Cisco unveiled a new approach to endpoint security, named AMP for Endpoints, at its Cisco Partner Summit.
By combining prevention, detection and response in one SaaS-deployed, cloud-managed solution, it reduces complexity and stops more threats. Through this cloud-based approach, AMP for Endpoints gets actionable intelligence into the hands of organizations faster, giving them an edge against today’s attackers.
Cisco’s AMP for Endpoints offers next-generation prevention, which includes the latest global threat intelligence from Cisco Talos at its backbone, offering technology to analyse files.
Greater visibility and faster detection is embedded through continuous monitoring and shared analytics, that enables the detection of stealth attacks.
The solution also enables a more effective response based on deep visibility and a detailed recorded history of malware’s behaviour over time, including identification of where it came from, where it has been and what it has been doing.
The new approach to endpoint security is based on the continued struggle organisations face in trying to protect mobile users, desktops, laptops and servers from advanced malware attacks.
Scott Harrell, Vice President, Product Management for Security Business, Cisco Systems said: “Today’s AMP for Endpoints launch is a critical milestone. Customers now have the opportunity to simplify their endpoint security strategy, securing mobile users, servers and desktops by leveraging Cisco’s threat-centric security architecture.”
The company is also introducing a new way for customers to simplify how to buy and deploy its security software and gain more value from its architectural approach.
This is to be explored through the Cisco ONE Software, which will be extended into advanced security to simplify the purchase of infrastructure security in the Data Centre, WAN and Access domains.
Three new advanced security software suites are now available, known as Threat defence for Data Centre, Threat defence for WAN and Edge and Policy and threat defence for Access.
Each software suite is customised with key security products and services for each domain.
This article is from the CBROnline archive: some formatting and images may not be present.