
I find Cisco Secure Endpoints incredibly important for securing user devices and data across the organization from threats. It serves as an advanced threat intelligence system that can detect, analyze, and prevent very sophisticated threats like malware. I appreciate how it intelligently monitors incoming traffic and behaviors, helping us manage cloud-based systems with many users and permissions. During peak hours, it provides valuable tools to analyze, hunt, and stop unauthorized activities, which is incredibly helpful. Its integration capabilities with Microsoft, Linux, and cloud-based systems make it really versatile for our needs. Review collected by and hosted on G2.com.
The initial setup process can be quite tricky. We have to gather requirements, create documents, discuss onboards across the board, analyze existing systems, decide the number of endpoints, set policies for remote resources and connections, and analyze peak time traffic to configure policies. Review collected by and hosted on G2.com.




