2019-03-11T07:21:00Z
it_user434868 - PeerSpot reviewer
Senior Director of Delivery at a tech services company with 51-200 employees
  • 0
  • 35

What do you like most about Cisco AMP for Endpoints?

Hi Everyone,

What do you like most about Cisco AMP for Endpoints?

Thanks for sharing your thoughts with the community!

19
PeerSpot user
19 Answers
Pardeep Sharma - PeerSpot reviewer
Network security engineer at a tech services company with 1,001-5,000 employees
Real User
Top 5
2021-05-14T17:19:12Z
May 14, 2021

The most valuable feature is signature-based malware detection.

Search for a product comparison
User1#2% - PeerSpot reviewer
Application Manager at Financial Corp
Real User
Top 10
2020-10-20T04:19:00Z
Oct 20, 2020

Among the most valuable features are the exclusions. And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source.

MD.SIHAB TALUKDAR - PeerSpot reviewer
System Engineer at asa
Real User
Top 5Leaderboard
2020-10-13T07:21:00Z
Oct 13, 2020

The entirety of our network infrastructure is Cisco and the most valuable feature is the integration.

Mark Bonnamy - PeerSpot reviewer
Technical Director at Ridgewall Ltd
Reseller
2020-07-12T11:48:00Z
Jul 12, 2020

If somebody has been compromised, the question always is: How has it affected other devices in the network? Cisco AMP gives you a very neat view of that.

Tim Crosweller - PeerSpot reviewer
IT Manager at van der Meer Consulting
Real User
2020-07-09T06:27:00Z
Jul 9, 2020

The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems.

Neal Gravatt - PeerSpot reviewer
Sr Network Engineer at a real estate/law firm with 1-10 employees
Real User
2020-07-08T09:01:00Z
Jul 8, 2020

Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP.

Learn what your peers think about Cisco Secure Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2022.
655,711 professionals have used our research since 2012.
HB
Security Officer at a healthcare company with 51-200 employees
Real User
2020-07-08T09:01:00Z
Jul 8, 2020

The visibility and insight this solution gives you into threats is pretty granular. It has constant monitoring. You can get onto the device trajectory to look at a threat, but you can also see what happened prior to the threat. You can see what happened after the threat. You can see what other applications were incorporated into the execution of the threat. For example, you have the event, but you see that the event was launched by Google Chrome, which was launched by something else. Then, after the event, something else was launched by whatever the threat was. Therefore, it gives you great detail, a timeline, and continuity of events leading up to whatever the incident is, and then, after. This helps you understand and nail down what the threat is and how to fix it.

Cole Two-Bears - PeerSpot reviewer
Systems Architect at a consultancy with 5,001-10,000 employees
Real User
2020-06-10T08:01:00Z
Jun 10, 2020

Integration is a key selling factor for Cisco security products. We have a Cisco Enterprise Agreement with access to Cisco Email Security, Cisco Firepower, Cisco Stealthwatch, Cisco Talos, Cisco Threat Grid, Cisco Umbrella, and also third-party solutions. This is key to our security and maximizing operations. Because we do have the Email Security appliance and it is integrated with Threat Response, we have everything tied together. Additionally, we are using the Cisco SecureX platform, as we were a beta test for that new solution. With SecureX, we are able to pull all those applications into one pane for visibility and maintenance. This greatly maximizes our security operations.

Wouter Hindriks - PeerSpot reviewer
Technical Team Lead Network & Security at Missing Piece BV
Real User
Top 5
2020-06-09T07:46:00Z
Jun 9, 2020

Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us.

DanTurner - PeerSpot reviewer
CIO at Per Mar Security Services
Real User
2020-06-03T06:54:00Z
Jun 3, 2020

It doesn't impact the devices. It is an agent-based solution, and we see no performance knock on cell phones. That was a big thing for us, especially in the mobile world. We don't see battery degradation like you do with other solutions which really drain the battery, as they're constantly doing things. That can shorten the useful life of a device.

SunnyNair - PeerSpot reviewer
System Architect at COMPASS IT Solutions & Services Pvt.Ltd.
Real User
2020-01-29T08:35:00Z
Jan 29, 2020

The solution's integration capabilities are excellent. It's one of the best features.

MohamedEladawy - PeerSpot reviewer
Service Security Lead at Salam Technology
Real User
Top 5Leaderboard
2020-01-12T12:03:00Z
Jan 12, 2020

It is a very stable program.

AD
CEO at Oriental Weavers
Real User
2019-11-18T07:22:00Z
Nov 18, 2019

I am really satisfied with the technical support.

Mohammad Siraj - PeerSpot reviewer
Deputy GM at Oregon Systems
Real User
2019-09-27T04:38:00Z
Sep 27, 2019

The stability of the solution is perfect. I believe it's the most stable solution on the market right now.

ZS
Solution Architect / Presales Engineer at a comms service provider with 1,001-5,000 employees
Real User
2019-09-24T05:43:00Z
Sep 24, 2019

The simplicity of use is its most valuable feature. You can very clearly see things.

SV
CISO & COO at a tech services company with 1-10 employees
Real User
2019-07-02T06:57:00Z
Jul 2, 2019

The most valuable features of this solution are the IPS and the integration with ISE.

Mohammad Siraj - PeerSpot reviewer
Deputy GM at Oregon Systems
Real User
2019-06-26T05:26:00Z
Jun 26, 2019

For the initial first level of support, we provide it from our side. If there's escalation required, we use Cisco tech for the AMP. And again, they are perfect. I mean, one of the best, compared to any other vendors.

Edvins Logins - PeerSpot reviewer
IT Security Services Owner at Atea Global services
Consultant
2019-03-11T07:21:00Z
Mar 11, 2019

Its most valuable features are its scalability and advanced threat protection for customers.

RZ
Chief Information Officer at Sacramento County
Real User
2019-03-11T07:21:00Z
Mar 11, 2019

I am told that we get over 100 million emails a month. This filters them down and allows only somewhere about three million emails, which is a great help.

Related Questions
it_user434868 - PeerSpot reviewer
Senior Director of Delivery at a tech services company with 51-200 employees
Aug 10, 2022
How do you or your organization use this solution? Please share with us so that your peers can learn from your experiences. Thank you!
2 out of 22 answers
SV
CISO & COO at a tech services company with 1-10 employees
Jul 2, 2019
We use this solution as part of our organization security.
ZS
Solution Architect / Presales Engineer at a comms service provider with 1,001-5,000 employees
Sep 24, 2019
I use the public cloud deployment model. I have installed the license, the software, on my VM and it is being managed by Cisco Cloud. My primary use case for this solution is to test it against malicious links and for encryption and decryption.
it_user434868 - PeerSpot reviewer
Senior Director of Delivery at a tech services company with 51-200 employees
Jul 26, 2022
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
2 out of 18 answers
Mohammad Siraj - PeerSpot reviewer
Deputy GM at Oregon Systems
Jun 26, 2019
If you talk about the commercial aspect, this solution is not the Gartner one. We have a challenge because there are other solutions which are Gartner solutions, where we have competition. So we have to justify, explain, show the value propositions and then we sell are able to sell.
SV
CISO & COO at a tech services company with 1-10 employees
Jul 2, 2019
The licensing fees for this solution are paid on a yearly basis.
Download Free Report
Download our free Cisco Secure Endpoint Report and get advice and tips from experienced pros sharing their opinions. Updated: December 2022.
DOWNLOAD NOW
655,711 professionals have used our research since 2012.