X
Forgotten Password?
Retry
Login
Sorry! You can't edit your cart on this page.
Sorry! This item could not be added to your cart as it is no longer available from Comms Express.
Please check the quantity you are adding and try again.
The following item has been added to your cart.
Product Code:
Options:
Qty:
Unit Price:£
View Cart
Checkout
Your cart is empty.
Subtotal:
£0
Learn more about how
to collect Data Points
for free gifts.
Remove all items from cart
Are you sure? Yes No
Request A Quote
View Cart
Apply for a Credit Account
Checkout
Cookie Policy×

Hi there! Our website may store cookies on your computer in order to give you the best experience, such as remembering the items in your cart so you can continue shopping where you left off.

By continuing to use our site, you give consent for cookies to be used.

Browse Categories
In Stock: 3 - 5 Days
£27.48
£32.98 Inc VAT.
Earn 13 Data Points when purchasing this product. More Info
Qty:

Cisco Advanced Malware Protection 1YR, 500-999 Nodes

1 Node Per Item

by Cisco
See more product details
Part No:FEFP-AMP-1Y-S3
Manufacturer No:FP-AMP-1Y-S13
Delivery: In Stock: 3 - 5 Days
More Related Items
Click to change options
Length:
Fibre Size:
Apply
£9.18 Ex VAT
Qty:
£86.26 Ex VAT
Qty:
Click to change options
Colour:
Door:
Apply
£353.03 Ex VAT
Qty:
Click to change options
Length:
Colour:
Apply
£0.86 Ex VAT
Qty:
Click to change options
Colour:
Apply
£19.13 Ex VAT
Qty:
Click to change options
Colour:
Door:
Flat Pack:
Apply
£388.89 Ex VAT
Qty:
Email product to a friend
X
  • Scroll to top
    Cisco Advanced Malware Protection 1YR, 500-999 Nodes
    1 Node Per Item
    Cisco Advanced Malware Protection (AMP) for Endpoint offers the only advanced malware protection system that covers the entire attack continuum - before, during, and after an attack. It provides the continuous analysis and advanced analytics that support Cisco's retrospective security capabilities. Retrospective security is the ability to look back in time and trace processes, file activities, and communications to understand the full extent of an infection, establish the root cause, and perform remediation. The need for retrospective security arises when any indication of a compromise occurs, such as an event trigger, a change in the disposition of a file, or an indication of compromise (IoC) trigger. Retrospective security lets managers go back in time to investigate threats in their systems. Tools such as retrospection, attack-chain correlation, behavioral IoCs, trajectory, and breach hunting allow security professionals to establish scope, visibility, and control in the event of a breach. This capability helps your security team to quickly and effectively remediate all the threats in your environment before it's too late.

    Features:

    • Continuous analysis
    • Outbreak control
    • IoCs
    • File reputation
    • File analysis and sandboxing
    • File trajectory
    • Device trajectory
    • Elastic Search
    • Protection beyond point-in-time
    • Attack-chain visibility
    • Advanced analysis
    • Investigation that turns the hunted into the hunter
    • Simplified containment
    • Actionable, contextual dashboards
    • Tightly integrated platforms
    • Continuous analysis

      AMP for Endpoint uses cloud-based big data analytics to go beyond point-in-time detection by constantly reevaluating new and historical data gathered over time to detect stealthy attacks.

    • Outbreak control

      AMP for Endpoint provides the capabilities to detect and control suspicious files across endpoints for both future and past threat occurrences. Outbreak control is one of the key features that help you quickly stop malware from spreading in your environment.

    • IoCs

      AMP for Endpoint automatically correlates multisource security event data, such as intrusion and malware events, to help security teams connect events to larger, coordinated attacks.

    • File reputation

      Employs advanced analytics and collective intelligence to determine whether a file is clean or malicious, improving the accuracy of detection.

    • File analysis and sandboxing

      Uses a highly secure environment to execute, analyze, and test malware behavior, helping you discover previously unknown zero-day threats.

    • File trajectory

      Tracks file propagation in your environment over time, so you can minimize the time required to scope a malware breach.

    • Device trajectory

      Tracks system-level activity and communications over time, allowing you to quickly understand root causes and the history of events leading up to and following a compromise.

    • Elastic Search

      Provides a simple, unbounded search across file, telemetry, and collective security intelligence data, helping you connect the context and scope of an exposure to an IoC or malicious application.

    • Protection beyond point-in-time

      AMP for Endpoint applies a retrospective security approach to traditional detection, helping defenses improve on point-in-time capabilities and become more effective, efficient, and pervasive.

    • Attack-chain visibility

      AMP for Endpoint does more than retrospection. It introduces a new level of intelligence, linking, and correlating various forms of retrospection into a lineage of activity available for real-time analysis. It then looks for patterns of malicious behavior on an individual endpoint or across the environment of endpoints.

    • Advanced analysis

      AMP for Endpoint provides automated, advanced behavior detection capabilities that deliver a prioritized and collated view of top areas of compromise and risk.

    • Investigation that turns the hunted into the hunter

      AMP for Endpoint shifts investigative activities beyond looking for facts and clues to a focused hunt for breaches based on actual events like malware detections and behavioral IoCs.

    • Simplified containment

      AMP for Endpoint provides visibility into a chain of events and context that complements its dashboards and trajectory views. AMP for Endpoint lets you target specific applications, files, malware, and other root causes, making it quick, easy, and simple to break the attack chain.

    • Actionable, contextual dashboards

      Reports are not limited to event enumeration and aggregation. AMP for Endpoint reporting includes actionable dashboards and trending that highlights business relevance and impact from a risk perspective.

    • Tightly integrated platforms

      AMP can be activated on your Cisco Email and Web Security solutions with the flip of a switch. For greater visibility and control, AMP can be deployed inline as a dedicated network appliance and at the endpoint as a lightweight connector.

    Email product to a friend
    Print product details
    View Keywording: