In my opinion, the solution's most valuable feature is its capacity to monitor network traffic, logs from devices within the network, and network captures.
This capability extends beyond logs to include full network capturing.
Senior Assistant Vice President at a financial services firm with 1,001-5,000 employees
Jul 27, 2022
I can have enterprise security, email security, next generation firewall security log, HIDS and NIDS logs, etc. all on the same dashboard. It makes it easy to pinpoint or correlate our server to this. I can find out if there is lateral movement. This is the biggest advantage of this solution.
Senior Assistant Vice President at a financial services firm with 1,001-5,000 employees
Jul 27, 2022
Sometimes, it gives me static when integrating Windows-based systems. It should produce a precise log of sorts as to where the problem is. For example, a few days ago because of the McAfee application firewall, I couldn't get access to the particular Windows machine.
So, my team and I had to figure out by ourselves that there was a virus responsible for the obstacle. This solution should trigger a meaningful log or message indicating the reason the user or implementer can't get into the machine.