We changed our name from IT Central Station: Here's why

Malwarebytes Questions

Julia Frohwein
Content and Social Media Manager
PeerSpot (formerly IT Central Station)
Dec 10 2021

Hi,

We all know it's really hard to get good pricing and cost information.

Please share what you can so you can help your peers.

10 Answers
Miriam Tover
Content Specialist
PeerSpot (formerly IT Central Station)
Dec 10 2021

Hi Everyone,

What do you like most about Malwarebytes?

Thanks for sharing your thoughts with the community!

19 Answers
Julia Frohwein
Content and Social Media Manager
PeerSpot (formerly IT Central Station)
Dec 10 2021

Please share with the community what you think needs improvement with Malwarebytes.

What are its weaknesses? What would you like to see changed in a future version?

19 Answers
Julia Frohwein
Content and Social Media Manager
PeerSpot (formerly IT Central Station)
Dec 10 2021

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

19 Answers
Miriam Tover
Content Specialist
PeerSpot (formerly IT Central Station)
Dec 10 2021

If you were talking to someone whose organization is considering Malwarebytes, what would you say?

How would you rate it and why? Any other tips or advice?

16 Answers
Endpoint Protection for Business (EPP) Questions
Giusel
IT Engineer at UTMStack
Jan 20 2022

Hi, community!

Usually, when professionals administer the network, they use an Active Directory tool and a cybersecurity solution (e.g., EPP, anti-virus, or SIEM) separately.

Are you aware of SIEM platforms that integrate these tools?

Avraham SonenthalI agree with the users who mentioned Splunk. Splunk is a log message management… more »
Robert CheruiyotHi @Giusel, With the rise in insider threats, the idea of UEBA is becoming a… more »
6 Answers
Edwin Omondi Ambogo
Senior Technologist at LAIKIPIA UNIVERSITY
Nov 29 2021
Hello dear community, My organization (a university with 500+ employees and ~5000 students) is looking for an endpoint security solution. Currently, we have Seqrite Endpoint Security, Comodo Advanced Endpoint Protection and Kaspersky Endpoint Security on the table for our consideration.  Which ...
Read More »
2 Answers
Satish Singh
Cloud Security Architect at Kyndryl
Nov 06 2021
Hi dear professionals, I'm working as the Cloud Security Architect at a Tech Sevices company with 10,000+ employees and I'm looking for suggestions about on-premise endpoint security solutions.  Please recommend the best product/solution that fits the requirements below (salient features and ex...
Read More »
Eric RiseSatish, Thank you for your well-thought-out and detailed question on this… more »
6 Answers
User at TUBITAK
Nov 23 2021
Hello peers, I am working as an IT member at a research company with 200 employees (at most). I am looking at the pros and cons of SCCM and BigFix software.  At the moment, we are using BigFix just for updating and I think if we switch to SCCM that would be a more complicated and costly soluti...
Read More »
Kumar MahadevanSCCM is very robust but you need more time and people to manage it.  For a… more »
Kirk StephenWe have 1500 users and even with a reasonable sized support team we find SCCM… more »
Muhammad WaseemHi Ihsan,  Hope you are doing well, As per my experience to deploy SCCM for… more »
5 Answers
Rony_Sklar
PeerSpot (formerly IT Central Station)
There are many cybersecurity tools available, but some aren't doing the job that they should be doing.  What are some of the threats that may be associated with using 'fake' cybersecurity tools? What can people do to ensure that they're using a tool that actually does what it says it does?
Read More »
SimonClark Dan Doggendorf gave sound advice. Whilst some of the free or cheap… more »
Dan DoggendorfThe biggest threat is risks you think you have managed are not managed at all so… more »
Javier MedinaYou should build a lab, try the tools and analyze the traffic and behavior with… more »
12 Answers
Rony_Sklar
PeerSpot (formerly IT Central Station)
Dec 07 2021

Hi peers,

What is the difference between a compromise assessment and threat hunting? 

How do each contribute to Endpoint Protection?

Geoffrey PoerA Compromise Assessment (CA) is an active and generally scheduled engagement… more »
Nikki WebbThreat hunting typically comes before a compromise assessment. Threat Hunting… more »
5 Answers
Nurit Sherman
Content Specialist
PeerSpot (formerly IT Central Station)
Aug 25 2021
Hi community,  We all know that it's important to conduct a trial and/or proof-of-concept as part of the buying process.  Do you have any advice for your peers about the best way to conduct a trial/POC?  How do you conduct a trial effectively? Are there any mistakes to avoid?
Read More »
James KielyEnsure you have a defined set of outcomes. Communicate these expectations to the… more »
Jairo Willian PereiraMistakes: 1. Choosing only using a Gartner magic quadrant. 2. Don't consider… more »
ITSecuri7cfdOnce you have narrowed down the top 5 picks for a capability/solution, we… more »
18 Answers
Mostafa
System Administrator at Suez Canal Insurance
Aug 30 2021

What is the best for ransomware infection? 

Alex VakulovInstall all security updates, create an incident response plan, use whitelisting… more »
Siddharth NarayananIPS & Blocking unwanted extensions at gateway level.
Nadeem Syedthere are different solutions for ransomware these days. Best i have found is… more »
7 Answers
Ariel Lindenfeld
Sr. Director of Community
PeerSpot (formerly IT Central Station)
Nov 18 2021

Let the community know what you think. Share your opinions now!

it_user400131evaluation of endpoint protection should look at what the product offers for… more »
it_user762459Key points for me are speed, scale & reporting, and I generally classify my… more »
J RiceBeing more advanced than a signature-based system. Its ability to detect lateral… more »
15 Answers