synoptic12
Senior member
We've seen the stats regarding M.S.E., and really paid no attention to the detractors. M.S.E. works extremely well, as we have tested the capability somewhat; 'within reason'. Naturally, the operator is the most vulnerable, contingent upon what is researched.
Well, 360 is not that configurable either, being a Chinese program. However one may view security, the package has all of the files; when scanning or downloading', "Extracting files" > So there are no secrets for any to hide. The key point is, The security can override a system if the administrator chooses to do so. Remember, every key is logged.
Aside from that triviality, M.S.E. performs well. We previously installed Symantec Endpoint but that was a really heavy program. In reality, M.S.E. gets the job done. Sometimes, where the main crowd gathers is where hackers can exploit a security. So, we reverse the obvious to possibly obtain better results. Shouldn't have really mentioned this.
Well, 360 is not that configurable either, being a Chinese program. However one may view security, the package has all of the files; when scanning or downloading', "Extracting files" > So there are no secrets for any to hide. The key point is, The security can override a system if the administrator chooses to do so. Remember, every key is logged.
Aside from that triviality, M.S.E. performs well. We previously installed Symantec Endpoint but that was a really heavy program. In reality, M.S.E. gets the job done. Sometimes, where the main crowd gathers is where hackers can exploit a security. So, we reverse the obvious to possibly obtain better results. Shouldn't have really mentioned this.