Guest
Next-generation endpoint security

Next-generation endpoint security

Prevent breaches. Continuously monitor all file behavior to uncover stealthy attacks. Detect, block, and remediate advanced malware across all endpoints. Do it all fast and automatically.

Cisco Security Connector for iOS

Cisco Security Connector for iOS

Apple and Cisco are partnering to deliver the deepest visibility and control for the mobile workforce.

Find out how

Features

Prevent, detect, and respond to attacks

Prevent, detect, and respond

AMP for Endpoints provides complete protection against the most advanced attacks. Not only will AMP prevent breaches and block malware at the point of entry, but it will also rapidly detect, contain, and remediate advanced threats if they evade front-line defenses and get inside.

Deep visibility, context, and control

Deep visibility, context, and control

No prevention method will catch every threat. You need to be prepared when advanced malware gets inside. That’s why AMP for Endpoints gives you deep visibility into executable and file activity across all of your endpoints so you can spot threats fast, scope a compromise, and remediate instantly.

Threat intelligence and sandboxing

Threat intelligence and sandboxing

Our Cisco Talos group analyzes millions of malware samples and terabytes of data per day, and pushes that intelligence to AMP so you’re protected around the clock. Also, advanced sandboxing capabilities perform automated static and dynamic analysis of files against more than 700 behavioral indicators to uncover stealthy threats. Now that's intelligent endpoint security.

Block malware in real time

Block malware in real time

AMP automatically detects and blocks threats in real time using global data analytics, machine learning, fuzzy fingerprinting, rootkit scanning, and a built-in antivirus engine. In fact, if you would like to replace your existing antivirus detection capabilities with AMP for Endpoints, and you require compliance, AMP meets PCI and HIPAA compliance for antivirus solutions.

Continuous monitoring and recording

Continuous monitoring and recording

Once a file lands on the endpoint, AMP continues to watch, analyze, and record file activity, regardless of the file’s disposition. When malicious behavior is detected, AMP shows you the recorded history of the malware’s behavior over time: where it came from, where it’s been, and what it’s doing. Then AMP will automatically quarantine and remediate the file across all endpoints.

To learn more, watch this video


Broad endpoint coverage

Broad endpoint coverage

Malware can attack through a variety of attack vectors. You need endpoint security that can protect them all. AMP protects endpoints running Windows, Mac OS, Android, iOS, and Linux. Deploy AMP’s lightweight connector, and users see no impact on device performance because AMP performs all analysis in the cloud, not on the endpoint itself.

How to deploy

It’s simple. AMP is a cloud-based software-as-a-service endpoint security solution. You deploy AMP’s lightweight connector on your endpoints, and then set up your account. Work with your Cisco salesperson or partner and follow these easy steps.

Choose the number of endpoints

50? 1000? 100,000? There’s no limit. The choice is yours.

Choose a subscription term

Terms are available for 1, 3, or 5 years.

Deploy the connector

Deploy AMP’s lightweight connector on your endpoints and sync with your account.

High-privacy restrictions?

If so, deploy AMP for Endpoints as an on-premises, air-gapped AMP Private Cloud Virtual Appliance

Cisco vs. the competition

How does AMP for Endpoints stack up against other endpoint security vendors? 

Global analyst reports

NSS Labs says AMP is number one

NSS Labs: AMP is Number 1

Cisco AMP detects 100% of attacks, with fastest time to detection, in NSS Labs Breach Detection test.

IDC names AMP for Endpoints a leader

IDC: AMP for Endpoints a leader

See how it stands out in the 2017 IDC Marketscape Report for endpoint security solutions.

Stop fileless malware

Stop fileless malware

Block threats in memory and browser injections that others miss.

Read our brochure to learn more

Heritage Bank protects endpoints with Cisco AMP

Heritage Bank protects endpoints with Cisco AMP

"AMP for Endpoints and Threat Grid give us confidence to move forward with cloud-based and other solutions that are typically difficult to secure. You’re no longer up at night wondering if someone is accessing things that other solutions are unable to scan or see."

Lachlan Peters, Security Team Leader, Heritage Bank

Read story

See more case studies

School district stops cyber attacks

School district stops cyber attacks

"Cisco AMP for Endpoints met our needs from all security standpoints. We’re seeing more and AMP is catching things that our previous endpoint protection didn’t catch."

George Mitchell, Head of Research and Development, Mobile (Alabama) County Public School System
Read case study
Test your endpoint security - for free

Test your endpoint security - for free

Get a free assessment of the security health of your organization to determine whether AMP for Endpoints can help you.

Learn more

News and events

AMP webinar series

AMP webinar series

Want to learn how AMP can strengthen your organization’s security defenses? Join us for an in-depth look during one of our many webinars.

Cisco 2017 Midyear Cybersecurity Report

Cisco 2018 Annual Cybersecurity Report

Read the report that adversaries don’t want you to see.

Stop phishing email threats on Mars

Stop phishing email threats on Mars

See how easy it is to stop threats from phishing emails with Advanced Malware Protection. Explore new gaming levels and challenges.

For partners

Are you a Cisco partner?  Log in to see additional resources.

Looking for a solution from a Cisco partner? Connect with our partner ecosystem.