![]() ![]() ![]() This is key to our security and maximizing operations. We have a Cisco Enterprise Agreement with access to Cisco Email Security, Cisco Firepower, Cisco Stealthwatch, Cisco Talos, Cisco Threat Grid, Cisco Umbrella, and also third-party solutions. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP." "Integration is a key selling factor for Cisco security products. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. What you would do otherwise would be very risky and tedious." "The entirety of our network infrastructure is Cisco and the most valuable feature is the integration." "Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. ![]() If you can do that in a secure sandbox environment, that's an invaluable feature. We're trying, for example, to determine, when people send information in, if an attachment is legitimate or not. "The ability to detonate a particular problem in a sandbox environment and understand what the effects are, is helpful. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |