CISCO AMP for endpoints, prevents attacks and blocks Malware at the point of entry.

CISCO AMP for terminals

CISCO AMP for endpoints, prevents attacks and blocks Malware at the point of entry.

CISCO AMP for endpoints, prevents attacks and blocks Malware at the point of entry

AMP for endpoints offers comprehensive protection against the most advanced attacks. Not only avoids breaches and blocks malware at the point of entry , but also detects, stops and provides a quick solution to threats if they elude front-line defenses and sneak in.

If something finally gets in, AMP provides a continuous threat detection and monitoring to quickly detect malicious behavior and response capabilities to quickly contain and eliminate threats before damage occurs.

To prevent attacks, Talos team’s global threat intelligence strengthens your defenses. File signatures, partial fingerprint matches, and other detection systems are used to block malware at the point of entry.

We know that not all attacks can always be prevented and that some advanced malware might get in. In this case, AMP continuously logs and analyzes all file, process and communication activity on your endpoints to quickly detect threats. This continuous logging and analysis provides security teams with a holistic view of activity across all their endpoints including Windows, Mac, Linux, and mobile devices.

AMP shows you all the history of the events recorded in the system.

This allows for what we call retrospective security. It’s about going back in time to see everything that happened during the attack, providing a deep level of visibility, context, and control to quickly detect attacks, measure the threat, and remediate malware before it causes significant damage.

When it comes to malware, timing is everything.

The average detection time in the sector is 100 days. AMP can detect malware in hours or even minutes.

From AMP’s in-browser management console, you can protect your organization. Threat indications help you identify attacks before they fully materialize. AMP automatically correlates file events with malicious behavior to discover and prioritize coordinated attacks.


Traceability shows you the entire history of a threat on a device. The origin of the threat, which causes affected applications, main processes, connections to remote hosts and unknown files downloaded by malware. Traceability allows you to switch between viewing one terminal and all terminals to see the machines affected by the threat. File analysis extracts information from the Threat Grid-powered sandbox to display even more details such as threat scores, behavioral indicators, screenshots of malware execution, and sample packet captures. Outbreak control lets you stop the advance of malware automatically with just a few clicks of the mouse.

For example, if you see malware on a terminal and want to stop it from running on all terminals on the network, just right-click and add it to a block list to quarantine the file and stop running on all devices. terminals. Low prevalence shows files on all endpoints that have gone unnoticed and that only a few users have executed. This allows these files to be further analyzed to find out if they are malicious.

The Vulnerable Software Role

It shows all the software on your endpoints that is currently vulnerable to malware so you can quickly fix it.

AMP continually crosses files scanned in the past with the latest threat intelligence and quarantines files that were previously considered safe or unknown, but are now known to be a threat.

AMP for Endpoints is part of the integrated security ecosystem that CISCO has designed to protect you.

Finally, in AMP for terminals it is not a product for specific moments and lacks synchronization. It includes an API to synchronize it with other security or SEM tools.

Threat information is shared and correlated between endpoint AMPs in the network IPS, firewall, web proxies, mail gateways… Thus, if a threat is detected in one place, all the others are protected.

Some of these capabilities allow:

  1. make better security decisions,
  2. speed up investigations,
  3. simplify endpoint security management and
  4. greatly reduce the time to detect, contain, and remediate malware.

It may seem that this involves a lot of analysis at the endpoints, however, all of these analyzes are done in the cloud. Resource consumption that affects users and renders computers unusable is a thing of the past. The cloud and endpoints communicate through AMP’s lightweight connector. It has no visible effects for users.

Share this post