2019-06-26T05:26:00Z
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
  • 0
  • 7

What do you like most about Cisco AMP for Endpoints?

Hi Everyone,

What do you like most about Cisco AMP for Endpoints?

Thanks for sharing your thoughts with the community!

25
PeerSpot user
25 Answers
Mark Broughton - PeerSpot reviewer
Level 2 tech at a tech services company with 11-50 employees
Real User
Top 20
2022-08-10T06:09:00Z
Aug 10, 2022

The integration with other Cisco products seemed to be really effective. We had Umbrella in place and we were using AnyConnect as well as Firepower. Once a threat was detected, being able to do the threat lookups and the live tracking was really useful.

Search for a product comparison
Nicola F. - PeerSpot reviewer
Infrastructure Engineer at TeamSystem
Real User
Top 10
2022-07-26T13:10:00Z
Jul 26, 2022

appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst. I can track everything that happens on our server from my PC or device. Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us.

RM
Director of I.T. Services at a non-tech company with 201-500 employees
Real User
Top 20
2022-07-06T10:03:00Z
Jul 6, 2022

The biggest lesson that I have learned from using this product is that there is a lot more malware slipping through my email filters than I expected.

LC
Manager information security at a consumer goods company with 1,001-5,000 employees
Real User
2022-06-26T15:54:00Z
Jun 26, 2022

Device Trajectory is one of the most valuable features. We're able to dig in and really understand how things came to be and where to focus our efforts.

Felipe Guimaraes - PeerSpot reviewer
Sales Director at Samsung
Real User
Top 10
2022-06-15T20:41:00Z
Jun 15, 2022

The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices.

Gassan Shalabi - PeerSpot reviewer
Manager at UCloud
Real User
Top 10
2022-05-30T15:43:00Z
May 30, 2022

I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It should protect all kinds of things that might happen on the servers, things that I cannot see.

Learn what your peers think about Cisco Secure Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: November 2022.
654,658 professionals have used our research since 2012.
ED
System Administrator at a manufacturing company with 201-500 employees
Real User
Top 20
2021-08-17T21:42:00Z
Aug 17, 2021

It is extensive in terms of providing visibility and insights into threats. It allows for research into a threat, and you can chart your progress on how you're resolving it.

Marian Melniciuc - PeerSpot reviewer
Senior IT System Administrator at ScanPlus GmbH
Real User
Top 5
2021-07-16T12:06:00Z
Jul 16, 2021

The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great.

Pardeep Sharma - PeerSpot reviewer
Network security engineer at a tech services company with 1,001-5,000 employees
Real User
Top 5
2021-05-14T17:19:12Z
May 14, 2021

The most valuable feature is signature-based malware detection.

User1#2% - PeerSpot reviewer
Application Manager at Financial Corp
Real User
Top 10
2020-10-20T04:19:00Z
Oct 20, 2020

Among the most valuable features are the exclusions. And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source.

MD.SIHAB TALUKDAR - PeerSpot reviewer
System Engineer at asa
Real User
Top 5Leaderboard
2020-10-13T07:21:00Z
Oct 13, 2020

The entirety of our network infrastructure is Cisco and the most valuable feature is the integration.

Mark Bonnamy - PeerSpot reviewer
Technical Director at Ridgewall Ltd
Reseller
2020-07-12T11:48:00Z
Jul 12, 2020

If somebody has been compromised, the question always is: How has it affected other devices in the network? Cisco AMP gives you a very neat view of that.

Tim Crosweller - PeerSpot reviewer
IT Manager at van der Meer Consulting
Real User
2020-07-09T06:27:00Z
Jul 9, 2020

The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems.

HB
Security Officer at a healthcare company with 51-200 employees
Real User
2020-07-08T09:01:00Z
Jul 8, 2020

The visibility and insight this solution gives you into threats is pretty granular. It has constant monitoring. You can get onto the device trajectory to look at a threat, but you can also see what happened prior to the threat. You can see what happened after the threat. You can see what other applications were incorporated into the execution of the threat. For example, you have the event, but you see that the event was launched by Google Chrome, which was launched by something else. Then, after the event, something else was launched by whatever the threat was. Therefore, it gives you great detail, a timeline, and continuity of events leading up to whatever the incident is, and then, after. This helps you understand and nail down what the threat is and how to fix it.

Neal Gravatt - PeerSpot reviewer
Sr Network Engineer at a real estate/law firm with 1-10 employees
Real User
2020-07-08T09:01:00Z
Jul 8, 2020

Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP.

Cole Two-Bears - PeerSpot reviewer
Systems Architect at a consultancy with 5,001-10,000 employees
Real User
2020-06-10T08:01:00Z
Jun 10, 2020

Integration is a key selling factor for Cisco security products. We have a Cisco Enterprise Agreement with access to Cisco Email Security, Cisco Firepower, Cisco Stealthwatch, Cisco Talos, Cisco Threat Grid, Cisco Umbrella, and also third-party solutions. This is key to our security and maximizing operations. Because we do have the Email Security appliance and it is integrated with Threat Response, we have everything tied together. Additionally, we are using the Cisco SecureX platform, as we were a beta test for that new solution. With SecureX, we are able to pull all those applications into one pane for visibility and maintenance. This greatly maximizes our security operations.

Wouter Hindriks - PeerSpot reviewer
Technical Team Lead Network & Security at Missing Piece BV
Real User
Top 5
2020-06-09T07:46:00Z
Jun 9, 2020

Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us.

DanTurner - PeerSpot reviewer
CIO at Per Mar Security Services
Real User
2020-06-03T06:54:00Z
Jun 3, 2020

It doesn't impact the devices. It is an agent-based solution, and we see no performance knock on cell phones. That was a big thing for us, especially in the mobile world. We don't see battery degradation like you do with other solutions which really drain the battery, as they're constantly doing things. That can shorten the useful life of a device.

SunnyNair - PeerSpot reviewer
System Architect at COMPASS IT Solutions & Services Pvt.Ltd.
Real User
2020-01-29T08:35:00Z
Jan 29, 2020

The solution's integration capabilities are excellent. It's one of the best features.

MohamedEladawy - PeerSpot reviewer
Service Security Lead at Salam Technology
Real User
Top 5Leaderboard
2020-01-12T12:03:00Z
Jan 12, 2020

It is a very stable program.

AD
CEO at Oriental Weavers
Real User
2019-11-18T07:22:00Z
Nov 18, 2019

I am really satisfied with the technical support.

Mohammad Siraj - PeerSpot reviewer
Deputy GM at Oregon Systems
Real User
2019-09-27T04:38:00Z
Sep 27, 2019

The stability of the solution is perfect. I believe it's the most stable solution on the market right now.

ZS
Solution Architect / Presales Engineer at a comms service provider with 1,001-5,000 employees
Real User
2019-09-24T05:43:00Z
Sep 24, 2019

The simplicity of use is its most valuable feature. You can very clearly see things.

SV
CISO & COO at a tech services company with 1-10 employees
Real User
2019-07-02T06:57:00Z
Jul 2, 2019

The most valuable features of this solution are the IPS and the integration with ISE.

Mohammad Siraj - PeerSpot reviewer
Deputy GM at Oregon Systems
Real User
2019-06-26T05:26:00Z
Jun 26, 2019

For the initial first level of support, we provide it from our side. If there's escalation required, we use Cisco tech for the AMP. And again, they are perfect. I mean, one of the best, compared to any other vendors.

Related Questions
it_user434868 - PeerSpot reviewer
Senior Director of Delivery at a tech services company with 51-200 employees
Aug 10, 2022
How do you or your organization use this solution? Please share with us so that your peers can learn from your experiences. Thank you!
2 out of 22 answers
SV
CISO & COO at a tech services company with 1-10 employees
Jul 2, 2019
We use this solution as part of our organization security.
ZS
Solution Architect / Presales Engineer at a comms service provider with 1,001-5,000 employees
Sep 24, 2019
I use the public cloud deployment model. I have installed the license, the software, on my VM and it is being managed by Cisco Cloud. My primary use case for this solution is to test it against malicious links and for encryption and decryption.
it_user434868 - PeerSpot reviewer
Senior Director of Delivery at a tech services company with 51-200 employees
Jul 26, 2022
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
2 out of 18 answers
Mohammad Siraj - PeerSpot reviewer
Deputy GM at Oregon Systems
Jun 26, 2019
If you talk about the commercial aspect, this solution is not the Gartner one. We have a challenge because there are other solutions which are Gartner solutions, where we have competition. So we have to justify, explain, show the value propositions and then we sell are able to sell.
SV
CISO & COO at a tech services company with 1-10 employees
Jul 2, 2019
The licensing fees for this solution are paid on a yearly basis.
Download Free Report
Download our free Cisco Secure Endpoint Report and get advice and tips from experienced pros sharing their opinions. Updated: November 2022.
DOWNLOAD NOW
654,658 professionals have used our research since 2012.