I like how easy it was to setup once we had some infrastructure, now our team can easily identify which device has been compromised (or not) with ease. The GUI could be better but their support staff have helped me out several times when something wasn't working correctly or needed an update of sorts so far no problems! We use this as part of CI/CD pipeline for every new build from code repositories and even internal applications within the organization. It's really helping us keep track of who changed files where without having someone physically monitor each machine at workstation level.