

That helps prevent spreading of the infection. It has a rollback feature and offers good technical support." "Another valuable feature is that if a machine is infected, one that may infect other computers within the network, we have the capability of segregating that machine in the network so that it remains connected to the internet but is cut off from the other machines in the network. When SentinelOne is up and running, you can easily find your way." "Scalable endpoint protection solution that takes seconds to set up per device.
Trend versus cylance antivirus how to#
You don't have to follow or read a book about 600 pages to have knowledge on how to use it. It has a very nice graphical interface that is very intuitive when end users are using it.
Trend versus cylance antivirus software#
I'm able to see which software is permanent on a machine, and how that happened, whether by registry keys or writing it to a special folder on the machine." "It has saved us from a couple of ransomware attacks already." "It is easy to manage and install. All that stuff is available from the SentinelOne console. It gives you the ability to search all actions that were taken on a specific machine, like writing register keys, executing software, opening, reading, and writing files.

We can put in indicators of compromise and it will sweep the environment for them, then they would give us a breakdown of what assets have been seen and where they have been seen, which is more of a forensics overview." "For me, the most valuable feature is the Deep Visibility. For simplifying threat-hunting, it is extremely useful, where traditional techniques in threat hunting are quite laborious. We came from a legacy type AV previously, so we didn't have that level of visibility or understanding. It gives us good insights into what is actually happening on the endpoints, e.g., when we have malicious or suspicious activity. "The Deep Visibility feature is the most useful part of the EDR platform. We're able to dig in and really understand how things came to be and where to focus our efforts." And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source." "Device Trajectory is one of the most valuable features.

It should protect all kinds of things that might happen on the servers, things that I cannot see." "Among the most valuable features are the exclusions. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP." "I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. "The entirety of our network infrastructure is Cisco and the most valuable feature is the integration." "The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great." "The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices." "The most valuable feature is signature-based malware detection." "Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer.
