AMP for Endpoints

August 29, 2018

SECURITY

New Study Shows Correlating Network and Endpoint Data is Highly Manual

We recently commissioned Forrester research to survey IT security professionals to find out what their desired end state was when it came to correlating security intelligence from network and endpoint....

August 27, 2018

SECURITY

Jamf Pro now integrated with Cisco Security Connector

Cisco Security Connector is now integrated with Jamf Pro (formerly known as the Casper Suite), a leading Enterprise Mobility Management (EMM) tool.

August 26, 2018

SECURITY

Protecting SugarCreek’s 24/7 Food Manufacturing Across Four States

SugarCreek Brandworthy food solutions is a growing, mid-western food manufacturer helping some of the industry’s largest and best-known companies develop innovative food solutions.

August 21, 2018

SECURITY

Streamlining Threat Investigations with AMP Unity

Preventing malware incidents is very much like preventing bad things from happening in our day-to-day life. We all take precautions every day (well, most of us do, anyway). Actions as...

August 3, 2018

SECURITY

Evaluating Endpoint Security Platforms? Start Here.

Industry analysts have taken notice of Cisco AMP for Endpoints:  2018 was the first year multiple analyst firms requested Cisco AMP for Endpoints to participate in their reports.

July 20, 2018

SECURITY

Demystifying: Next-Generation Endpoint Security

The term “next-generation” is used quite frequently across the tech industry – it’s not limited to security. Let's demystify the term and its value for endpoint security.

July 3, 2018

SECURITY

Cisco Visibility Casebooks: Saving You Time When You Need It Most

Time is critical when facing an incoming attack. Security analysts and incident responders must quickly detect, investigate, understand, and react quickly to limit any potential damage.

June 28, 2018

SECURITY

Demystifying: Machine Learning in Endpoint Security

Deciding on a new endpoint security vendor is tough. From your very first search, you’ll get a lot of overused terms thrown at you – machine learning, artificial intelligence, next-generation...

May 21, 2018

SECURITY

The Importance of an Information Security Strategy in Mergers and Acquisitions

Organizations that engage in M&A should include an information security strategy as part of the process.