Trend micro logo4/13/2023 if they could make it more intuitive for someone who is not an engineer so that they still can read what's going on in their webpage and understand, that would be something." "An easier way to do deduplication of machines, or be alerted to the fact that there's more than one instance of a machine, would be useful. "In terms of the user experience, if the UX design could be much simpler. And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source." "The most valuable feature is signature-based malware detection." Once a threat was detected, being able to do the threat lookups and the live tracking was really useful." "Among the most valuable features are the exclusions. We had Umbrella in place and we were using Anåonnect as well as Firepower. We're able to dig in and really understand how things came to be and where to focus our efforts." "The integration with other Cisco products seemed to be really effective. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us." "Device Trajectory is one of the most valuable features. Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. I can track everything that happens on our server from my PC or device. ![]() It allows for research into a threat, and you can chart your progress on how you're resolving it." "The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great." "appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP." "It is extensive in terms of providing visibility and insights into threats. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. ![]() It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. "Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |