Cisco Secure Endpoints

August 3, 2018

SECURITY

Evaluating Endpoint Security Platforms? Start Here.

3 min read

Industry analysts have taken notice of Cisco AMP for Endpoints:  2018 was the first year multiple analyst firms requested Cisco AMP for Endpoints to participate in their reports.

July 20, 2018

SECURITY

Demystifying: Next-Generation Endpoint Security

5 min read

The term “next-generation” is used quite frequently across the tech industry – it’s not limited to security. Let's demystify the term and its value for endpoint security.

July 3, 2018

SECURITY

Cisco Visibility Casebooks: Saving You Time When You Need It Most

2 min read

Time is critical when facing an incoming attack. Security analysts and incident responders must quickly detect, investigate, understand, and react quickly to limit any potential damage.

June 28, 2018

SECURITY

Demystifying: Machine Learning in Endpoint Security

6 min read

Deciding on a new endpoint security vendor is tough. From your very first search, you’ll get a lot of overused terms thrown at you – machine learning, artificial intelligence, next-generation...

May 21, 2018

SECURITY

The Importance of an Information Security Strategy in Mergers and Acquisitions

3 min read

Organizations that engage in M&A should include an information security strategy as part of the process.

April 18, 2018

SECURITY

NSS Labs Awards Recommended Rating to Cisco Endpoint Security

2 min read

In the hyper-competitive world of endpoints security, proof of efficacy is the only real impartial way to valuably differentiate. However, public testing for next generation endpoint security solutions such as...

April 5, 2018

SECURITY

IcedID Banking Trojan Teams up with Ursnif/Dreambot for Distribution

1 min read

This post was authored by Ross Gibb, with research contributions from Daphne Galme of Cisco, and Michael Gorelik of Morphisec, a Cisco Security Technical Alliance partner.  In November 2017...

February 28, 2018

SECURITY

The Power of Logging in Incident Response

4 min read

A deep dive into logging as an often-overlooked but powerful tool for incident detection and response “Lack of instrumentation or insufficient logging” is often a phrase used on incident response...

February 19, 2018

SECURITY

Have Your Cake and Eat it Too With Next-Generation Endpoint Security from Cisco

2 min read

When faced with an either/or situation, people typically prefer not to choose. We want the best of both worlds. Rarely does someone want peanut butter OR jelly. Have cake? You...