

"They could improve the main dashboard to more clearly show me the things that I want to see.

And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source." We're able to dig in and really understand how things came to be and where to focus our efforts." "The biggest lesson that I have learned from using this product is that there is a lot more malware slipping through my email filters than I expected." "Among the most valuable features are the exclusions. Because Secure Endpoint has a connection to it, we get protected by it right then and there." "Device Trajectory is one of the most valuable features.

On the backend, Talos checks all the signatures, all the malware, and for any attacks going on around the world. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP." "The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great." "The most valuable feature is signature-based malware detection." "Definitely, the best feature for Cisco Secure Endpoint is the integration with Talos. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open.

It allows for research into a threat, and you can chart your progress on how you're resolving it." "Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. "It is extensive in terms of providing visibility and insights into threats.
