Coming October 25: PeerSpot Awards will be announced! Learn more
2019-03-11T07:21:00Z
Julia Frohwein - PeerSpot reviewer
Senior Director of Delivery at PeerSpot (formerly IT Central Station)
  • 0
  • 41

What do you like most about Cisco AMP for Endpoints?

Hi Everyone,

What do you like most about Cisco AMP for Endpoints?

Thanks for sharing your thoughts with the community!

19
PeerSpot user
19 Answers
Pardeep Sharma - PeerSpot reviewer
Network security engineer at a tech services company with 1,001-5,000 employees
Real User
Top 5
2021-05-14T17:19:12Z
14 May 21

The most valuable feature is signature-based malware detection.

User1#2% - PeerSpot reviewer
Application Manager at Financial Corp
Real User
Top 5
2020-10-20T04:19:00Z
20 October 20

Among the most valuable features are the exclusions. And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source.

MD.SIHAB TALUKDAR - PeerSpot reviewer
System Engineer at asa
Real User
Top 5Leaderboard
2020-10-13T07:21:00Z
13 October 20

The entirety of our network infrastructure is Cisco and the most valuable feature is the integration.

Mark Bonnamy - PeerSpot reviewer
Technical Director at Ridgewall Ltd
Reseller
2020-07-12T11:48:00Z
12 July 20

If somebody has been compromised, the question always is: How has it affected other devices in the network? Cisco AMP gives you a very neat view of that.

Tim Crosweller - PeerSpot reviewer
IT Manager at van der Meer Consulting
Real User
2020-07-09T06:27:00Z
09 July 20

The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems.

Neal Gravatt - PeerSpot reviewer
Sr Network Engineer at a real estate/law firm with 1-10 employees
Real User
2020-07-08T09:01:00Z
08 July 20

Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP.

Learn what your peers think about Cisco Secure Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: September 2022.
633,572 professionals have used our research since 2012.
HB
Security Officer at a healthcare company with 51-200 employees
Real User
2020-07-08T09:01:00Z
08 July 20

The visibility and insight this solution gives you into threats is pretty granular. It has constant monitoring. You can get onto the device trajectory to look at a threat, but you can also see what happened prior to the threat. You can see what happened after the threat. You can see what other applications were incorporated into the execution of the threat. For example, you have the event, but you see that the event was launched by Google Chrome, which was launched by something else. Then, after the event, something else was launched by whatever the threat was. Therefore, it gives you great detail, a timeline, and continuity of events leading up to whatever the incident is, and then, after. This helps you understand and nail down what the threat is and how to fix it.

Cole Two-Bears - PeerSpot reviewer
Systems Architect at a consultancy with 5,001-10,000 employees
Real User
2020-06-10T08:01:00Z
10 June 20

Integration is a key selling factor for Cisco security products. We have a Cisco Enterprise Agreement with access to Cisco Email Security, Cisco Firepower, Cisco Stealthwatch, Cisco Talos, Cisco Threat Grid, Cisco Umbrella, and also third-party solutions. This is key to our security and maximizing operations. Because we do have the Email Security appliance and it is integrated with Threat Response, we have everything tied together. Additionally, we are using the Cisco SecureX platform, as we were a beta test for that new solution. With SecureX, we are able to pull all those applications into one pane for visibility and maintenance. This greatly maximizes our security operations.

Wouter Hindriks - PeerSpot reviewer
Technical Team Lead Network & Security at Missing Piece BV
Real User
Top 10
2020-06-09T07:46:00Z
09 June 20

Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us.

DanTurner - PeerSpot reviewer
CIO at Per Mar Security Services
Real User
2020-06-03T06:54:00Z
03 June 20

It doesn't impact the devices. It is an agent-based solution, and we see no performance knock on cell phones. That was a big thing for us, especially in the mobile world. We don't see battery degradation like you do with other solutions which really drain the battery, as they're constantly doing things. That can shorten the useful life of a device.

SunnyNair - PeerSpot reviewer
System Architect at COMPASS IT Solutions & Services Pvt.Ltd.
Real User
2020-01-29T08:35:00Z
29 January 20

The solution's integration capabilities are excellent. It's one of the best features.

MohamedEladawy - PeerSpot reviewer
Service Security Lead at Salam Technology
Real User
Top 10
2020-01-12T12:03:00Z
12 January 20

It is a very stable program.

AD
CEO at Oriental Weavers
Real User
2019-11-18T07:22:00Z
18 November 19

I am really satisfied with the technical support.

Mohammad Siraj - PeerSpot reviewer
Deputy GM at Oregon Systems
Real User
2019-09-27T04:38:00Z
27 September 19

The stability of the solution is perfect. I believe it's the most stable solution on the market right now.

ZS
Solution Architect / Presales Engineer at a comms service provider with 1,001-5,000 employees
Real User
2019-09-24T05:43:00Z
24 September 19

The simplicity of use is its most valuable feature. You can very clearly see things.

SV
CISO & COO at a tech services company with 1-10 employees
Real User
2019-07-02T06:57:00Z
02 July 19

The most valuable features of this solution are the IPS and the integration with ISE.

Mohammad Siraj - PeerSpot reviewer
Deputy GM at Oregon Systems
Real User
2019-06-26T05:26:00Z
26 June 19

For the initial first level of support, we provide it from our side. If there's escalation required, we use Cisco tech for the AMP. And again, they are perfect. I mean, one of the best, compared to any other vendors.

Edvins Logins - PeerSpot reviewer
IT Security Services Owner at Atea Global services
Consultant
2019-03-11T07:21:00Z
11 March 19

Its most valuable features are its scalability and advanced threat protection for customers.

RZ
Chief Information Officer at Sacramento County
Real User
2019-03-11T07:21:00Z
11 March 19

I am told that we get over 100 million emails a month. This filters them down and allows only somewhere about three million emails, which is a great help.

Related Questions
Julia Frohwein - PeerSpot reviewer
Senior Director of Delivery at PeerSpot (formerly IT Central Station)
Aug 10, 2022
How do you or your organization use this solution? Please share with us so that your peers can learn from your experiences. Thank you!
2 out of 22 answers
SV
CISO & COO at a tech services company with 1-10 employees
02 July 19
We use this solution as part of our organization security.
ZS
Solution Architect / Presales Engineer at a comms service provider with 1,001-5,000 employees
24 September 19
I use the public cloud deployment model. I have installed the license, the software, on my VM and it is being managed by Cisco Cloud. My primary use case for this solution is to test it against malicious links and for encryption and decryption.
Nurit Sherman - PeerSpot reviewer
Content Operations Manager at PeerSpot (formerly IT Central Station)
Aug 25, 2021
Hi community,  We all know that it's important to conduct a trial and/or proof-of-concept as part of the buying process.  Do you have any advice for your peers about the best way to conduct a trial/POC?  How do you conduct a trial effectively? Are there any mistakes to avoid?
2 out of 18 answers
JC
consultant
30 July 18
You might want to start out with business cases ... ensuring that your endpoint solution begins to address those. some ideas might include: * antivirus * antivirus updates via automation * antivirus updates via cloud or on premise automation * antivirus reporting to central on premise management server * do you want to rely upon static signatures? * do you want to find the zero days? * what about polymorphic / variants of previously known malware? * will your antivirus mechanism share with other machines / computer their discoveries? * do you want to share your information with the manufacturer (via cloud) or keep your discoveries in house / on premise? * DLP -data loss protection * DLP reporting to central management server * DLP - how easily configurable? * DLP -what type of additional work will this entail for analyses, etc * Host Intrusion Prevention (HIP) * HIP - will it report to a central management server? * How will all the central management servers communicate with each other / other computers? * Do you have to tier the solution due to network segmentation / geographic considerations / size of deployment? * Will the endpoint product talk to or receive from other security devices (email, web filters, etc at the perimeter?) * has Gartner developed some frameworks that are used for testing endpoint solutions? * has Gartner at least testing the solution you are looking at? * potentially check firecompass.com for endpoint solution comparisons? * does endpoint protection support all operating systems you are using? * does endpoint protection interface with other security products on the endpoint? * logging ... is it detailed enough? * do you want to automatically quarantine computer if malware is found? * go through vendors data sheet and ensure you check all capabilities and test them * what things did the vendor promise? test those. * talk to a couple of their customers (same size organization if possible using similar if not same endpoint protection capabilities). discuss roll out, problems faced, vendor assistance, etc. A couple of ideas - certainly not exhaustive. ___________________
JC
consultant
30 July 18
adding: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-46r2.pdf Guide to Enterprise Telework, Remote Access, and Bring ... nvlpubs.nist.gov NIST Special Publication 800-46 . Revision 2. Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security . Murugiah Souppaya Guide to storage encryption technologies for end user devices nvlpubs.nist.gov Guide to Storage Encryption Technologies for End User Devices Recommendations of the National Institute of Standards and Technology Karen Scarfone ________________________________
Download Free Report
Download our free Cisco Secure Endpoint Report and get advice and tips from experienced pros sharing their opinions. Updated: September 2022.
DOWNLOAD NOW
633,572 professionals have used our research since 2012.