Cisco AMP for Endpoints
Threat hunting doesn’t have to be difficult—Taking a proactive position with your cybersecurity
Your Endpoint Protection Platform (EPP) is up to date with the latest version. Your Endpoint Detection and Response (EDR) technology has all of the latest framework rules and automaton in place. Vulnerabilities and patches for hardware and software are all covered. Your Defense in Depth strategy app…
Combat Modern Day Plague in Security with Email Security and Cisco Threat Response Integration
In January 1900, the four-masted steamship S.S. Australia laid anchor in the Port of San Francisco. The ship sailed between Honolulu and San Francisco regularly, and its passengers and crew were declared clean. However, it is difficult to define what ‘clean’ was in the absence of parameters that cou…
Keeping Students Learning and Keeping Cyber Threats at Bay
Partner Success Story Having an iPad in a classroom is a great learning tool. But having an iPad that a student can take home is even better. Except for one problem: if students connect these devices to an unsecure network, they risk downloading harmful malware. Malware that not only puts students…
Cisco AMP for Endpoints excelling in AV Comparatives Business Main Test Series
AV-Comparatives have long been the benchmark of 3rdparty testing in the endpoint security space. This year, for the first time ever, AMP for Endpoints participated in AV-Comparatives malware testing. The Business Main Test Series was broken up into two main sections: the Malware Protection Test and…
Securing the Central Hub of our World: Turkey
Cisco AMP and Cisco Umbrella Secures Istanbul Grand Airport and Turkish Airlines Turkey is a traveler’s and photographer’s dream. The diversity in culture and landscape paired with the generosity of its people makes this country extremely unique. Recently, there has been an increase in the number o…
Cisco Threat Response: Open Source Integrations You Can Use Now
Cisco Threat Response is built upon a collection of APIs; which can be used to integrate your Cisco and third-party security products, automate the incident response process and manage threat intelligence and security context data in a single location. Over the next few months, our team will be work…
Nearly every threat is either on an endpoint, or it’s headed there
This is because the endpoint is, well, the end. That is where data resides; where individuals organize, communicate, and conduct nearly all activities of their lives; and is often considered the crown-jewel of your organization by the bad-guys. I’ve heard some people call the endpoint the new perime…
Protecting Users and Endpoints in a Multicloud World
Online criminals are constantly gaining entry into business environments through phishing attacks or exploit kits, then applying ransomware. Bad actors are compromising popular websites and bringing up new domains to host malware and botnets. The unfortunate truth is attacks of this nature are lucra…
Introducing Cloud-based Endpoint Security for Managed Security Service Providers
[ authored by Kelsey Brewer, Cisco Cyber Security Manager ] Security teams know the endpoints within their environments are being targeted by advanced threats, but often lack the bandwidth, tools, and budget to adequately respond. As a result, organizations of all sizes are choosing to augmen…