Back to Blog
Our DevOps team handled the installation, so I wasn't involved, but it wasn't that complicated. "The SONAR feature is valuable as it offers real-time protection and threat rejection." "Setting up Symantec is straightforward. We're able to dig in and really understand how things came to be and where to focus our efforts." "The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices." It allows for research into a threat, and you can chart your progress on how you're resolving it." "It's quite simple, and the advantage I see is that I get the trajectory of what happened inside the network, how a file has been transmitted to the workstation, and which files have got corrupted." "Device Trajectory is one of the most valuable features. We can use two-factor authentication with another platform, and we can authenticate with two-factor." "The most valuable feature is signature-based malware detection." "The biggest lesson that I have learned from using this product is that there is a lot more malware slipping through my email filters than I expected." "It is extensive in terms of providing visibility and insights into threats. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us." "The VPN is most valuable. Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. I can track everything that happens on our server from my PC or device. "appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst.
0 Comments
Read More
Leave a Reply. |