Get the market's only network-based malware defense that goes beyond point-in-time detection to protect across the entire attack continuum. Designed for our network security appliances, specifically the Next-Generation Intrusion Prevention System (NGIPS) and Next-Generation Firewall, AMP for Networks provides visibility and control to protect against highly sophisticated and targeted advanced malware.
Continuous analysis tracks files after they've entered the network, allowing you to identify where, when, and how a malicious file entered your network, and then block it.
Thanks to AMP continuously tracking and analyzing files and file activity as they traverse the network, if a file begins to exhibit malicious behavior AMP will provide a retrospective alert.
Continuous updates of file dispositions from AMP’s global threat intelligence help detect and protect against malware. File and application control helps you limit policy-violating files and user actions.
File capture allows you to store and retrieve files for further analysis. The integration of Threat Grid allows you to examine unknown and suspicious files in a safe, highly secure sandbox environment, either in the cloud or locally.
Looking to manage and mitigate risk? AMP for Networks has been SAFETY Act Certified®. What this means: If the Department of Homeland Security secretary declares that an act of terrorism has occurred, a customer who uses AMP for Networks may be eligible under the SAFETY Act for certain liabilities protections from lawsuits alleging that the product failed to operate as intended.
AMP for Networks is available in a variety of configurations that you can tailor to meet your needs. Talk to a Cisco salesperson or partner to choose what works best for you.
AMP is available on appliances with throughput from 500 Mbps to 20 Gbps with many options in between.
If so, deploy AMP for Networks as an on-premises, air-gapped AMP Private Cloud Virtual Appliance.
“With AMP, we’re getting better results with defending our network automatically, as well as increased visibility to things happening on our network, and our ability to detect and contain threats has greatly improved. ”Steve Martino, Chief Information Security Officer, Cisco
Learn how attackers are monitoring your organization for weaknesses.