AMP for Endpoints
Introducing Cisco Multicloud Portfolio
In the last year or so I had more than a hundred meetings with our customers and partners and experienced a very diverse spectrum of cloud needs and readiness. Nearly everybody understood how Cisco could help with their private cloud and data center needs, but few appreciated how Cisco could solve t…
Uncover the Where, When, and How of an Attack with “Trajectory” from Cisco AMP for Endpoints
You’re walking down the sidewalk, headphones in your ears, music blasting, and your head is buried in your phone reading a text message. CRUNCH. You look down and you’ve just stepped in a pile of… (no, not that)… broken glass. A car parked on the street was broken-into, and the glass from the shatte…
Take incident response to the next level with AMP for Endpoints and Cognitive Threat Analytics
Our data shows that there are 5 to 10 breaches per 1000 seats every week. That number is staggering and exemplifies the limits of traditional prevention. Most of these attacks will be done using repackaged malware distributed by known threat actors. We also see that such attacks not only remain unde…
Replace your AV with Next Generation Endpoint Security
If you’ve been to a security conference in the last year you’ve probably seen more than 20 different vendors all talking about endpoint security. Some might be talking about next generation anti-virus, endpoint detection and response, and even the much lauded machine learning. How do you cut through…
From the Trenches: 5 Ways Customers are Improving Security with Cisco AMP for Endpoints
Does this sound like a day in your IT security life? Wake up, get coffee, drive to work, and battle an almost constant onslaught of attacks, while playing whack-a-mole with too many alerts. If so, we get it. You never know where the next attack will come from. And you’re probably on to the fact that…
Cisco AMP for Endpoints Included in Gartner’s “The Evolving Effectiveness of Endpoint Protection Solutions” 2017 A …
Endpoint security comes in many different shapes and sizes: “Endpoint Protection Platforms (EPP)” “Antivirus (AV)” “Endpoint Detection and Response (EDR)” “Next-Generation Endpoint Solutions” The list goes on. Faced with so many different options, it can be tricky to know which type of endpoint se…
Are You The Lucky One? Sometimes Luck Can Bring You Malware
For more than two decades, malicious actors have been evolving their Phishing techniques to effectively achieve their goals. From poorly crafted scams to extremely well crafted documents, Phishing attacks keep being a very effective technique in the attackers toolbox. Anyone can be a target. While m…
AMPlify your Security
See how our customers are enhancing their security posture with AMP for Endpoints At Cisco we know that security teams are a critical piece of what’s possible in any organization and simplifying their job is of utmost importance to us. We believe that by allowing customers to see more, protect bette…
Cisco AMP for Endpoints Meets PCI and HIPAA Requirements for Compliance
Cisco AMP for Endpoints was recently the subject of a thorough technical review and test to validate that the solution satisfies requirements in accordance with the Payment Card Industry Data Security Standard (PCI DSS) version 3.2 and the Health Insurance Portability and Accountability Act (HIPAA)…
1