


It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open.

It allows for research into a threat, and you can chart your progress on how you're resolving it." "The most valuable feature is signature-based malware detection." "Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us." "It is extensive in terms of providing visibility and insights into threats. Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. I can track everything that happens on our server from my PC or device. It should protect all kinds of things that might happen on the servers, things that I cannot see." "appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst. We can use two-factor authentication with another platform, and we can authenticate with two-factor." "The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices." "I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen.

Once a threat was detected, being able to do the threat lookups and the live tracking was really useful." "The VPN is most valuable. We had Umbrella in place and we were using An圜onnect as well as Firepower. "The integration with other Cisco products seemed to be really effective.
