AMP

December 9, 2016

SECURITY

Prevent, Detect and Respond with Cisco AMP for Endpoints

Cyberattacks are ever evolving to circumvent and evade “protection-only” technologies. Despite your best efforts to protect against compromise, a persistent attacker will eventually breach your defenses and get inside. Then what? IT security teams need to automatically detect a threat when it gets i…

November 1, 2016

PARTNER

The 3 S’s of Success: Security. Software. Simplicity.

Our most profitable partners sell security. And the underpinning of security solutions is software. Yet profit isn’t the only reason you should amp up your security practice. With cyberattacks increasing in both sophistication and volume, cybersecurity is on the top of everyone’s mind. Our security…

August 10, 2016

SECURITY

Cisco achieves 100% detection in Breach test

And why 100% detection is grossly misleading It is with great pride that we received the latest Breach Detection Report from NSS Labs, in which Cisco achieved a 100% detection rate – we simply couldn’t be more pleased to have our products so well-represented and validated in the market, and we truly…

June 14, 2016

SECURITY

Advanced Malware Evasion Techniques HTTP-Evader

Malware doesn’t play by the rules, so today’s IT infrastructure needs to provide several layers of defense for end-users.  Some of the more common devices used to protect modern networks are Intrusion Prevention systems (IPS) and Firewalls. In recent years, there has been a lot of research on…

June 8, 2016

SECURITY

AMP for Endpoints + Cognitive Threat Analytics = More Visibility than Ever Before

No matter how many security tools you deploy to defend your organization, malware is going to get in. You need to see it if you want any chance of stopping it. Cisco AMP for Endpoints provides deep visibility into the activity of files on your system so that you can spot malicious behavior quickly a…

April 11, 2016

SECURITY

Solving the Security Patchwork Problem

Hackers today make it their job to understand your security technologies and how to exploit the gaps between them. And that’s the problem – there are a lot of gaps. In our own discussions with IT security pros, it isn’t unusual to find organizations that have deployed a patchwork of 40 to 60+ differ…

March 29, 2016

SECURITY

The Power of an Integrated Threat Defense

At RSA this year and last, Marty Roesch, VP and Chief Architect for Cisco’s Security Business Group, talked about the need of an integrated threat defense to drive systemic response. The idea is to correlate and analyze data and telemetry from the multiple security technologies that organizations ha…

March 21, 2016

SECURITY

Endpoint Protection Platform (EPP) vs Endpoint Detection & Response (EDR)

Many colleagues, customers, and Cisco partners have asked me, “Why isn’t Cisco AMP for Endpoints included in Gartner’s recent Magic Quadrant for Endpoint Protection Platforms (EPP)?” The answer to us is pretty simple. AMP was not categorized as a traditional “EPP,” and hence, was not included in the…

February 2, 2016

SECURITY

Cisco AMP for Endpoints Adds New Features

The threat landscape is ever-changing. Attackers continue to innovate and refine their tactics, and malware is more sophisticated than ever. New threats are surfacing every day, like the Angler exploit kit and the SSHPsychos DDoS attack. According to the 2016 Cisco Annual Security Report, ransomware…