AMP for Endpoints
Cisco Visibility Casebooks: Saving You Time When You Need It Most
Time is critical when facing an incoming attack. Security analysts and incident responders must quickly detect, investigate, understand, and react quickly to limit any potential damage.
Demystifying: Machine Learning in Endpoint Security
Deciding on a new endpoint security vendor is tough. From your very first search, you’ll get a lot of overused terms thrown at you – machine learning, artificial intelligence, next-generation...
The Importance of an Information Security Strategy in Mergers and Acquisitions
Organizations that engage in M&A should include an information security strategy as part of the process.
NSS Labs Awards Recommended Rating to Cisco Endpoint Security
In the hyper-competitive world of endpoints security, proof of efficacy is the only real impartial way to valuably differentiate. However, public testing for next generation endpoint security solutions such as...
IcedID Banking Trojan Teams up with Ursnif/Dreambot for Distribution
This post was authored by Ross Gibb, with research contributions from Daphne Galme of Cisco, and Michael Gorelik of Morphisec, a Cisco Security Technical Alliance partner. In November 2017...
Have Your Cake and Eat it Too With Next-Generation Endpoint Security from Cisco
When faced with an either/or situation, people typically prefer not to choose. We want the best of both worlds. Rarely does someone want peanut butter OR jelly. Have cake? You...
Are You Using Yesterday’s Tools to Stop Today’s Threats?
Take a look around you. What’s the average age of the technology you see? Your cell phone is probably 2 years old at most. Your laptop may be slightly older....
Introducing Exploit Prevention to Stop File-Less Attacks
In war, any good military strategist will try to exploit their enemy’s weaknesses. Cybercriminals are no different. Their latest tactic: use file-less attacks to exploit vulnerabilities in everyday applications.