threat hunting
Getting more value from your endpoint security tool #3: Querying Tips for Incident Investigation
3 min read
Cisco Orbital Advanced Search has an entire category dedicated to Forensics, which contains queries to collect data such as installed programs on the host, types of failed login attempts, operating system attributes, and more.
Delivering Security That is Effective and Simple – That’s No Easy Feat
5 min read
We’re incredibly proud to unleash SecureX on the security market and we’re continuing to innovate in the products that underline SecureX being the broadest most integrated platform.
Why Endpoint Security Matters in Protecting Remote Workers – Part 1
3 min read
Enabling your workforce to work securely on any endpoint, anywhere, is now more important than ever. See our customer’s thoughts on the value that AMP for Endpoints brings to their business.
Endpoint Security from Cisco Earns High Marks in Independent Malware Protection Test
4 min read
Cisco Advanced Malware Protection (AMP) for Endpoints earned high marks in malware protection tests, while achieving the lowest false alarms in the first AV Comparatives Business Main Test Series for 2020.
Cisco Threat Response takes the leap with SecureX
5 min read
Are Threat Response and Cisco SecureX the same thing? Read how SecureX builds on Threat Response’s core aspects to simplify your security for greater efficiency across SecOps, NetOps, and ITOps.
Getting more value from your endpoint security tool #2: Querying Tips for threat hunting
2 min read
Cisco Orbital Advanced Search has an entire section of its Catalog dedicated to Threat Hunting, mapped to the MITRE ATT&CK™ framework, allowing you to query your endpoints for malicious artifacts.
How to Defend Against Command-and-Control attacks: Don’t let your network turn into a Zombie
5 min read
Learn how to defend against Command-and-Control attacks using the powerful combination of Cisco Umbrella and AMP for endpoint. Prevent malicious malware from gaining foothold in your environment and recruiting botnets to compromise systems and exfiltrate your data.
Security Reimagined
4 min read
We must challenge the conventional wisdom of security: every new threat vector requires a new solution. That you must keep adding new tools, new methodologies — and more people — to protect users, devices, apps, and networks.
Threat hunting doesn’t have to be difficult—Taking a proactive position with your cybersecurity
4 min read
Threat hunting takes a more proactive stance to threat detection and is available for organizations of all sizes and security maturation levels.