AMP for Endpoints
Incident response: Putting all the R’s in IR
It is well established that the ‘R’ in IR stands for “Response.” But given the challenges facing incident response teams today, IR could just as well stand for “It’s Rough.”
Three New Integrations for AMP for Endpoints with IBM Security
IBM and Cisco Security continue to work together to deliver advanced integrations, resulting in improved network visibility and faster threat detection and response.
Cisco Threat Response: Open Source Integrations You Can Use Now
Cisco Threat Response is built upon a collection of APIs; which can be used to integrate your Cisco and third-party security products, automate the incident response process and manage...
Threat Hunting for the Holidays
Cisco Threat Response demystifies and proactively speeds threat hunting for the stealthiest one percent of threats that can compromise your endpoints, exfiltrate your data, and disrupt your services becomes imperative.
Nearly every threat is either on an endpoint, or it’s headed there
This is because the endpoint is, well, the end. That is where data resides; where individuals organize, communicate, and conduct nearly all activities of their lives; and is often considered...
Defeating Polymorphic Malware with Cognitive Intelligence. Part 3: Static Analysis
Nowadays, everyone likes to talk about the use of machine learning in cybersecurity. Almost every security vendor leverages machine learning in one form or another. Organizations employ security teams with...
Empowering Defenders: AMP Unity and Cisco Threat Response
Steadily, more than two thousand customers have incorporated Threat Response and AMP Unity into their daily workflows.
Defeating Polymorphic Malware with Cognitive Intelligence. Part 2: Command Line Argument Clustering
Command Line Argument Clustering algorithm is an innovative weapon that works for security analysts to help uncover evasive malware and morphing threats in their environments.