Cisco AMP for Endpoints
Better design for simpler, more effective security
Few will contest the notion that security is complex. Evolving threats. Clever, motivated attackers. And all too often, vendor-inflicted complexity of managing security from the mismatched consoles from dozens of vendors. In this case, not only must users jump between consoles but the actions tha…
How to Choose a Next-Generation Endpoint Security Solution
When organizations begin their search for an advanced, next-generation endpoint security solution to protect PCs, Macs, servers, and mobile devices, they have a lot of different vendors to choose from and a lot of questions. Can it prevent attacks? What kind of malware can it protect against? What i…
IDC Names Cisco AMP for Endpoints a Leader in 2017 Endpoint Security Marketscape
Global analyst firm IDC recently named Cisco AMP for Endpoints a leader amongst endpoint security solutions in their report, “IDC Marketscape: Worldwide Endpoint Specialized Threat Analysis and Protection 2017 Vendor Assessment” (April 2017, IDC #US42385717). The IDC study examines market-leading en…
EPP? EDR? Cisco AMP for Endpoints is Next Generation Endpoint Security
You may be wondering why Cisco AMP for Endpoints was not included in Gartner’s 2017 Magic Quadrant for Endpoint Protection Platforms (EPP). Traditionally, Gartner placed Cisco AMP for Endpoints within their Endpoint Detection and Response (EDR) category of endpoint security tools. But as buyer needs…
Effective Endpoint Security – More than Meets the Eye
One of your sales people, Susan, is on the road putting some finishing touches on a presentation before a big meeting. Using the hotel Wi-Fi she does a quick search to see if there’s any relevant company or industry news she needs to know about before meeting with the client. She clicks on several w…
Prevent, Detect and Respond with Cisco AMP for Endpoints
Cyberattacks are ever evolving to circumvent and evade “protection-only” technologies. Despite your best efforts to protect against compromise, a persistent attacker will eventually breach your defenses and get inside. Then what? IT security teams need to automatically detect a threat when it gets i…
Transforming Endpoint Security
It’s been said before, but this bears repeating. On average, it takes organizations 100 days1 or more to detect a breach after it occurs. On average. This means attackers often have more than three months to examine an organization’s data and then steal what they want. Clearly, this is not effective…
Endpoint Protection Platform (EPP) vs Endpoint Detection & Response (EDR)
Many colleagues, customers, and Cisco partners have asked me, “Why isn’t Cisco AMP for Endpoints included in Gartner’s recent Magic Quadrant for Endpoint Protection Platforms (EPP)?” The answer to us is pretty simple. AMP was not categorized as a traditional “EPP,” and hence, was not included in the…
3