor authentication with another platform, and we can authenticate with two-factor." It allows for research into a threat, and you can chart your progress on how you're resolving it." "The VPN is most valuable. Because Secure Endpoint has a connection to it, we get protected by it right then and there." "It is extensive in terms of providing visibility and insights into threats. On the backend, Talos checks all the signatures, all the malware, and for any attacks going on around the world. We were happy." "The most valuable feature is signature-based malware detection." "Definitely, the best feature for Cisco Secure Endpoint is the integration with Talos. This has improved our security significantly, from 10% of signature-based technology security to 99.9% of the current one which we are running. ![]() We actually switched from legacy signature-based solutions to threat intelligence-based and machine learning-based solutions, which is Cisco Secure. ![]() In terms of business, our company feels safer. I found that quite good." "It's quite simple, and the advantage I see is that I get the trajectory of what happened inside the network, how a file has been transmitted to the workstation, and which files have got corrupted." "Cisco has definitely improved our organization a lot. It has behavioral analytics, so you can be more proactive toward zero-day threats. We're able to dig in and really understand how things came to be and where to focus our efforts." "The best feature that we found most valuable, is actually the security product for the endpoint, formerly known as AMP. "Device Trajectory is one of the most valuable features.
0 Comments
Leave a Reply. |