![]() ![]() It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. This is what makes the solution a valuable tool as far as I'm concerned." "Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. You still have the ability to manage and remediate things. No matter where the device is, AMP has still got coverage on it and is protecting it. You get protection and reporting with it. AMP will work anywhere in the world, as long as it has an Internet connection. You don't have to be VPNed into the environment for AMP to work. It doesn't matter where the device is in regards to whether it's inside or outside of your network environment, especially right now when everybody's remote and taken their laptops home. It's one of the best features." "One of the best features of AMP is its cloud feature. This helps you understand and nail down what the threat is and how to fix it." "If somebody has been compromised, the question always is: How has it affected other devices in the network? Cisco AMP gives you a very neat view of that." "The most valuable feature is signature-based malware detection." "The solution's integration capabilities are excellent. Therefore, it gives you great detail, a timeline, and continuity of events leading up to whatever the incident is, and then, after. Then, after the event, something else was launched by whatever the threat was. ![]() For example, you have the event, but you see that the event was launched by Google Chrome, which was launched by something else. You can see what other applications were incorporated into the execution of the threat. ![]() You can see what happened after the threat. You can get onto the device trajectory to look at a threat, but you can also see what happened prior to the threat. This greatly maximizes our security operations." "The visibility and insight this solution gives you into threats is pretty granular. With SecureX, we are able to pull all those applications into one pane for visibility and maintenance. Additionally, we are using the Cisco SecureX platform, as we were a beta test for that new solution. Because we do have the Email Security appliance and it is integrated with Threat Response, we have everything tied together. This is key to our security and maximizing operations. We have a Cisco Enterprise Agreement with access to Cisco Email Security, Cisco Firepower, Cisco Stealthwatch, Cisco Talos, Cisco Threat Grid, Cisco Umbrella, and also third-party solutions. It allows for research into a threat, and you can chart your progress on how you're resolving it." "Integration is a key selling factor for Cisco security products. "It is extensive in terms of providing visibility and insights into threats. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2023
Categories |