Cisco AMP for Endpoints Customer Testimonial
Good impact, it has been very good at finding any type of indications of compromise, picking up threats, and finding retrospective files that were not a known vulnerability before but now they are so it identifies them automatically.
— Robert Candelaria, Enterprise Systems Architect, Gila Regional Medical Center
This data was sourced directly from a verified user of Cisco Secure Endpoint by TechValidate.
TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.
More Research on Cisco Secure Endpoint