Cisco AMP

August 9, 2017

SECURITY

Deep Dive into AMP and Threat Grid integration with Cisco Email Security

8 min read

In our previous blog posts about AMP and Threat Grid on Cisco Email Security, we have discussed the approach to email security, that organizations could take to protect themselves against advanced threats. We have as well discussed the components of the solution and how they work together to protect customers from the number one threat […]

July 31, 2017

SECURITY

From the Trenches: 5 Ways Customers are Improving Security with Cisco AMP for Endpoints

3 min read

Does this sound like a day in your IT security life? Wake up, get coffee, drive to work, and battle an almost constant onslaught of attacks, while playing whack-a-mole with too many alerts. If so, we get it. You never know where the next attack will come from. And you’re probably on to the fact […]

March 17, 2017

HEALTHCARE

Addressing Healthcare Security Challenges

1 min read

It’s a gross understatement to say that security is critical in healthcare, where a breach can not only impact an organization’s effectiveness and reputation but also affect patient privacy and—worst-case scenario—health and safety. If you are reading this blog, you no doubt already know the most common challenges to securing digital healthcare organizations, from ensuring […]

March 21, 2016

SECURITY

Endpoint Protection Platform (EPP) vs Endpoint Detection & Response (EDR)

4 min read

Many colleagues, customers, and Cisco partners have asked me, “Why isn’t Cisco AMP for Endpoints included in Gartner’s recent Magic Quadrant for Endpoint Protection Platforms (EPP)?” The answer to us is pretty simple. AMP was not categorized as a traditional “EPP,” and hence, was not included in the report. According to Gartner, “Endpoint protection platforms […]

February 18, 2016

GOVERNMENT

AFCEA West 2016: Digitization & Security for the U.S. Navy

1 min read

I’m writing to you from AFCEA WEST 2016, one of the biggest naval conferences on the West Coast. Here in San Diego, I’m surrounded by both industry experts and military leaders who are discussing how to use technology to advance the Navy’s mission to maintain, train and equip combat-ready Naval forces capable of winning wars, […]

June 25, 2014

SECURITY

A New Model to Protect the Endpoint, Part 1: Continuous vs. Point-in-Time Security

2 min read

The fundamental security problem that many defenders face is securing their environment in a world of continuous change. IT environments change. Threats change. But today’s threat detection technology doesn’t change. It’s stuck in time, point-in-time to be exact. Sure, detection technologies have evolved. The latest improvements include: executing files in a sandbox for detection and […]