TechValidate Research on Cisco Secure Endpoint


Cisco Advanced Malware Protection Case Study

Thunder Bay Regional HSC

Introduction

This case study of Thunder Bay Regional HSC is based on a March 2017 survey of Cisco Advanced Malware Protection customers by TechValidate, a 3rd-party research service.

“Deploying AMP for Endpoints alongside other AMP deployments has helped my organization uncover threats faster and improve overall security effectiveness.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select Cisco Advanced Malware Protection:

  • Chose AMP for Endpoints for the following reasons:
    • Superior protection from advanced threats and hackers
    • Rapid time to detection of threats
    • Endpoint visibility into file activity and threats
    • Ability to continuously monitor file behavior
    • Retrospective alerting to uncover stealthy attacks

Use Case

The key features and functionalities of Cisco Advanced Malware Protection that the surveyed company uses:

  • Deployed the following in addition to AMP for Endpoints:
    • AMP for Networks (AMP on Cisco Firepower NGIPS)

Results

The surveyed company achieved the following results with Cisco Advanced Malware Protection:

  • Was able to do the following with AMP for Endpoints:
    • Improve security effectiveness
    • Increase visibility into potential threats
    • Accelerate incident response
  • Evaluated the following company prior to signing up with AMP for Endpoints:
    • TrendMicro
  • Prevented/Detected/Defeated the following with AMP for Endpoints:
    • Advanced malware or advanced persistent threats (APTs)
    • Zero-day threats
    • Malicious email attachments
  • Reduced threat detection time by more than a month with AMP for Endpoints.
  • Experienced improvements in the following areas after deploying AMP for Endpoints:
    • Mean time to detection of previously unseen and/or unknown threats
    • Breach probability and business risk
    • Organization’s security posture
    • Investigation speed and/or quality
    • Visibility into endpoints, vulnerabilities, and threats




About This Data

This data was sourced directly from verified users of Cisco Secure Endpoint by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on Cisco Secure Endpoint