![]() It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us." "The entirety of our network infrastructure is Cisco and the most valuable feature is the integration." "The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great." "If somebody has been compromised, the question always is: How has it affected other devices in the network? Cisco AMP gives you a very neat view of that." "The most valuable feature is signature-based malware detection." "Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. We're no longer looking at digging into information or wading through hundreds of incidents. We can then choose to take any manual actions, if we want, or start our investigation. ![]() Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. ![]() "Any alert that we get is an actionable alert. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |