We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things." "The support needs improvement." "We'd like to see more one-to-one product presentations for the distribution channels." "ZTNA can improve latency." "I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components." "The dashboard isn't easy to access and manage." "FortiEDR can be improved by providing more detailed reporting." In incident management, we prefer to remove the endpoint system from the environment and scan the system. So it causes some performance degradation." "FortiEDR could add a separate scanning dashboard. One of the things I find with their cloud environment compared to others' is that they go cheap on the equipment. They need to invest more in their internal infrastructure that they are running in the cloud. "Everything with Fortinet having to do with their cloud services. We also restrict the WLAN part to avoid that system broadcasting to other networks." "The valuable features are device control, SONOR, and anti-virus." "It's a robust product." When there is an attack with on-prem, that system will go into isolation mode, removing connectivity to other internal systems. We view the firewall logs, and if there has been exposure, then we use the Application Isolation feature. That is one of the coolest aspects." "If there is exposure, we need to investigate the source of the attack, e.g., whether it came from the network or externally. You are able to see the reports of intrusions and the like on mobile devices. It is stable and easy to integrate, and it provides custom options." "The mobile application is valuable. And Active Directory is one of the more critical assets within an organization." "The most valuable feature of Symantec Endpoint Security is the protection of our systems." "The dashboard view and reporting are valuable. Symantec is a very good option compared to solutions from other vendors." "There is no other endpoint solution that will help you in preventing lateral-movement attacks on Active Directory. I also like the fact that we don't need to use a file on the computer, whereas some anti-malware solutions work with a file on the endpoint. "I like the endpoint detection and response.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |