Technical Analyst - Desktop at a manufacturing company with 501-1,000 employees
Sep 17, 2021
It prevents our users from circumventing security. Everything is password protected so they can't get into it. They can't uninstall it. They can't do anything.
Competitive Engineer at a tech vendor with 1,001-5,000 employees
May 10, 2020
It's very easy to deploy, we don't have any problem or issues. It's most full automatic. It basically takes the assumption that everything is supposed to be a suspect; files, processes, URL accesses, and so on.
The most valuable features of the solution stem from the fact that I like the tool's UI, ease of management, ease of making reports, and the ability to export information easily.
Technical Analyst - Desktop at a manufacturing company with 501-1,000 employees
Sep 17, 2021
It needs improvements in its EDR and its ability to manage all the nodes. I'd like better communication between the console and the nodes, so I don't have to remote into each individual machine that's having an issue with the protection.
CEO, Author, Cyber security best practices at Sentree Systems, Corp.
Jun 28, 2020
The only part I really don't use as much is their firewall. It's a bit superfluous. Most people have their own firewall in place, so they don't really need that part portion of the solution.