AMP for Endpoints

May 2, 2019

SECURITY

Incident response: Putting all the R’s in IR

It is well established that the ‘R’ in IR stands for “Response.” But given the challenges facing incident response teams today, IR could just as well stand for “It’s Rough.”

March 2, 2019

SECURITY

Three New Integrations for AMP for Endpoints with IBM Security

IBM and Cisco Security continue to work together to deliver advanced integrations, resulting in improved network visibility and faster threat detection and response.

January 16, 2019

SECURITY

Securing the Central Hub of our World: Turkey

Cisco AMP and Cisco Umbrella Secures Istanbul Grand Airport and Turkish Airlines Turkey is a traveler’s and photographer’s dream. The diversity in culture and landscape paired with the generosity of...

December 18, 2018

SECURITY

Cisco Threat Response: Open Source Integrations You Can Use Now

Cisco Threat Response is built upon a collection of APIs; which can be used to integrate your Cisco and third-party security products, automate the incident response process and manage...

December 18, 2018

SECURITY

Threat Hunting for the Holidays

Cisco Threat Response demystifies and proactively speeds threat hunting for the stealthiest one percent of threats that can compromise your endpoints, exfiltrate your data, and disrupt your services becomes imperative.

December 12, 2018

SECURITY

Nearly every threat is either on an endpoint, or it’s headed there

This is because the endpoint is, well, the end. That is where data resides; where individuals organize, communicate, and conduct nearly all activities of their lives; and is often considered...

December 4, 2018

SECURITY

Defeating Polymorphic Malware with Cognitive Intelligence. Part 3: Static Analysis

Nowadays, everyone likes to talk about the use of machine learning in cybersecurity. Almost every security vendor leverages machine learning in one form or another. Organizations employ security teams with...

October 12, 2018

SECURITY

Empowering Defenders: AMP Unity and Cisco Threat Response

Steadily, more than two thousand customers have incorporated Threat Response and AMP Unity into their daily workflows.

September 29, 2018

SECURITY

Defeating Polymorphic Malware with Cognitive Intelligence. Part 2: Command Line Argument Clustering

Command Line Argument Clustering algorithm is an innovative weapon that works for security analysts to help uncover evasive malware and morphing threats in their environments.