
None of the solutions dominate in all areas." "It's easier to integrate Apex One than Kaspersky. When you're comparing the other solutions, each has pros and cons, you cannot claim one is 100 percent suitable for you. The security it provides is okay." "The most valuable features of Trend Micro Apex One are it has its own machine learning and it is quite fast, compared with the other solutions. "Stable threat protection software that's quick to install. Because Secure Endpoint has a connection to it, we get protected by it right then and there." "The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great." On the backend, Talos checks all the signatures, all the malware, and for any attacks going on around the world. It should protect all kinds of things that might happen on the servers, things that I cannot see." "The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices." "Definitely, the best feature for Cisco Secure Endpoint is the integration with Talos. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP." "The biggest lesson that I have learned from using this product is that there is a lot more malware slipping through my email filters than I expected." "I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious.



It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open.

We're able to dig in and really understand how things came to be and where to focus our efforts." "Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. "The most valuable feature is signature-based malware detection." "Device Trajectory is one of the most valuable features.
