Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Comodo
CIS 2025 is now LIVE!
Message
<blockquote data-quote="Trident" data-source="post: 1098190" data-attributes="member: 99014"><p>Not even that, it’s just user-dependent systems are promoted as the ultimate security, which shouldn’t be the case. It’s like me, showing threat hunting and other EDR features. Obviously through these features I will successfully remediate attacks. But this is showing my personal skills and not the software capabilities.</p><p></p><p>But on another thread we’ve had discussion with Cruelsister and we’ve pretty much understood each other. Btw she is on holiday now so no need to summon her in that many posts. She is not around to read them.</p><p></p><p>Then again, you cannot hold her or anyone else responsible for what they show. It’s up to everyone to interpret these videos and showcasing, the way they want.</p><p></p><p>I personally, am not convinced in the quality of any system that is highly user dependent and I am not convinced in the quality of systems that allow you to run live malware on the same system where you do your work.</p><p>I had the same argument with this Webroot supporter that was trying to convince me how amazing Webroot is, with the rollback system.</p><p>Allowing malware to run, whether it will be restricted, contained, disconnected is madness.</p><p>This should be your last-let incident mitigation (when everything else has failed), but not your be-all end-all.</p><p></p><p>There are cloud and appliance sandboxes that are reinforced and specially for this purpose, of running and analysing malware.</p><p></p><p>No MSSP employees in their right mind will allow malware to run on the same system where you work with information.</p></blockquote><p></p>
[QUOTE="Trident, post: 1098190, member: 99014"] Not even that, it’s just user-dependent systems are promoted as the ultimate security, which shouldn’t be the case. It’s like me, showing threat hunting and other EDR features. Obviously through these features I will successfully remediate attacks. But this is showing my personal skills and not the software capabilities. But on another thread we’ve had discussion with Cruelsister and we’ve pretty much understood each other. Btw she is on holiday now so no need to summon her in that many posts. She is not around to read them. Then again, you cannot hold her or anyone else responsible for what they show. It’s up to everyone to interpret these videos and showcasing, the way they want. I personally, am not convinced in the quality of any system that is highly user dependent and I am not convinced in the quality of systems that allow you to run live malware on the same system where you do your work. I had the same argument with this Webroot supporter that was trying to convince me how amazing Webroot is, with the rollback system. Allowing malware to run, whether it will be restricted, contained, disconnected is madness. This should be your last-let incident mitigation (when everything else has failed), but not your be-all end-all. There are cloud and appliance sandboxes that are reinforced and specially for this purpose, of running and analysing malware. No MSSP employees in their right mind will allow malware to run on the same system where you work with information. [/QUOTE]
Insert quotes…
Verification
Post reply
Top