It is really an easy product to install and manage. If you are giving a presentation to the management, you can easily show it to them in a live environment how the attackers came, which is amazing." "Its detection rate is valuable. You can see how the attackers came in and how they managed the attack. If there is an incident or an attack occurs, you can get a bird's eye view of that attack. "The telemetric report is the most valuable feature." "It has the feature to track an attack back. Originally, what would take us hours, now it takes us several minutes." Those are all things competitors don't have." "The Storyline feature has significantly affected our incident response time. I really love that they open their product to the customer to enhance it with custom-made software, giving you the APIs to program it. I really love the visibility it gives me into the endpoint. That's one of the most important features." "I really love how simple and effective the product is. It has an easy-to-use end-user GUI." "It has a one-click button that we can use to reverse all those dodgy changes made by the virus program and bring the system quickly back to what it was. It also performs a full scan quickly-within two hours. They have some really good engineers on their team." "The 365 management and analytics from the cloud is another great feature." "I like that SentinelOne doesn't use a lot of system resources or make the system slow. The solution's tech support is top-notch. The Storyline feature has made our response time very fast because we don't need to rely on outside help." "I was extremely happy with their technical staff. You get the entire picture in the dashboard. You don't need someone to analyze the system, to go into the logs. You have the whole picture in one minute. It has a rollback feature and offers good technical support." "When there is an incident, the solution's Storyline feature gives you a timeline, the whole story, what it began with, what it opened, et cetera. "Scalable endpoint protection solution that takes seconds to set up per device. It should protect all kinds of things that might happen on the servers, things that I cannot see." "The most valuable feature is signature-based malware detection." It allows for research into a threat, and you can chart your progress on how you're resolving it." "The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great." "The entirety of our network infrastructure is Cisco and the most valuable feature is the integration." "I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP." "It is extensive in terms of providing visibility and insights into threats. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source." "Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. We're able to dig in and really understand how things came to be and where to focus our efforts." "Among the most valuable features are the exclusions. "Device Trajectory is one of the most valuable features.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |