That way, we can capture the activity through EDR. We use EDR just in case somebody happens to install a compromised application. We have several of them configured, but there isn't a lot of targeted cybersecurity activity against us. We've thought about exploring additional features, like implementing allowed or disallowed files for programs. Most of the time, it bothers users who are prevented from accessing certain websites. Fortunately, I don't see many false positives, so it doesn't really bother us. We have a single console, and it comes with a lot of alerts. We use what Symantec provides to us as their cloud solution. The solution is deployed on cloud. We have a default antivirus that we use to protect our laptops. Symantec provides access to the antivirus, so they're not deploying it on our side. We use this solution to protect our endpoints.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |