TechValidate Research on Cisco Secure Endpoint


Cisco Advanced Malware Protection Case Study

UNC Pembroke

Introduction

This case study of UNC Pembroke is based on a March 2017 survey of Cisco Advanced Malware Protection customers by TechValidate, a 3rd-party research service.

“Deploying AMP for Endpoints alongside other AMP deployments has helped my organization uncover threats faster and improve overall security effectiveness.”

“AMP for Endpoint saves us time and money and provides seamless integration with other Cisco Security products.”

Challenges

The business challenges that led the profiled organization to evaluate and ultimately select Cisco Advanced Malware Protection:

  • Chose AMP for Endpoints for the following reasons:
    • Endpoint visibility into file activity and threats
    • Simple, easy to use management interface

Use Case

The key features and functionalities of Cisco Advanced Malware Protection that the surveyed organization uses:

  • Deployed the following in addition to AMP for Endpoints:
    • AMP for Networks (AMP on Cisco Firepower NGIPS)
    • AMP for Firewall (AMP on a Cisco ASA or NGFW Firewall)
    • AMP for Email (AMP on Cisco ESA)
    • Cisco Umbrella (OpenDNS Umbrella)
    • Cisco Threat Grid

Results

The surveyed organization achieved the following results with Cisco Advanced Malware Protection:

  • Was able to do the following with AMP for Endpoints:
    • Improve security effectiveness
    • Detect threats faster
    • Reduce management complexity using Cisco AMP’s integrated architecture
  • Evaluated the following company prior to signing up with AMP for Endpoints:
    • Palo Alto
  • Prevented/Detected/Defeated the following with AMP for Endpoints:
    • Advanced malware or advanced persistent threats (APTs)
    • Ransomware
    • Malicious email attachments
  • Reduced threat detection time by by more than 24 hours with AMP for Endpoints.
  • Experienced improvements in the following areas after deploying AMP for Endpoints:
    • Mean time to detection of previously unseen and/or unknown threats
    • Executive confidence in the security of the organization
    • Visibility into endpoints, vulnerabilities, and threats
    • Time to remediation




About This Data

This data was sourced directly from verified users of Cisco Secure Endpoint by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on Cisco Secure Endpoint