Great product for small IT teams
Use Cases and Deployment Scope
I also use the vulnerability scanner to keep track of how my update process is behaving, as well as track software on the system that is not allowed by the company.
Pros
- Network monitoring -- all activity is logged, and you can have as many or as little alerts as you need.
- The vulnerability scanner is great and can be scheduled!
- The dashboard when you log in is outstanding and very clear, so you can see issues easily.
Cons
- Out of the box there is a lot of "noise," and it requires a significant effort to reduce that down to a manageable level.
- The interface can be a bit clunky at times.
- Results from forensics info are difficult to locate, as they register as events. This should pop up in a window when you send the command, or email you when done, so that you can go retrieve it, ideally from a dedicated section on the interface.
Likelihood to Recommend
I also like the fact that you can view any and all events on the network.
