
Therefore, we need to test it before we deploy. It's not going to give us any problems." With the complexity of the solution using multiple engines for multiple tasks, it can sometimes cause performance issues on our endpoints. We cannot just say, "There's a new version. This is important, because if there is a new version, we need to test it thoroughly before it goes into production.
SYMANTEC ENDPOINT PROTECTION 14 ISSUES SOFTWARE
But if you're buying AMP all by itself, I don't know if it can remove malicious software after the fact or if it requires the other tools that we use to do some of that." "We have had some problems with updates not playing nice with our environment. We have other tools in place that AMP feeds into that allow for that to happen, so I look at it as one seamless solution. They continue to innovate in the right way." "Maybe there is room for improvement in some of the automated remediation. We think that Cisco covers all of the security aspects on the market. Because with a lot of software now, you don't need to do that and shouldn't need to be rebooting all the time." "We don't have issues. This was always a bit of an inconvenience and a bug. Previously, the connector had an issue, where almost every time it needed to be updated, it required a machine reboot. "The connector updates are very easily done now, and that's improving. It allows for research into a threat, and you can chart your progress on how you're resolving it." "If somebody has been compromised, the question always is: How has it affected other devices in the network? Cisco AMP gives you a very neat view of that." It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP." "It is extensive in terms of providing visibility and insights into threats.


It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us." "Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. We're no longer looking at digging into information or wading through hundreds of incidents.
SYMANTEC ENDPOINT PROTECTION 14 ISSUES MANUAL
We can then choose to take any manual actions, if we want, or start our investigation. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. It's one of the best features." "Any alert that we get is an actionable alert. That can shorten the useful life of a device." "The solution's integration capabilities are excellent. We don't see battery degradation like you do with other solutions which really drain the battery, as they're constantly doing things.

That was a big thing for us, especially in the mobile world. It is an agent-based solution, and we see no performance knock on cell phones. "The most valuable feature is signature-based malware detection." "The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great." "It doesn't impact the devices.
