- #DIFFERENCE BETWEEN NORTON 360 AND NORTON SECURITY PREMIUM MANUAL#
- #DIFFERENCE BETWEEN NORTON 360 AND NORTON SECURITY PREMIUM PASSWORD#
I watched a demo of them do that, and it was pretty sweet." "The solution is very good at scanning." If one of your endpoints are hit with mass ransomware, you could actually roll it back. It has a rollback feature that I haven't seen with any other company.
I tried to load that on, and Malwarebytes didn't let me do that, which was pretty good.
#DIFFERENCE BETWEEN NORTON 360 AND NORTON SECURITY PREMIUM PASSWORD#
I did a couple of tests with a password cracker. For the most part, it does a good job of catching things. It's also user friendly and quite easy to set up." "The installation process is very easy, especially since it is on the cloud." "The endpoint protection and response that allows us to restore a machine back to a pre-infected state are the most valuable features." "It is intuitive and easy to use. For some reason, it seems superior to other solutions, or at least in comparison to McAfee." "The pricing of the product is very good." "The protection is really good with Malwarebytes.
In addition, they do traditional signature and heuristic detection a lot better than Microsoft and some other players in that space." "I like the solution's ability to detect potentially unwanted programs. "When it comes to frontend protections, it has some of the best definitions. This is what makes the solution a valuable tool as far as I'm concerned." You still have the ability to manage and remediate things. No matter where the device is, AMP has still got coverage on it and is protecting it. You get protection and reporting with it. AMP will work anywhere in the world, as long as it has an Internet connection. You don't have to be VPNed into the environment for AMP to work. It doesn't matter where the device is in regards to whether it's inside or outside of your network environment, especially right now when everybody's remote and taken their laptops home. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us." "If somebody has been compromised, the question always is: How has it affected other devices in the network? Cisco AMP gives you a very neat view of that." "The most valuable feature is signature-based malware detection." "One of the best features of AMP is its cloud feature. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. We're no longer looking at digging into information or wading through hundreds of incidents.
#DIFFERENCE BETWEEN NORTON 360 AND NORTON SECURITY PREMIUM MANUAL#
We can then choose to take any manual actions, if we want, or start our investigation. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken.
That can shorten the useful life of a device." "The entirety of our network infrastructure is Cisco and the most valuable feature is the integration." "Any alert that we get is an actionable alert. We don't see battery degradation like you do with other solutions which really drain the battery, as they're constantly doing things. That was a big thing for us, especially in the mobile world. It is an agent-based solution, and we see no performance knock on cell phones. And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source." "It doesn't impact the devices. This greatly maximizes our security operations." "Among the most valuable features are the exclusions. With SecureX, we are able to pull all those applications into one pane for visibility and maintenance. Additionally, we are using the Cisco SecureX platform, as we were a beta test for that new solution. Because we do have the Email Security appliance and it is integrated with Threat Response, we have everything tied together. This is key to our security and maximizing operations. We have a Cisco Enterprise Agreement with access to Cisco Email Security, Cisco Firepower, Cisco Stealthwatch, Cisco Talos, Cisco Threat Grid, Cisco Umbrella, and also third-party solutions. "Integration is a key selling factor for Cisco security products.