How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
Our customers like this solution out of many models.
We are a solution provider and we are pitching this product to our enterprise clients. These include organizations in the financial and banking sector, as well as other industries. We are focusing on endpoint protection.
Our organization primarily uses the solution for formalities and as a brand protection antivirus. We plan to start to use it as end-point encryption and USB encryption, as well as to protect our emails.
There were a couple of primary use cases for us. One of the most frequent was to deploy an agent onto user devices, including laptops and workstations. We were also to employ agents on mobile. It was used to detect viruses on everything from computers to USBs in our organization.
We primarily use the solution due to a recommendation from our partner.
The primary use case of this solution is for antivirus protection, ransomware, and trojan horse protection.
We are primarily using this solution for protecting endpoints and servers, which includes schedule scanning on weekly basis. Also using web reputation services for actively blocking any malicious website at user end.
We primarily use the solution for endpoint protection including antivirus and malware protection. We also use it for mail scanning and as a proxy for web protection. The most important cases are those, but we also use it for mobile device management, etc.
The primary use case is endpoint protection.