AMP

December 19, 2016

SECURITY

To be Effective, Security Needs to Be a Force Multiplier

4 min read

Effective security is simple, open, and automated.  We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard to figure out even in elite operations. What […]

December 9, 2016

SECURITY

Prevent, Detect and Respond with Cisco AMP for Endpoints

4 min read

Cyberattacks are ever evolving to circumvent and evade “protection-only” technologies. Despite your best efforts to protect against compromise, a persistent attacker will eventually breach your defenses and get inside. Then what? IT security teams need to automatically detect a threat when it gets in. They need to know where it came from, how it entered, […]

November 1, 2016

PARTNER

The 3 S’s of Success: Security. Software. Simplicity.

2 min read

Our most profitable partners sell security. And the underpinning of security solutions is software. Yet profit isn’t the only reason you should amp up your security practice. With cyberattacks increasing...

August 10, 2016

SECURITY

Cisco achieves 100% detection in Breach test

4 min read

And why 100% detection is grossly misleading It is with great pride that we received the latest Breach Detection Report from NSS Labs, in which Cisco achieved a 100% detection...

June 14, 2016

SECURITY

Advanced Malware Evasion Techniques HTTP-Evader

1 min read

Malware doesn’t play by the rules, so today’s IT infrastructure needs to provide several layers of defense for end-users.  Some of the more common devices used to protect modern networks are Intrusion Prevention systems (IPS) and Firewalls. In recent years, there has been a lot of research on how evasion techniques bypass Intrusion Prevention systems […]

June 8, 2016

SECURITY

AMP for Endpoints + Cognitive Threat Analytics = More Visibility than Ever Before

2 min read

No matter how many security tools you deploy to defend your organization, malware is going to get in. You need to see it if you want any chance of stopping...

April 11, 2016

SECURITY

Solving the Security Patchwork Problem

3 min read

Hackers today make it their job to understand your security technologies and how to exploit the gaps between them. And that’s the problem – there are a lot of gaps. In our own discussions with IT security pros, it isn’t unusual to find organizations that have deployed a patchwork of 40 to 60+ different security […]

March 29, 2016

SECURITY

The Power of an Integrated Threat Defense

2 min read

At RSA this year and last, Marty Roesch, VP and Chief Architect for Cisco’s Security Business Group, talked about the need of an integrated threat defense to drive systemic response. The idea is to correlate and analyze data and telemetry from the multiple security technologies that organizations have deployed across different control points. And then […]

March 21, 2016

SECURITY

Endpoint Protection Platform (EPP) vs Endpoint Detection & Response (EDR)

4 min read

Many colleagues, customers, and Cisco partners have asked me, “Why isn’t Cisco AMP for Endpoints included in Gartner’s recent Magic Quadrant for Endpoint Protection Platforms (EPP)?” The answer to us is pretty simple. AMP was not categorized as a traditional “EPP,” and hence, was not included in the report. According to Gartner, “Endpoint protection platforms […]