What is our primary use case?
The application intervenes in security situations in the organization and launches advanced threat prevention measures.
It has automated security controls that can predict and block malware attacks.
It is backed by AI deep learning that offers intelligent information and scales performance to unlock hidden malicious behaviors.
Data fraud cases have reduced since we set up this product as the main security assessment platform.
Employees can safely browse and share files with their colleagues without fear of external interference.
How has it helped my organization?
We are satisfied with this application as it improves internet browsing security across the organization.
Each department can easily share data with the management without fear of data compromise.
It is more flexible than other solutions in the market as it can be deployed in both cloud and on-premise.
It prevents members from logging in to unsecured sites and running links that may spread viruses to clean data.
The set features are updated regularly to meet company demands and comply with set community guidelines.
What is most valuable?
The advanced security operational features help the business to identify weak points that can leak data to unauthorized personnel and take necessary precautions.
Autonomous IoT Security monitors the performance of applications and equips them with safety measures to prevent risks and attacks.
Deep learning threat prevention has blocked unsafe sites and phishing attacks from cyber attackers.
It has audited the entire network and removed threat barriers that are used to slow down workflows.
The cost of running this software has been reduced due to the modern automated version that can work faster without human intervention.
What needs improvement?
Overloading and access to many members simultaneously slow down performance, which can lead to security threats.
New users working with this software find it hard to integrate effectively with other applications without the input of the customer support staff.
It sometimes blocks safe sites when I am researching, affecting the overall output and wasting time.
If the authorization commands are not well set, it slows down the working capacity of the Operating System.
I love the current version with upgraded features that can block more attacks and protect our work environment.
For how long have I used the solution?
I've used the solution for nine months.
What do I think about the stability of the solution?
The innovative security enhancement models have helped us in curbing most online threats.
What do I think about the scalability of the solution?
There is improved security in communication and internet browsing.
How are customer service and support?
We have achieved most of the set goals due to customer service team transparency and assistance.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
This solution has been awesome and offers excellent functionalities.
How was the initial setup?
The setup was relatively complex. That said, the customer service team provided enough assistance.
What about the implementation team?
The vendor team was responsible for setting up everything.
What was our ROI?
The measured ROI has improved from 30% to 55% from the deployment period.
What's my experience with pricing, setup cost, and licensing?
The setup and pricing costs are favorable to many business enterprises.
Which other solutions did I evaluate?
I have no interest in other applications.
What other advice do I have?
This is the best platform for reducing phishing and blocking malware attacks.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.