It's pretty incredible." "I like the detection rates of mobile threats." "The 10 hours a week that we are freeing up from having to manage and monitor our AV solution has really allowed us to focus on other areas of the business. It offers good insights that it gives you when it has a detection. "It seems to do a pretty good job of protecting the host. What you would do otherwise would be very risky and tedious." If you can do that in a secure sandbox environment, that's an invaluable feature. We're trying, for example, to determine, when people send information in, if an attachment is legitimate or not. It allows for research into a threat, and you can chart your progress on how you're resolving it." "The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great." "The ability to detonate a particular problem in a sandbox environment and understand what the effects are, is helpful. This is what makes the solution a valuable tool as far as I'm concerned." "If somebody has been compromised, the question always is: How has it affected other devices in the network? Cisco AMP gives you a very neat view of that." "It is a very stable program." "It is extensive in terms of providing visibility and insights into threats. You still have the ability to manage and remediate things. No matter where the device is, AMP has still got coverage on it and is protecting it. You get protection and reporting with it. AMP will work anywhere in the world, as long as it has an Internet connection. You don't have to be VPNed into the environment for AMP to work. It doesn't matter where the device is in regards to whether it's inside or outside of your network environment, especially right now when everybody's remote and taken their laptops home. This greatly maximizes our security operations." "The entirety of our network infrastructure is Cisco and the most valuable feature is the integration." "One of the best features of AMP is its cloud feature. With SecureX, we are able to pull all those applications into one pane for visibility and maintenance. Additionally, we are using the Cisco SecureX platform, as we were a beta test for that new solution. Because we do have the Email Security appliance and it is integrated with Threat Response, we have everything tied together. This is key to our security and maximizing operations. We have a Cisco Enterprise Agreement with access to Cisco Email Security, Cisco Firepower, Cisco Stealthwatch, Cisco Talos, Cisco Threat Grid, Cisco Umbrella, and also third-party solutions.
"Integration is a key selling factor for Cisco security products.