

I can track everything that happens on our server from my PC or device. Because Secure Endpoint has a connection to it, we get protected by it right then and there." "appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst. On the backend, Talos checks all the signatures, all the malware, and for any attacks going on around the world. We're able to dig in and really understand how things came to be and where to focus our efforts." "It's quite simple, and the advantage I see is that I get the trajectory of what happened inside the network, how a file has been transmitted to the workstation, and which files have got corrupted." "Definitely, the best feature for Cisco Secure Endpoint is the integration with Talos.

"The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great." "Device Trajectory is one of the most valuable features.
