Lead IT Technician at a maritime company with 501-1,000 employees
Real User
Top 20
2023-05-24T14:46:00Z
May 24, 2023
I guess that customer training is an area that needs improvement. What I've noticed is that we are not best trained for the software we might purchase, where you might discover later, "you could do that" after buying tools or software to do the same thing you could do with just one tool or software. The major issue that I would notice and know is that we are not always as best possibly trained for the software that we may purchase. So, after a while and after some digging, you may find out that software or tools could actually do something else. Then, you may end up buying two pieces of software to do the same thing that one could do. It's not a problem with Sophos but an issue across other pieces of software, including Veeam, which I would say is a rudimentary backup that you just use as a backup for virtual machines. You have alternative backups where you would only be backing up versions of what may have been updated, accounting for faster and more precise backups. In the future, I would like to see email integration to deal with phishing and spam.
There are times when the devices are at maximum capacity, and it takes a while before the device is updated. For example, if the device has a virus, and it's not aligned to connect to the network, even after you've scanned the device, and cleaned out the virus, once the management clears the system to allow it back on the network it takes some time. It can be frustrating when you have your line manager or in management affected trying to access the network.
The dashboard and the process for applying policies could be more intuitive. Cloud Optix isn't that difficult once you get the hang of it, but the IT folks managing this want it to be more user-friendly. Deploying the agents could be more seamless, too. Ideally, Cloud Optix would automate adding agents into your environment by integrating with Active Directory or some policy.
CSPM solutions help organizations identify and remediate security risks and compliance challenges within cloud environments. CSPM tools use automated scans to identify potential security issues, and then provide recommendations for remediation.
I guess that customer training is an area that needs improvement. What I've noticed is that we are not best trained for the software we might purchase, where you might discover later, "you could do that" after buying tools or software to do the same thing you could do with just one tool or software. The major issue that I would notice and know is that we are not always as best possibly trained for the software that we may purchase. So, after a while and after some digging, you may find out that software or tools could actually do something else. Then, you may end up buying two pieces of software to do the same thing that one could do. It's not a problem with Sophos but an issue across other pieces of software, including Veeam, which I would say is a rudimentary backup that you just use as a backup for virtual machines. You have alternative backups where you would only be backing up versions of what may have been updated, accounting for faster and more precise backups. In the future, I would like to see email integration to deal with phishing and spam.
There are times when the devices are at maximum capacity, and it takes a while before the device is updated. For example, if the device has a virus, and it's not aligned to connect to the network, even after you've scanned the device, and cleaned out the virus, once the management clears the system to allow it back on the network it takes some time. It can be frustrating when you have your line manager or in management affected trying to access the network.
The dashboard and the process for applying policies could be more intuitive. Cloud Optix isn't that difficult once you get the hang of it, but the IT folks managing this want it to be more user-friendly. Deploying the agents could be more seamless, too. Ideally, Cloud Optix would automate adding agents into your environment by integrating with Active Directory or some policy.