Cisco AMP

March 4, 2019

SECURITY

Better: Cisco Security Drives Innovation, Growth and Empowers Customers

It has been a year since last RSAC when I became head of the Cisco Security Business Group. During this time, we have greatly expanded the number of customers we both serve and protect while continuing to deliver market leading innovation keeping ahead of today’s threats. Cisco continues to offer th…

February 28, 2019

SECURITY

Happy Birthday, Threat Response: Only a year old, but boy have you seen some things!

Cisco Threat Response: For security analysts, by one of their own The work of a security analyst is arduous and time consuming but rewarding too. I know, I spent a good part of my career sitting in a seat, investigating and responding to threats in a Security Operations Center (SOC). I spent way too…

November 20, 2018

SECURITY

MobileIron UEM Certified as Cisco Security Connector Compatible

Expands support with Cloud Integration MobileIron was one of the first integration partners with Cisco Security Connector (CSC) for supervised iOS devices. This fall, they expanded their Unified Endpoint Management (UEM) support from on-premise to include the cloud, and both of the integrations are…

July 11, 2018

SECURITY

Security with Privacy – Solving the encryption problem without decryption

With the rise of encrypted traffic, it is becoming extremely resource intensive for organisations to decrypt traffic for security use cases. And with increasing adoption of TLS 1.3 and privacy-oriented TLS mechanisms like certificate pinning (HPKP), decryption using man in the middle (MITM) techniqu…

November 8, 2017

SECURITY

For threat correlation across endpoint, network, and cloud – connect the dots

When I was a kid, I used to love dot-to-dot books. I enjoyed formulating a guess of what the picture was, the hunt in finding all the dots, the satisfaction of connecting them all together, and the excitement of the final picture coming into view to either confirm, or deny, my suspicions of what I w…

September 26, 2017

SECURITY

Uncover the Where, When, and How of an Attack with “Trajectory” from Cisco AMP for Endpoints

You’re walking down the sidewalk, headphones in your ears, music blasting, and your head is buried in your phone reading a text message. CRUNCH. You look down and you’ve just stepped in a pile of… (no, not that)… broken glass. A car parked on the street was broken-into, and the glass from the shatte…

August 9, 2017

SECURITY

Deep Dive into AMP and Threat Grid integration with Cisco Email Security

In our previous blog posts about AMP and Threat Grid on Cisco Email Security, we have discussed the approach to email security, that organizations could take to protect themselves against advanced threats. We have as well discussed the components of the solution and how they work together to protect…

July 31, 2017

SECURITY

From the Trenches: 5 Ways Customers are Improving Security with Cisco AMP for Endpoints

Does this sound like a day in your IT security life? Wake up, get coffee, drive to work, and battle an almost constant onslaught of attacks, while playing whack-a-mole with too many alerts. If so, we get it. You never know where the next attack will come from. And you’re probably on to the fact that…

March 17, 2017

HEALTHCARE

Addressing Healthcare Security Challenges

It’s a gross understatement to say that security is critical in healthcare, where a breach can not only impact an organization’s effectiveness and reputation but also affect patient privacy and—worst-case scenario—health and safety. If you are reading this blog, you no doubt already know the most co…