Introduction
This case study of HCL Technologies is based on a March 2017 survey of Cisco Advanced Malware Protection customers by TechValidate, a 3rd-party research service.
Cisco Advanced Malware Protection Case Study
This case study of HCL Technologies is based on a March 2017 survey of Cisco Advanced Malware Protection customers by TechValidate, a 3rd-party research service.
“Deploying AMP for Endpoints alongside other AMP deployments has helped my organization uncover threats faster and improve overall security effectiveness.”
“Organizations today are under the constant threat of cyber attack and security breaches happen every day. Given today’s threat landscape, ‘point-in-time’ technologies, such as sandboxes or antivirus are only one part of a required solution since advanced malware can evade these defenses. Cisco AMP has provided the visibility, context, and control to not only prevent cyber attacks, but also rapidly detect, contain, and remediate advanced threats from they evaded front-line defenses and get inside.”
“AMP detected 100% of exploits in testing, demonstrating its leadership in identifying the malicious software used to breach and compromise systems. AMP detected 99% of Web-based malware delivered via browsers and 98% of malware using e-mail to enter organizations. AMP detected malware employing every evasion technique tested, such as code designed to defeat sandbox and virtual machine based analysis and detection. AMP delivered faster time to detection than all other vendors.”
The business challenges that led the profiled company to evaluate and ultimately select Cisco Advanced Malware Protection:
The key features and functionalities of Cisco Advanced Malware Protection that the surveyed company uses:
The surveyed company achieved the following results with Cisco Advanced Malware Protection:
This data was sourced directly from verified users of Cisco Secure Endpoint by TechValidate.
TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.
More Research on Cisco Secure Endpoint