AMP for Endpoints

May 21, 2018

SECURITY

The Importance of an Information Security Strategy in Mergers and Acquisitions

Organizations have many options when it comes to growing. Many grow by hiring additional staff when it comes time to expand. Others grow through mergers and acquisitions with related companies, or companies that represent an entryway into a desired new vertical or territory. Organizations that engag…

April 18, 2018

SECURITY

NSS Labs Awards Recommended Rating to Cisco Endpoint Security

In the hyper-competitive world of endpoints security, proof of efficacy is the only real impartial way to valuably differentiate. However, public testing for next generation endpoint security solutions such as Cisco Advanced Malware Protection (AMP) for Endpoints has been lacking. Endpoint security…

April 5, 2018

SECURITY

IcedID Banking Trojan Teams up with Ursnif/Dreambot for Distribution

Update: 4/11 we have corrected the detection to Ursnif/Dreambot This post was authored by Ross Gibb with research contributions from Daphne Galme, and Michael Gorelik of Morphisec, a Cisco Security Technical Alliance partner. Cisco has noticed an increase in infections by the banking trojan IcedID t…

February 28, 2018

SECURITY

The Power of Logging in Incident Response

A deep dive into logging as an often-overlooked but powerful tool for incident detection and response “Lack of instrumentation or insufficient logging” is often a phrase used on incident response reports. During incident response activities, this isn’t a phrase you want to see, since lack of logging…

February 19, 2018

SECURITY

Have Your Cake and Eat it Too With Next-Generation Endpoint Security from Cisco

When faced with an either/or situation, people typically prefer not to choose. We want the best of both worlds. Rarely does someone want peanut butter OR jelly. Have cake? You probably want to eat it, too. So, it’s surprising to find new research from ESG shows that while 87% of organizations want a…

January 31, 2018

SECURITY

Are You Using Yesterday’s Tools to Stop Today’s Threats?

Take a look around you. What’s the average age of the technology you see? Your cell phone is probably 2 years old at most. Your laptop may be slightly older. Now, take a look at the technology you’re using to protect these devices. If you find yourself looking at a primarily signature focused legacy…

January 3, 2018

SECURITY

Introducing Exploit Prevention to Stop File-Less Attacks

In war, any good military strategist will try to exploit their enemy’s weaknesses. Cybercriminals are no different. They try to gain access to your endpoints and your sensitive data by exploiting weaknesses in your system, like a vulnerability in your software or in your operating system processes.…

November 28, 2017

SECURITY

4 Key Questions To Determine If Your Endpoint Security Is Up To Snuff

Machine learning. Next-generation antivirus. Artificial intelligence. These are all terms you likely see in your inbox on a daily basis from various endpoint security vendors. Meanwhile, you’re trying to protect your business and don’t have time to assess the 50+ vendors touting the latest tool desi…

November 13, 2017

SECURITY

Immunize your endpoints with AMP and Umbrella

You wake up this morning, and you feel miserable and tired. Getting out of bed is the worst, but you stumble down the hall with a heavy head, chills, and a serious case of congestion just to get a glass of water. All signs point to the flu. What a way to start the day! Now compare your body to any b…