Hi there! Our website may store cookies on your computer in order to give you
the best experience, such as remembering the items in your cart so you
can continue shopping where you left off.
By continuing to use our site, you give consent for cookies to be used.
Next working day delivery to most UK Mainland postcodes on orders placed before 17:30 Monday to Friday. Additional charges may apply dependant on location, floor standing cabinets and other heavy/bulky items.
£104.33
£125.20 Inc VAT
52
Earn 52 Data Points when purchasing this product. More Info
Sorry, this item is no longer available from Comms Express.
Delivery to UK Mainland on orders placed before 4:30pm Mon-Fri currently estimated 1-2 Working Days due to current service disruption. Additional charges may apply dependant on location, floor standing cabinets and other heavy/bulky items.
Organizations today are under the constant threat of cyber attack, and security breaches happen every day. Cisco Advanced Malware Protection (AMP) for Endpoints is a cloud-managed endpoint security solution that provides the visibility, context and control to not only prevent cyber attacks, but also rapidly detect, contain, and remediate advanced threats if they evade front-line defenses and get inside—all cost-effectively, without affecting operational efficiency, and before damage can be done.
AMP for Endpoints prevents attacks by providing the latest global threat intelligence to strengthen defenses, a built-in antivirus (AV) engine to detect and block attacks at point-of-entry, built-in sandboxing technology to analyze unknown files, and proactive protection capabilities that close attack pathways and minimize vulnerabilities. But if malware evades these prevention measures and gets inside, AMP for Endpoints continuously monitors and records all file activity to quickly detect malicious behavior, retrospectively alert security teams, and then provide deep visibility and a detailed recorded history of the malware's behavior over time—where it came from, where it's been, and what it's doing. AMP can then automatically contain and remediate the threat. AMP protects endpoints—like laptops, workstations, servers, and mobile devices—running Windows, Mac OS, Linux, Android and iOS. Understand AMP for Endpoints in 5 minutes.
Key features
Protection that goes beyond prevention: Cisco AMP for Endpoints goes beyond just preventing attacks. It analyzes files and traffic continuously. This capability helps enable retrospective security. You can look back in time and trace processes, file activities, and communications to understand the full extent of an infection, establish root causes, and perform remediation. The result: more effective, efficient, and pervasive protection for your organization.
Monitoring that enables unmatched visibility: Cisco AMP for Endpoints offers more than retrospection. It introduces a new level of intelligence, linking and correlating various forms of retrospection into a lineage of activity available for analysis in real time. It can then look for patterns of malicious behavior from an individual endpoint or across the environment of endpoints.
Advanced analysis that looks at behaviors over time: Cisco AMP for Endpoints provides automation through advanced behavioral detection capabilities that deliver a prioritized and collated view of top areas of compromise and risk.
Investigation that turns the hunted into the hunter: Cisco AMP for Endpoints shifts activity from looking for facts and clues as part of an investigation to a focused hunt for breaches based on actual events like malware detections and behavioral indications of compromise (IoCs).
Containment that is truly simple: Cisco AMP for Endpoints provides visibility into the chain of events and context that complements its dashboards and trajectory views. AMP provides the ability to target specific applications, files, malware, and other root causes. Breaking the attack chain is not only quick but also easy.
Dashboards that are actionable and contextual: Reports are not limited to event enumeration and aggregation. Cisco AMP for Endpoints' actionable dashboards allow for streamlined management and faster response.
Integrated platforms that work better together: Cisco AMP for Endpoints can be fully integrated with the Cisco AMP for Networks solution, and other AMP deployments, to further increase visibility and control across your organization.
Features:
Continuous analysis
Outbreak control
IoCs
File reputation
File analysis and sandboxing
File trajectory
Device trajectory
Elastic Search
Protection beyond point-in-time
Attack-chain visibility
Advanced analysis
Investigation that turns the hunted into the hunter
Simplified containment
Actionable, contextual dashboards
Tightly integrated platforms
Continuous analysis
AMP for Endpoint uses cloud-based big data analytics to go beyond point-in-time detection by constantly reevaluating new and historical data gathered over time to detect stealthy attacks.
Outbreak control
AMP for Endpoint provides the capabilities to detect and control suspicious files across endpoints for both future and past threat occurrences. Outbreak control is one of the key features that help you quickly stop malware from spreading in your environment.
IoCs
AMP for Endpoint automatically correlates multisource security event data, such as intrusion and malware events, to help security teams connect events to larger, coordinated attacks.
File reputation
Employs advanced analytics and collective intelligence to determine whether a file is clean or malicious, improving the accuracy of detection.
File analysis and sandboxing
Uses a highly secure environment to execute, analyze, and test malware behavior, helping you discover previously unknown zero-day threats.
File trajectory
Tracks file propagation in your environment over time, so you can minimize the time required to scope a malware breach.
Device trajectory
Tracks system-level activity and communications over time, allowing you to quickly understand root causes and the history of events leading up to and following a compromise.
Elastic Search
Provides a simple, unbounded search across file, telemetry, and collective security intelligence data, helping you connect the context and scope of an exposure to an IoC or malicious application.
Protection beyond point-in-time
AMP for Endpoint applies a retrospective security approach to traditional detection, helping defenses improve on point-in-time capabilities and become more effective, efficient, and pervasive.
Attack-chain visibility
AMP for Endpoint does more than retrospection. It introduces a new level of intelligence, linking, and correlating various forms of retrospection into a lineage of activity available for real-time analysis. It then looks for patterns of malicious behavior on an individual endpoint or across the environment of endpoints.
Advanced analysis
AMP for Endpoint provides automated, advanced behavior detection capabilities that deliver a prioritized and collated view of top areas of compromise and risk.
Investigation that turns the hunted into the hunter
AMP for Endpoint shifts investigative activities beyond looking for facts and clues to a focused hunt for breaches based on actual events like malware detections and behavioral IoCs.
Simplified containment
AMP for Endpoint provides visibility into a chain of events and context that complements its dashboards and trajectory views. AMP for Endpoint lets you target specific applications, files, malware, and other root causes, making it quick, easy, and simple to break the attack chain.
Actionable, contextual dashboards
Reports are not limited to event enumeration and aggregation. AMP for Endpoint reporting includes actionable dashboards and trending that highlights business relevance and impact from a risk perspective.
Tightly integrated platforms
AMP can be activated on your Cisco Email and Web Security solutions with the flip of a switch. For greater visibility and control, AMP can be deployed inline as a dedicated network appliance and at the endpoint as a lightweight connector.
Email product to a friend Print product details
View Keywording:
Due to the size, weight and delicate nature of Data and Server Cabinets, specialist couriers are required so they arrive on site in pristine condition.
We do our utmost to bare the delivery costs meaning we can deliver your cabinet free of charge to most areas, unfortunately there are some areas of the UK we are charged a lot more to deliver to and whilst we absorb as much of this cost as we viably can in certain cases we have to pass on some of these costs. Below is a list of these areas and the additional costs of delivery per cabinet.