Cisco Advanced Malware Protection (Cisco AMP for Endpoints)
Offer a reference bonus
2.00

Cisco Advanced Malware Protection (Cisco AMP for Endpoints)

Cisco

ROI-
USD
Using1
Selling2

PitchCisco Advanced Malware Protection - a system that protects your business before, during and after an attack, making it the most robust form of malware protection available.

Product features

Description

Cisco Advanced Malware Protection (AMP) - a system that protects your business before, during and after an attack, making it the most robust form of malware protection available. Cisco AMP employs global threat intelligence to fortify your network’s defenses before an infiltration even occurs. During a network breach, it identifies and blocks the attack using a powerful combination of intelligence, file signatures and advanced malware analysis. After an attacker infiltrates your network, Cisco AMP arms your security team with a clear view of the malware’s origin, its method and point of entry, where it’s been, and its current trajectory. This combination of point-in-time and retrospective security make it possible to discover, confine, and dissolve the threat fast enough to protect your business from irreversible damage. Using Cisco AMP gives your business access to a wide selection of security features, including:
  • Filtering out policy-violating files from the Internet, e-mails, and more.
  • Detecting and protecting against client-side exploit attempts and exploit attempts aimed at client applications like Java and Flash.
  • Recognizing, blocking, and analyzing malicious files.
  • Identifying malware patterns and anticipating potentially breached devices.
  • Tracking malware’s spread and communications.
  • Alleviating threats of reinfection.

Problems that the product solves

No IT security guidelines

Unauthorized access to corporate IT systems and data

Risk or Leaks of confidential information

Malware infection via Internet, email, storage devices

Risk of attacks by hackers

Risk of data loss or damage

Risk of lost access to data and IT systems

Non-compliant with IT security requirements

Customer fraud

Values

Reduce Costs

Ensure Security and Business Continuity

Ensure Compliance

Characteristics (Network Sandboxing)

Web traffic scan

Avaliable

Email scan

Yes

Endpoint protection

Avaliable

Mobile protection

Avaliable

Malware Detection in files

Avaliable

Encrypted traffic scan

N/A

Network shares scan

Avaliable

YARA files scanning

N/A

YARA implementation by customer

N/A

Malware blocking by protocols

Avaliable

CPU-level detection

N/A

OS kernel level detection

N/A

Malware Samples

Avaliable

Zero-day threats protection

Avaliable

Detecting C&C server

Avaliable

Hardware Applience

Avaliable

Working in in-band/out-of-band modes

Avaliable

Cloud

Avaliable

Threat Intelligence Feeds

Avaliable

SIEM Integration

Avaliable

Vulnerability manager

Avaliable

Uploading "Golden Image"

N/A

Using Multiple OSes

Avaliable

Multiple Versions of Sandbox App

N/A

Payload detonation

Avaliable

Auto-uploading files

Avaliable

URL analysis

Avaliable

Analyst console

Avaliable

Security Reports

Periodic reports, Contextual reports on threats

Alerts via Email

Avaliable

Central Policy Management for Data Protection

Avaliable

Forensic analysis of data history

Avaliable

Automated remediation capabilities

Avaliable

Auto Update of Signatures

Avaliable

Trial

Yes

Competitive products

prev
next

User features

Roles of Interested Employees

Chief Executive Officer

Chief Information Officer

Chief IT Security Officer

IT Security and Risk Management

Organizational Features

IT Security Department in company

GDPR Compliance

Internet access is available for employees