

No matter where the device is, AMP has still got coverage on it and is protecting it. You get protection and reporting with it.

AMP will work anywhere in the world, as long as it has an Internet connection. You don't have to be VPNed into the environment for AMP to work. It doesn't matter where the device is in regards to whether it's inside or outside of your network environment, especially right now when everybody's remote and taken their laptops home. That can shorten the useful life of a device." "The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great." "One of the best features of AMP is its cloud feature. We don't see battery degradation like you do with other solutions which really drain the battery, as they're constantly doing things. That was a big thing for us, especially in the mobile world. It is an agent-based solution, and we see no performance knock on cell phones. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP." "It doesn't impact the devices. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open.
MCAFEE ENDPOINT SECURITY LINUX SERVICE NAME HOW TO
This helps you understand and nail down what the threat is and how to fix it." "The entirety of our network infrastructure is Cisco and the most valuable feature is the integration." "Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. Therefore, it gives you great detail, a timeline, and continuity of events leading up to whatever the incident is, and then, after. Then, after the event, something else was launched by whatever the threat was. For example, you have the event, but you see that the event was launched by Google Chrome, which was launched by something else. You can see what other applications were incorporated into the execution of the threat. You can see what happened after the threat.

You can get onto the device trajectory to look at a threat, but you can also see what happened prior to the threat. "The visibility and insight this solution gives you into threats is pretty granular.
