FireEye Endpoint Security Valuable Features
The most valuable feature of this solution is its simplicity. The triage process is quite effective, and it is compatible with many different systems. View full review »
The exploit guard and malware protection features are very useful. The logon tracker feature is also very useful. They have also given new modules such as logout backup, process backup. We ordered these modules from the FireEye market place, and we have installed these modules. We are currently exploring these features. View full review »
The most valuable network security feature is the network sandbox solution. This sandbox feature works on traffic flow. Detects multi stages attacks based on MVX analytics engine which detects zero-day, multi-flow and other evasive attacks with dynamic, signature-less analysis in a safe, virtual environment. It stops infection and compromise phases of the cyber-attack kill chain by identifying never-before-seen exploits and malware. It has capabilities like machine learning and endpoint protection as an antivirus. The investigation and forensic analysis have been most helpful. View full review »
Find out what your peers are saying about FireEye, CrowdStrike, Carbon Black and others in Endpoint Detection and Response (EDR). Updated: January 2021.
455,301 professionals have used our research since 2012.
It is very valuable in finding out unknown malware. View full review »
The most valuable feature is the integration between environments. View full review »
Find out what your peers are saying about FireEye, CrowdStrike, Carbon Black and others in Endpoint Detection and Response (EDR). Updated: January 2021.
455,301 professionals have used our research since 2012.