The cloud portal or management control should be a little faster. They need to improve that." "The portal is a little bit slow in loading. They do not have very good reporting features or forensic functionality in the on-premise version. "It should have a single agent as competitors are offering." "In the next release, I would like to see IBS included in OfficeScan." "The main thing they need to improve is their reporting functionality and the forensics for their on-premise consult. That way you could get a more accurate device count, so you're not having an inflated number." "It could be improved in connection with artificial intelligence and IoT." Trend micro antivirus one license#Instead of paying a license for one computer, I have to license two computers until I manually go in, search for all the duplicate entries, and clean them out myself." "An easier way to do deduplication of machines, or be alerted to the fact that there's more than one instance of a machine, would be useful. Trend micro antivirus one upgrade#If you have a computer and you upgrade from Windows 7 to Windows 10, or you upgrade your agent from version 6 to 7, it creates a new instance in there instead of updating the information. The tool also caused CPU spikes on our production machine, and we were seriously considering moving to another product." "The thing I hate the most, which they have not fixed, is when it creates duplicate entries within a console. We didn't like that as we always want a solution that can fit smoothly into the setup without causing problems, especially where security is concerned. Eventually, we had to shut down the Exploit Prevention system. We didn't find a fix during troubleshooting, and Cisco couldn't offer one either. The Linux agent has conflicts with other solutions, including the Exploit Prevention system found in Windows servers. Trend micro antivirus one Offline#Cisco should understand the need for continuous updates on the custom Cisco exclusions and the custom applications that come out-of-the-box with the AMP for Endpoints." "The Linux agent is a simple offline classic agent, and it doesn't support Secure Boot, which is important to have on a Linux machine. They continue to innovate in the right way." "The GUI needs improvement, it's not good." "We had a lot of noise at the beginning, and we had to turn it down based on exclusions, application whitelisting, and excluding unknown benign applications. We think that Cisco covers all of the security aspects on the market. There are probably a dozen queries in there that really focus on what I need to focus on, but they are not always easy to find the first time through." "We don't have issues. There isn't enough information to help us with what we're looking for and why we are looking for it with this query. "In Orbital, there are tons of prebuilt queries, but there is not a lot of information in lay terms. Once a threat was detected, being able to do the threat lookups and the live tracking was really useful." We had Umbrella in place and we were using Anåonnect as well as Firepower. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP." "The integration with other Cisco products seemed to be really effective. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us." "Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. Trend micro antivirus one Pc#I can track everything that happens on our server from my PC or device. And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source." "appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst. It should protect all kinds of things that might happen on the servers, things that I cannot see." "Among the most valuable features are the exclusions. We're able to dig in and really understand how things came to be and where to focus our efforts." "The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices." "I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. "The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great." "Device Trajectory is one of the most valuable features.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |