Cisco AMP
Deep Dive into AMP and Threat Grid integration with Cisco Email Security
8 min read
In our previous blog posts about AMP and Threat Grid on Cisco Email Security, we have discussed the approach to email security, that organizations could take to protect themselves against advanced threats. We have as well discussed the components of the solution and how they work together to protect customers from the number one threat […]
From the Trenches: 5 Ways Customers are Improving Security with Cisco AMP for Endpoints
3 min read
Does this sound like a day in your IT security life? Wake up, get coffee, drive to work, and battle an almost constant onslaught of attacks, while playing whack-a-mole with too many alerts. If so, we get it. You never know where the next attack will come from. And you’re probably on to the fact […]
Addressing Healthcare Security Challenges
1 min read
It’s a gross understatement to say that security is critical in healthcare, where a breach can not only impact an organization’s effectiveness and reputation but also affect patient privacy and—worst-case scenario—health and safety. If you are reading this blog, you no doubt already know the most common challenges to securing digital healthcare organizations, from ensuring […]
Endpoint Protection Platform (EPP) vs Endpoint Detection & Response (EDR)
4 min read
Many colleagues, customers, and Cisco partners have asked me, “Why isn’t Cisco AMP for Endpoints included in Gartner’s recent Magic Quadrant for Endpoint Protection Platforms (EPP)?” The answer to us is pretty simple. AMP was not categorized as a traditional “EPP,” and hence, was not included in the report. According to Gartner, “Endpoint protection platforms […]
AFCEA West 2016: Digitization & Security for the U.S. Navy
1 min read
I’m writing to you from AFCEA WEST 2016, one of the biggest naval conferences on the West Coast. Here in San Diego, I’m surrounded by both industry experts and military leaders who are discussing how to use technology to advance the Navy’s mission to maintain, train and equip combat-ready Naval forces capable of winning wars, […]
A New Model to Protect the Endpoint, Part 1: Continuous vs. Point-in-Time Security
2 min read
The fundamental security problem that many defenders face is securing their environment in a world of continuous change. IT environments change. Threats change. But today’s threat detection technology doesn’t change. It’s stuck in time, point-in-time to be exact. Sure, detection technologies have evolved. The latest improvements include: executing files in a sandbox for detection and […]
9