Most Helpful Review
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Its most valuable features are its scalability and advanced threat protection for customers."
"I am told that we get over 100 million emails a month. This filters them down and allows only somewhere about three million emails, which is a great help."
"For the initial first level of support, we provide it from our side. If there's escalation required, we use Cisco tech for the AMP. And again, they are perfect. I mean, one of the best, compared to any other vendors."
"The most valuable features of this solution are the IPS and the integration with ISE."
"The simplicity of use is its most valuable feature. You can very clearly see things."
"The stability of the solution is perfect. I believe it's the most stable solution on the market right now."
"I am really satisfied with the technical support."
"It is a very stable program."
"This is the number one product for privilege account security."
"Monitoring and recording are valuable features, particularly the recording."
"It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know."
"The most valuable feature is that it does lifecycle management and that it will change to whatever the end target is."
"FortiAuthenticator is a very good solution. It is all jury-based. FortiAuthenticator is very easy for anyone to understand how it works and be able to take action."
"The initial setup is so easy and there is no problem in the implementation."
"The feature I value the most is the one-time passwords because it helps to authenticate users so you know the timing of their usage."
"The solution's most valuable aspect is that it easy to install. The user experience is very good."
"The solution is easy to learn and makes it easy for our users to add FortiToken. It's very easy to integrate if you have other Fortinet devices."
"For someone concerned with multifactor authentication, I'm satisfied with the product."
"We use this product for SSL two-factor authentication and FortiToken management."
"The logs have great detail that make it easier to evaluate and control the security environment."
"We would like to have an API integration with a SIEM solution, because as far as I know, it currently hasn't yet been released."
"I would like them to add whatever makes filtering more advanced in scanning and blocking for malware in emails."
"The solution needs more in-depth analytics."
"In the next version of this solution, I would like to see the addition of local authentication."
"The initial setup is a bit complex because you need to execute existing antiviruses or security software that you have on your device."
"In the next release, I would for it to have back up abilities. I would like the ability to go back to a point in time to when my PC was uninfected and to the moment of when the infection happened."
"The reporting and analytics areas of the solution need to be improved."
"I would like more seamless integration."
"For an experienced system implementer it will take approximately one day. However, for somebody who is inexperienced it may take up to five days."
"I'd like to see the product include out of the box connectors."
"We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can."
"It's an old product and has many areas that can be improved."
"Other features that would improve the product are a single sign-on where people can use their Gmail ID to log-in, etc."
"If you want some other FortiAuthenticator from one site to another site, you should have requirements, but really if you have authentication and directory or another solution, you should change the password of the authenticator between the solution and the directory and other things. So transfer of data and other information should be simpler."
"I don't have any issues with this solution, but it may need a better, more user-friendly interface or better design of the platform."
"The hardware aspect of the solution could be improved. We are not really able to understand the hardware capabilities of the device."
"We have issues with HA (high availability). These should be addressed in future releases."
"No SMS gateway from the ISP"
"It does the job I paid for, but the graphical interface could be improved."
"It can not use SQL to query FortiAnalyzer directly."
Pricing and Cost Advice
"The costs of 50 licenses of AMP for three years is around $9,360."
"The price is very good."
"The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost."
"Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc."
"In our case, it is a straightforward annual payment through our Enterprise Agreement."
"Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection."
"There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization."
"The Enterprise Agreement is like an all-you-can-eat buffet of Cisco products. In that vein, it was very affordable."
"licensing for this solution is based on the number of APV (privileged users), and the number of sessions that you want to record."
"I think that it was in the range of $200,000 that had to get approved."
"You can pay as you go with them. You purchase a base license and add to it as needed."
"The product could be more competitively priced."
"It costs more to license the high-availability option."
Questions from the Community
Top Answer: The solution's integration capabilities are excellent. It's one of the best features.
Top Answer: Nice to have URL management, password protection of the app, more details of the machine & user running the app.
Top Answer: The primary use case is for endpoint protection. For the larger deployments, we use it for our policy enforcement as… more »
Top Answer: It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege… more »
Top Answer: If we look at the Privilege Management Inbox, we get a lot of information on what's happening right then and now. But if… more »
Top Answer: If you're going to implement Endpoint Privilege Manager, don't just give everybody EPM and think you're done with it… more »
Ask a question
Earn 20 points
Compared 14% of the time.
Compared 11% of the time.
Compared 9% of the time.
Compared 8% of the time.
Compared 7% of the time.
Compared 15% of the time.
Compared 14% of the time.
Compared 13% of the time.
Compared 7% of the time.
Compared 26% of the time.
Compared 17% of the time.
Compared 12% of the time.
Compared 11% of the time.
Compared 4% of the time.
Also Known As
Advanced Malware Protection (AMP) is subscription-based, managed through a web-based management console, and deployed on a variety of platforms that protects endpoints, network, email and web Traffic. AMP key features include the following: Global threat intelligence to proactively defend against known and emerging threats, Advanced sandboxing that performs automated static and dynamic analysis of files against more than 700 behavioral indicators, Point-in-time malware detection and blocking in real time and Continuous analysis and retrospective security regardless of the file's disposition and Continuous analysis and retrospective security.
CyberArk Endpoint Privilege Manager enables organizations to enforce least privilege policies for business and administrative users, as well as control applications to reduce the attack surface without halting productivity. The solution helps organizations revoke everyday local administrator privileges from business users while seamlessly elevating privileges when required by trusted applications. CyberArk Endpoint Privilege Manager also enables security teams to enforce granular least privilege policies for IT administrators, helping organizations effectively segregate duties on Windows servers. Complementing these privilege controls, the solution also delivers application controls, which are designed to manage and control which applications are permitted to run on endpoints and servers and prevent malicious applications from penetrating the environment.
FortiAuthenticator user identity management appliances strengthen enterprise security by simplifying and centralizing the management and storage of user identity information.
Learn more about Cisco AMP for Endpoints
Learn more about CyberArk Endpoint Privilege Manager
Learn more about Fortinet FortiAuthenticator
|Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank||Clearstream, McKesson, Boston Childrens Hospital||Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data|
Financial Services Firm7%
Comms Service Provider30%
Computer Software Company24%
Computer Software Company35%
Comms Service Provider12%
Computer Software Company34%
Comms Service Provider30%
See our list of .