Advanced Malware Protection (AMP)

Breach prevention. Continuous monitoring of malicious behavior. Rapid malware detection. Malware removal.

Visibility and control to defeat advanced attacks

Get global threat intelligence, advanced sandboxing, and real-time malware blocking to prevent breaches with Cisco Advanced Malware Protection (AMP). But because you can’t rely on prevention alone, AMP also continuously analyzes file activity across your extended network, so you can quickly detect, contain, and remove advanced malware.

  • data-graphics-100

    Leading breach detection

    Source: NSS Labs
  • detection-time-156x135

    Time to Detection

    Source: 2016 Midyear Cybersecurity Report
  • amp-infographic3-156x135

AMP key features


Global threat intelligence

Our Cisco Talos experts analyze millions of malware samples and terabytes of data per day and push that intelligence to AMP. AMP then correlates files, telemetry data, and file behavior against this context-rich knowledge base to proactively defend against known and emerging threats.


Advanced sandboxing

Advanced sandboxing capabilities perform automated static and dynamic analysis of files against 560+ behavioral indicators. This uncovers stealthy threats and helps your security team understand, prioritize, and block sophisticated attacks.


Point-in-time malware detection and blocking

Block malware trying to enter your network in real time. Using one-to-one signature matching, machine learning, and fuzzy fingerprinting, AMP analyzes files at point of entry to catch known and unknown malware. The result? Faster time to detection and automatic protection.


Continuous analysis and retrospective security

Once a file enters your network, AMP continues to watch, analyze, and record its activity, regardless of the file’s disposition. If malicious behavior is spotted later, AMP sends your security team a retrospective alert that tells them where the malware came from, where it’s been, and what it’s doing. In a few clicks, you can contain and remediate it.

Find the best AMP deployment for you

Advanced Malware Protection is subscription-based, managed through a web-based management console, and deployed on a variety of platforms.  

Protect your endpoints

Protect your endpoints

Get visibility into file and executable-level activity, and remove malware on computers and mobile devices running Microsoft Windows, Mac OS, Linux, and Android.

AMP for ...


Protect your network

Protect your network

Get deep visibility into network-level and network-edge threat activity and block advanced malware.

AMP on a ...

NGIPS (AMP for Networks)

Next-Generation Firewall

Meraki MX UTM Platform

Branch router (ISR)

Protect your email and web traffic

Protect your email and web traffic

Add AMP capabilities to email and web security appliances or to your cloud email and web security deployments.

AMP for ...



For increased protection, add AMP across multiple attack vectors. Read our white paper and view our AMP deployment options to learn more.

Related products


Threat Grid

Get advanced threat intelligence and static and dynamic malware analysis. Choose from a hardware appliance or cloud deployment. See more on Threat Grid

Cisco IT increases security effectiveness with Cisco AMP


"With AMP, we’re getting better results with defending our network automatically, as well as increased visibility to things happening on our network, and our ability to detect and contain threats has greatly improved."

Steve Martino, Chief Information Security Officer, Cisco


News and events


Are you prepared for an attack?

Learn best practices and understand the move from prevention to detection.

Register Now

Cisco AMP is now on Meraki MX

Get simplified security management with advanced threat capabilities.


See Threats Once. Block Everywhere.

Cisco is a leader in NSS Labs’ Breach Detection test for the third year in a row – detecting 100% of malware, exploits & evasions.

Meet the experts

John Doe

Keep up-to-date with malware protection

Meet our security engineers and product experts who share insights of emerging malware and the threat landscape on their Security blog. Get awareness of risks to your organization – and the best defenses.

For partners

Are you a Cisco partner?  Log in to see additional resources.

Looking for a solution from a Cisco partner? Connect with our partner ecosystem.