AMP for Endpoints

July 3, 2018

SECURITY

Cisco Visibility Casebooks: Saving You Time When You Need It Most

Time is critical when facing an incoming attack. Security analysts and incident responders must quickly detect, investigate, understand, and react quickly to limit any potential damage.

June 28, 2018

SECURITY

Demystifying: Machine Learning in Endpoint Security

Deciding on a new endpoint security vendor is tough. From your very first search, you’ll get a lot of overused terms thrown at you – machine learning, artificial intelligence, next-generation...

May 21, 2018

SECURITY

The Importance of an Information Security Strategy in Mergers and Acquisitions

Organizations that engage in M&A should include an information security strategy as part of the process.

April 18, 2018

SECURITY

NSS Labs Awards Recommended Rating to Cisco Endpoint Security

In the hyper-competitive world of endpoints security, proof of efficacy is the only real impartial way to valuably differentiate. However, public testing for next generation endpoint security solutions such as...

April 5, 2018

SECURITY

IcedID Banking Trojan Teams up with Ursnif/Dreambot for Distribution

This post was authored by Ross Gibb, with research contributions from Daphne Galme of Cisco, and Michael Gorelik of Morphisec, a Cisco Security Technical Alliance partner.  In November 2017...

February 28, 2018

SECURITY

The Power of Logging in Incident Response

A deep dive into logging as an often-overlooked but powerful tool for incident detection and response “Lack of instrumentation or insufficient logging” is often a phrase used on incident response...

February 19, 2018

SECURITY

Have Your Cake and Eat it Too With Next-Generation Endpoint Security from Cisco

When faced with an either/or situation, people typically prefer not to choose. We want the best of both worlds. Rarely does someone want peanut butter OR jelly. Have cake? You...

January 31, 2018

SECURITY

Are You Using Yesterday’s Tools to Stop Today’s Threats?

Take a look around you. What’s the average age of the technology you see? Your cell phone is probably 2 years old at most. Your laptop may be slightly older....

January 3, 2018

SECURITY

Introducing Exploit Prevention to Stop File-Less Attacks

In war, any good military strategist will try to exploit their enemy’s weaknesses. Cybercriminals are no different. Their latest tactic: use file-less attacks to exploit vulnerabilities in everyday applications.