Cisco AMP for Endpoints

Continuously monitor all file behavior to uncover stealthy attacks. Detect, block, and remediate advanced malware across all endpoints.

Request More Information

Next-generation endpoint security.

Get global threat intelligence, advanced sandboxing, and real-time malware blocking to prevent breaches with Cisco Advanced Malware Protection (AMP).

Don't rely on prevention alone, AMP continuously analyses file activity across your extended network, so you can quickly detect, contain, and remove advanced malware.

<
Key features

Prevent, detect, and respond

AMP for Endpoints.

AMP for Endpoints provides complete protection against the most advanced attacks. Not only will AMP prevent breaches and block malware at the point of entry, but it will also rapidly detect, contain, and remediate advanced threats if they evade front-line defenses and get inside.

Deep visibility, context, and control

AMP for Endpoints.

No prevention method will catch every threat. You need to be prepared when advanced malware gets inside. That’s why AMP for Endpoints gives you deep visibility into executable and file activity across all of your endpoints so you can spot threats fast, scope a compromise, and remediate instantly.

Threat intelligence and sandboxing

AMP for Endpoints.

Our Cisco Talos group analyzes millions of malware samples and terabytes of data per day, and pushes that intelligence to AMP so you’re protected around the clock. Also, advanced sandboxing capabilities perform automated static and dynamic analysis of files against more than 700 behavioral indicators to uncover stealthy threats. Now that's intelligent endpoint security.

Block malware in real time

AMP for Endpoints.

AMP automatically detects and blocks known and emerging threats in real time using both cloud- and system-based technologies that include global big data analytics, machine-learning, fuzzy fingerprinting, a built-in antivirus engine, rootkit scanning, and more.

Continuous monitoring and recording

AMP for Endpoints.

Once a file lands on the endpoint, AMP continues to watch, analyze, and record file activity, regardless of the file’s disposition. When malicious behavior is detected, AMP shows you the recorded history of the malware’s behavior over time: where it came from, where it’s been, and what it’s doing. Then AMP will automatically quarantine and remediate the file across all endpoints.

Broad endpoint coverage

AMP for Endpoints.

Malware can attack through a variety of attack vectors. You need endpoint security that can protect them all. AMP protects endpoints running Windows, Mac OS, Android, and Linux. Deploy AMP’s lightweight connector, and users see no impact on device performance because AMP performs all analysis in the cloud, not on the endpoint itself.


How to deploy

It’s simple. AMP is a cloud-based software-as-a-service endpoint security solution. You deploy AMP’s lightweight connector on your endpoints, and then set up your account. Work with your Cisco salesperson or partner and follow these easy steps.

Choose the number of endpoints

50? 1000? 100,000? There’s no limit. The choice is yours.

Choose a subscription term

Terms are available for 1, 3, or 5 years.

Deploy the connector

Deploy AMP’s lightweight connector on your endpoints and sync with your account.