6/22/2023 0 Comments Eset endpoint security advanced![]() The tool also caused CPU spikes on our production machine, and we were seriously considering moving to another product." "In Orbital, there are tons of prebuilt queries, but there is not a lot of information in lay terms. We didn't like that as we always want a solution that can fit smoothly into the setup without causing problems, especially where security is concerned. Eventually, we had to shut down the Exploit Prevention system. We didn't find a fix during troubleshooting, and Cisco couldn't offer one either. The Linux agent has conflicts with other solutions, including the Exploit Prevention system found in Windows servers. They continue to innovate in the right way." "Cisco is good in terms of threat intelligence plus machine learning-based solutions, but we feel Cisco is lagging behind in using artificial intelligence in its systems." "The Linux agent is a simple offline classic agent, and it doesn't support Secure Boot, which is important to have on a Linux machine. We think that Cisco covers all of the security aspects on the market. That's an area where it could be made better." "We don't have issues. In addition, not all products are multi-tenant, so you can't separate different customer environments from each other, which makes it a little bit hard for a managed service provider to deliver services to the customers." "It could be improved in connection with artificial intelligence and IoT." "Logging could be better in terms of sending more logs to Cisco Firepower or Cisco ASA. "The integration of the Cisco products for security could be better in the sense that not everything is integrated, and they aren't working together. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us." "It's quite simple, and the advantage I see is that I get the trajectory of what happened inside the network, how a file has been transmitted to the workstation, and which files have got corrupted." "The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great." Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. I can track everything that happens on our server from my PC or device. I found that quite good." "appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst. It has behavioral analytics, so you can be more proactive toward zero-day threats. It should protect all kinds of things that might happen on the servers, things that I cannot see." "The best feature that we found most valuable, is actually the security product for the endpoint, formerly known as AMP. It allows for research into a threat, and you can chart your progress on how you're resolving it." "I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. Once a threat was detected, being able to do the threat lookups and the live tracking was really useful." "It is extensive in terms of providing visibility and insights into threats. ![]() We had Umbrella in place and we were using Anåonnect as well as Firepower. We can use two-factor authentication with another platform, and we can authenticate with two-factor." "The integration with other Cisco products seemed to be really effective.
0 Comments
Leave a Reply. |