Cisco AMP for Endpoints Adds New Features
The threat landscape is ever-changing. Attackers continue to innovate and refine their tactics, and malware is more sophisticated than ever. New threats are surfacing every day, like the Angler exploit kit and the SSHPsychos DDoS attack. According to the 2016 Cisco Annual Security Report, ransomware is exploding, Adobe Flash vulnerabilities continue to be popular with cybercriminals, and malicious browser extensions continue to be a main source of data leakage for businesses.
But of all the threats out there today, malware still reigns supreme. In the 2016 Cisco Annual Security Report, IT decision-makers were asked to identify the top external challenges that they faced from an IT security perspective, and malware topped the list at 68%. And the target for that malware: your endpoints. Servers, laptops, desktop workstations, PCs, Macs, Linux systems, and mobile devices are all targets. In fact, 50% of respondents in the 2016 Cisco Annual Security Report study said that mobility represents one of the highest risks within their security infrastructure for a security breach. Cybercriminals want data, control of your system, or both. You need to protect your endpoints.
This is why Cisco AMP for Endpoints continues to evolve. Cisco AMP for Endpoints is now better than ever, with new features and capabilities that boost performance, improve usability, and enable IT security teams to better defend against today’s most advanced attacks.
We’re announcing a few key updates, including:
- Windows 10 support
- Mac OSX 10.11 El Capitan support
- A new API for AMP for Endpoints
- Updates to the AMP Private Cloud Virtual Appliance
AMP for Endpoints is deployable on Windows, Mac OS, Linux CentOs and RedHat, and Android mobile devices. With Windows 10 and Mac OSX 10.11 support, you can be sure that your newest operating systems are also protected by AMP for Endpoints.
With an API enabled on AMP for Endpoints, users can more easily integrate third-party security tools and access data and events in their AMP for Endpoints account without the need to log into the management console.
And finally, for those with high privacy requirements that restrict the use of the cloud but want endpoint protection, AMP Private Cloud Virtual Appliance is a deployment option. A few updates have been made to the platform including the addition of the Vulnerabilities feature and role-based access control. Vulnerabilities alerts administrators to the presence of vulnerable software on endpoints that could serve as an attack vector for malware, while role-based access control lets users regulate access and permission to perform specific tasks within AMP based on roles of individual users.