Recover from security threats with Cisco
37.4%
48.6%
13.1%
0.9%
0%
I love that the product is cloud based, it can communicate with my devices that are on-site and which may be offsite, I can easily white list an app that they don't know about or black list something I don't want to be used in my environment. Have a device that a user won't bring in for updates? I can isolate it and prevent it from getting anywhere on the internet! The hash based functionality for detections seems to be great, sometimes it results in a false positive, but as noted above we can white list apps that we so choose.
It can be a resource hog without rhyme or reason, before we added an internal Tetra server all of our devices would update at once and clog our internet pipe, but with our on-site tetra server, the devices at home won't get tetra updates, so they show up as being "out of date" - needs to be an option for two servers for the updates, one for when the user is on-site with the device, one for when they are at home.
Take into account all of your use case scenarios, make sure that your internal processes take into account removing licenses for devices that no longer exist. The application - while cloud based - is not AD integrated and does not "know" when a device is removed from the domain. In the event that you use on demand VDI's you can have multiple licenses taken up with the same name if you don't use the proper golden image settings, the same can be true for full PCs if you have to rebuild a device or if you maintain the name across multiple iterations of PCs.
Make use of their support, they are responsive and will engage with you, no changes will get made without your direct permission, they are thorough and competent. The few times I've not gotten an answer I wanted (or hoped for) was usually because the product couldn't do what I wanted it to do as it was outside the scope of the application.
Helping us to improve our security footprint, preventing infections and intrusions. Fewer false positives for viruses and/or malware, fewer true positives for actual infections.
Cisco protects your network and users against attacks and many types of threats such as Malware , Ransomwire.It is very fast in detecting threats and consumes less storage and RAM , Making it easy , flexible to use , Great security tool and CISCO being the brand name.
Sometimes cant stop all malwares , updates required. It is costly in terms of pricing .
For those who want an efficient and easy to use tool for detectionof malware and ransomware. Best tool currently in market , But costly , though recommended to use.
All problems with malware , ransomware have dropped after using CISCO. It is easy and efficient to use .
Cisco AMP for Endpoints can efficiently protect from various types of threats.
High cost compared to its competitors in the same area
Problem solving with malware, Ransomwares easily and efficiently.
Cisco AMP is great for the company I work with because it serves the purpose.
I dislike that sometimes it crashes and we lose productivity.
We are working on finding solutions and the benefits.
Cisco AMP for Endpoints furnishes topmost shield against the most promoted attacks rapid, so you can take back supervision of your time for revolution. It blocks violation and stop malware at the tip of arrival, then speedily identify, accommodate, and rectifying advanced threats that trick forefront-line securities.
Intensify protection using the best worldwide attack alertness, and stop both self-evolving and document -based malware in actual time.
Regular detector and evidence all file proceedings.
Speed up analysis and spontaneously repair malware across all platforms.
Sometimes can't stop all malware.
Sometimes couldn't eliminate blind spots.
Some of the case can't discover unknown.
Cost also bit more.
Malware/Ransomware Threats remarkably influence many companies around the world. Over the years, this business has expand eye-catching, and the most all-inclusive ransomware attacks of the past do a satisfactory task of revealing the narrative of how it has develop.
AMP for Endpoints shielding proficiency contain respective technologies that work jointly to block, diagnose, and repair harmful code at the final result.
I like the easiness of connectivity. It is very easy to connect to our VPN.
Ours requires additional security steps.
None.
Security when logging in.
Good UI, very easy to use and gives you access to information regarding deployed assets, current status and any detected threats.
There is very little not to like about a solution that gives you great visibility of your deployed assets and any detected threats on them, with options to remediate.
An endpoint protection suite that as well as doing its initial business requirement, also integrates with other Cisco products like SecureX, to maximise the value delivered to the business.
Very useful platform and easily integrated end to end with complete cisco stack of technologies which enables complete security visibility and enables efficent incident response.
It has seperate portal for on prem and cloud deployments so for hybrid devices a unfied platform should be adopted.
The major benefit it provides is the end to end visibility among cisco stack of products. If a malware has passed the firewall then upon knowning it malicious state it can easily be tracked at endpoint layer and isolated accordingly.
Cisco protects your network and users against attacks and many types of threats such as Ransomware, Malware, Exploit. It is very fast in detecting threat and consumes little ram memory. Cisco AMP is certified as an “Approved Business Product” by AV-Comparatives, the tested products must score at least 90% in the Malware Protection Test, and at least 90% in the overall Real-World Protection Test
As every anti-malware sometimes gives false positives, files are classified as threats.
Installing on Macs is not as easy as it sounds
Easy to use, quick and very efficient in detecting threats and malware
All problems with malware, Ransomwares have dropped dramatically after the implementation of Cisco AMP. All users are now better protected against threats
Looking for the right SaaS
We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.
Want more customers?
Our experts will research about your product and list it on SaaSworthy for FREE.
Ease of use and deployment to our endpoints. Policy customization and reporting is excellent. Reasearching and finding root cause of an issue with tools provided helps tremendously as well.
Only issue we have come accross is the usability of the product with deprecated operating systems. We understand the risk in that area, but some systems take time to upgrade and many moving parts on said systems might not support newer operating systems.
It helps us solve issues with software vulnerabilties, provides solid antivirus and the ability to isolate a machine off the network if a problem is found. Plus so much more.