Cisco Advanced Malware Protection For Endpoints Data Sheet
Cisco Advanced Malware Protection For Endpoints Data Sheet
AMP for Endpoints prevents attacks by providing the latest global threat intelligence to strengthen defenses, a
built-in antivirus (AV) engine to detect and block attacks at point-of-entry, built-in sandboxing technology to analyze
unknown files, and proactive protection capabilities that close attack pathways and minimize vulnerabilities. But if
malware evades these prevention measures and gets inside, AMP for Endpoints continuously monitors and
records all file activity to quickly detect malicious behavior, retrospectively alert security teams, and then provide
deep visibility and a detailed recorded history of the malware’s behavior over time—where it came from, where it’s
been, and what it’s doing. AMP can then automatically contain and remediate the threat. AMP protects endpoints—
like laptops, workstations, servers, and mobile devices—running Windows, Mac OS, Linux, Android and iOS.
Understand AMP for Endpoints in 5 minutes.
Benefits include:
● Protection that goes beyond prevention: Cisco AMP for Endpoints goes beyond just preventing attacks.
It analyzes files and traffic continuously. This capability helps enable retrospective security. You can look
back in time and trace processes, file activities, and communications to understand the full extent of an
infection, establish root causes, and perform remediation. The result: more effective, efficient, and pervasive
protection for your organization.
● Monitoring that enables unmatched visibility: Cisco AMP for Endpoints offers more than retrospection. It
introduces a new level of intelligence, linking and correlating various forms of retrospection into a lineage of
activity available for analysis in real time. It can then look for patterns of malicious behavior from an
individual endpoint or across the environment of endpoints.
● Advanced analysis that looks at behaviors over time: Cisco AMP for Endpoints provides automation
through advanced behavioral detection capabilities that deliver a prioritized and collated view of top areas of
compromise and risk.
● Investigation that turns the hunted into the hunter: Cisco AMP for Endpoints shifts activity from looking
for facts and clues as part of an investigation to a focused hunt for breaches based on actual events like
malware detections and behavioral indications of compromise (IoCs).
● Containment that is truly simple: Cisco AMP for Endpoints provides visibility into the chain of events and
context that complements its dashboards and trajectory views. AMP provides the ability to target specific
applications, files, malware, and other root causes. Breaking the attack chain is not only quick but
also easy.
© 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 11
● Dashboards that are actionable and contextual: Reports are not limited to event enumeration and
aggregation. Cisco AMP for Endpoints’ actionable dashboards allow for streamlined management and
faster response. (see Figure 1)
● Integrated platforms that work better together: Cisco AMP for Endpoints can be fully integrated with the
Cisco AMP for Networks solution, and other AMP deployments, to further increase visibility and control
across your organization.
Often, this lack of intelligence can leave an organization unaware of the full extent and depth of an outbreak,
which cause incident response and remediation efforts to begin well after an outbreak. In addition, lack of continuity
can cause infected systems and root causes to be missed during these efforts, leading to an endless cycle
of reinfection.
As a result, security professionals often lack visibility into the scope of advanced malware in their network, struggle
to contain and remediate it after an outbreak, and cannot address fundamental questions, including:
© 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 11
Cisco AMP for Endpoints Discovers, Analyzes, Blocks, and Remediates Advanced Malware
Preventative security tools alone will never be 100 percent effective at preventing all attacks. It takes only one
threat that evades detection to compromise your environment. Using targeted context-aware malware,
sophisticated attackers have the resources, expertise, and persistence to outsmart preventative defenses and
compromise any organization at any time. Furthermore, prevention tools (or “point-in-time” detection tools) are
completely blind to the scope and depth of a breach after it happens, rendering organizations incapable of stopping
an outbreak from spreading or preventing a similar attack from happening again.
Cisco AMP for Endpoints can prevent attacks, but goes beyond just prevention to deliver continuous monitoring,
detection, and response if malware gets inside. It delivers a lattice of detection capabilities combined with big data
analytics to continuously analyze files and traffic on endpoints to determine if advanced malware is present (Figure
2). Sophisticated machine-learning techniques evaluate more than 400 characteristics associated with each file to
analyze and block advanced malware. The combination provides protection that goes beyond traditional defenses.
Retrospective security, the ability to roll back time on attacks, can detect and alert you to files that become
malicious after the initial point of entry.
Figure 2. Prevention (or “Point-In-Time Detection”) Tools Compared with Continuous Analysis and Retrospective Security
© 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 11
See More Than Ever Before and Control Advanced Malware
Today’s malware is more sophisticated than ever. Evolving quickly, it can evade discovery after it has
compromised a system while providing a launching pad for a persistent attacker to move throughout an
organization. Sleep techniques, polymorphism, encryption, and use of unknown protocols are just some of the
ways that malware can hide from view. The continuous analysis and retrospective security features of Cisco AMP
for Endpoints let you uncover elusive malware and help you answer the following key questions in the battle
against advanced threats.
● What was the method and point of entry? What systems were affected?
Powerful innovations like file trajectory and device trajectory (Figure 3) use AMP’s big data analytics and
continuous analysis capabilities to show you the systems affected by malware, including patient zero and
the root causes associated with a potential compromise. These capabilities help you quickly understand the
scope of the problem by identifying malware gateways and the path that attackers are using to gain a
foothold into other systems.
© 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 11
● What did the threat do?
Cisco AMP for Endpoints File Analysis (Figure 4), backed by the Talos Security Intelligence and Research
Group and powered by AMP’s built-in sandboxing technology (Threat Grid), provides a safe, highly secure
sandbox environment for you to analyze the behavior of malware and suspect files. File analysis produces
detailed information on file behavior, including the severity of behaviors, the original filename, screenshots
of the malware executing, and sample packet captures. Armed with this information, you’ll have a better
understanding of what is necessary to contain the outbreak and block future attacks.
Device trajectory further aids a quick analysis of threat activity on a computer by tracking file and network
activity at the endpoint in chronological order. You gain complete visibility into the events that occurred
leading up to and following a compromise, including parent processes, connections to remote hosts, and
unknown files that may have been downloaded by malware.
Indications of compromise (IoCs) are often subtle and require immediate investigation before they are
erased or an attacker moves on. With the Cisco AMP for Endpoints Search, security teams can quickly hunt
down the scope of exposure to an attack with simple but flexible search capabilities that immediately
present results without the need to scan and pull data from endpoints.
© 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 11
● Can we stop the threat and root causes? Can we prevent it from happening again?
Cisco AMP for Endpoints Outbreak Control gives you a suite of capabilities to effectively stop the spread of
malware and malware-related activities, like call-back communications or dropped file execution, without
waiting for updates from your security vendor. This gives you the power to move directly from investigation
to control with a few mouse clicks, significantly reducing the time a threat has to spread or do more damage
and the time it normally takes to put controls in place.
Furthermore, AMP can automatically remediate systems without a full scan. The technology continuously
cross-references files analyzed in the past against the latest threat intelligence and quarantines any files
previously deemed clean or unknown that are now known to be a threat.
Protect PCs, Macs, Linux systems, Servers, Mobile Devices, and the Network
Cisco AMP for Endpoints protects you against advanced malware and increases security intelligence across all
endpoints—PCs, Macs, Linux systems, servers, and mobile devices (Android and iOS). Its lightweight connector
architecture uses big data analytics, which simplifies defense-in-depth requirements to address advanced malware.
Furthermore, Cisco AMP for Endpoints integrates with Cisco AMP for Networks, and other AMP deployments, to
deliver comprehensive protection through a single pane of glass and across extended networks and endpoints.
Now, using continuous analysis, retrospective security, and multisource indications of compromise, you can identify
stealthy attacks that manage to traverse from the endpoint to inline at the network level, correlate those events for
faster response, and achieve greater visibility and control.
As for manageability, the Cisco AMP for Endpoints console interface provides complete management,
deployment, policy configuration, and reporting for Windows systems, Mac systems, Linux systems, Android
and iOS mobile devices.
As for performance, Cisco AMP for Endpoints deployed on PCs, Macs, Linux, Android and iOS use lightweight
connector architectures, requiring less storage, computation, and memory than other security solutions, speeding
protection against attacks.
© 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 11
The integration of our Threat Grid sandboxing technology into AMP for Endpoints also provides over 800 unique
behavioral indicators that evaluate the actions of a file submission, not just its structure, providing insight to
unknown malware including associated HTTP and DNS traffic, TCP/IP streams, processes it’s affecting, and
registry activity.
Threat Grid also provides users with context-rich, actionable content everyday - more than 8 million samples are
analyzed each month resulting in billions of artifacts. And finally, Threat Grid’s highly accurate content feeds,
delivered in standard formats to seamlessly integrate with existing security technologies, enable organizations to
generate context-rich intelligence specific to their organization.
Cisco AMP for Endpoints was also named a leader by IDC in their report IDC Marketscape: Worldwide Endpoint
Specialized Threat Analysis and Protection 2017 Vendor Assessment. In the report, IDC noted that AMP for
Endpoints was particularly strong in the following areas:
Cisco AMP for Endpoints also excelled in Gartner's 2017 report entitled The Evolving Effectiveness of Endpoint
Protection Solutions. The report highlighted how AMP for Endpoints and 11 other endpoint security solutions
performed in three primary categories:
© 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 11
Table 1 highlights the best-in-class capabilities of Cisco AMP for Endpoints. Table 2 lists the software
requirements.
Feature Benefits
Continuous analysis Once a file lands on the endpoint, AMP for Endpoints continues to watch, analyze, and record all file activity, regardless
of the file’s disposition. When malicious behavior is detected, AMP shows you a recorded history of the malware’s
behavior over time: where it came from, where it’s been, and what it’s doing. This helps you scope the compromise and
quickly respond. Continuous analysis in 4 minutes.
Retrospective security Retrospective security is the ability to look back in time and trace processes, file activities, and communications in order
to understand the full extent of an infection, establish root causes, and perform remediation. The need for retrospective
security arises when any IoC occurs, such as an event trigger, a change in the disposition of a file, or an IoC trigger.
Watch Demo
Dashboards Gain visibility into your environment through a single pane of glass - with a view into hosts, devices, applications, users,
files, and geolocation information, as well as advanced persistent threats (APTs), threat root causes, and other
vulnerabilities - to provide a comprehensive contextual view so that you can make informed security decisions.
Comprehensive global Cisco Talos Security Intelligence and Research Group, and Threat Grid threat intelligence feeds represent the
threat intelligence industry’s largest collection of real-time threat intelligence with the broadest visibility, the largest footprint, and the ability
to put it into action across multiple security platforms.
Indications of File, telemetry, and intrusion events are correlated and prioritized as potentially active breaches, helping security teams
compromise to rapidly identify malware incidents and connect them to coordinated attacks.
File reputation Advanced analytics and collective intelligence are gathered to determine whether a file is clean or malicious, allowing
for more accurate detection.
Antivirus Engine Perform offline and system-based detections, including rootkit scanning, to complement Cisco’s advanced endpoint
protection capabilities such as local IOC scanning, and device and network flow monitoring. The engine can be enabled
and used by customers that want to consolidate their antivirus and advanced endpoint protection in one agent.
File analysis and A highly secure environment helps you execute, analyze, and test malware behavior in order to discover previously
sandboxing unknown zero-day threats. Integration of Threat Grid’s sandboxing technology into AMP for Endpoints results in more
dynamic analysis checked against a larger set of behavioral indicators. Watch Demo
Retrospective Alerts are sent when a file disposition changes after extended analysis, giving you awareness and visibility to malware
detection that evaded initial defenses.
File trajectory Continuously track file propagation over time throughout your environment in order to achieve visibility and reduce the
time required to scope a malware breach.
Device trajectory Continuously track activity and communication on devices and on the system level to quickly understand root causes
and the history of events leading up to and after compromise. Watch Demo
Elastic search A simple, unbounded search across file, telemetry, and collective security intelligence data helps you quickly
understand the context and scope of exposure to an IoC or malicious application.
Endpoint search A simple interface to easily and quickly search across all endpoints looking for artifacts left behind as part of the
malware ecosystem, extending search capabilities beyond data stored in the cloud to the endpoint itself.
Exploit Prevention Memory attacks can penetrate endpoints, and malware evades security defenses by exploiting vulnerabilities in
applications and operating system processes. The Exploit Prevention feature will defend endpoints from all exploit-
based, memory injection attacks—including ransomware using in-memory techniques, web-borne attacks that use
shellcode to run a payload, and zero-day attacks on software vulnerabilities yet to be patched.
Low prevalence Display all files that have been executed across your organization, ordered by prevalence from lowest to highest, to
executables help you surface previously undetected threats seen by a small number of users. Files executed by only a few users
may be malicious (such as a targeted advanced persistent threat) or questionable applications you may not want on
your extended network.
Endpoint IoCs Users can submit their own IoCs to catch targeted attacks. These Endpoint IoC’s let security teams perform deeper
levels of investigation on lesser known advanced threats specific to applications in their environment.
Vulnerabilities Identify vulnerable software and close attack pathways. This feature shows a list of hosts that contain vulnerable
software, a list of the vulnerable software on each host, and the hosts most likely to be compromised. Powered by our
threat intelligence and security analytics, AMP identifies vulnerable software being targeted by malware, shows you the
potential exploit, and provides you with a prioritized list of hosts to patch.
Command Line This feature provides visibility into what command lines arguments are used to launch executables. See into command
Visibility line arguments to determine if legitimate application, including Windows utilities, are being used for malicious purposes.
For instance, see if vssadmin is being used to delete shadow copies or disable safe boots; get visibility into PowerShell-
based exploits; see into privilege escalation, modifications of access control lists (ACLs), and attempts to enumerate
systems.
Application With a bi-directional (read and write) API enabled on AMP for Endpoints, users can more easily integrate with third-
Programming party security tools and SIEMs, and access data and events in their AMP for Endpoints account without the need to log
Interface (API) into the management console.
© 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 11
Feature Benefits
Outbreak control Achieve control over suspicious files or outbreaks, and quickly and surgically control and remediate an infection without
waiting for a content update. Within the outbreak control feature, simple custom detections can quickly block a specific
file across all or selected systems; advanced custom signatures can block families of polymorphic malware; application
blocking lists can enforce application policies or contain a compromised application being used as a malware gateway
and stop the re-infection cycle; custom whitelists will help ensure that safe, custom, or mission-critical applications
continue to run no matter what; and device flow correlation will stop malware call-back communications at the source,
especially for remote endpoints outside the corporate network. Watch Demo
Integration with Threat The integration of Threat Grid’s sandboxing technology and advanced malware analysis capabilities into AMP for
Grid Endpoints provides over 800 unique behavioral indicators analyzing the actions of a file, easy to understand threat
scores, and billions of malware artifacts at your disposal for unmatched scale and coverage from global threats. No
need to deploy a sandbox from a third party or worry about any type of outside integration.
Integration with Get agentless detection when AMP for Endpoints is deployed alongside a compatible web proxy, like Cisco WSA, or a
Cognitive Threat third-party web proxy like Blue Coat ProxySG. See an average 30% more infections across your environment; uncover
Analytics (CTA) file-less or memory-only malware, and infections that live in a web browser only; catch malware before it compromises
the OS-level; get visibility into devices with no AMP for Endpoints connector installed; see CTA detection events in the
AMP for Endpoints management console. See Overview
AMP Private Cloud AMP for Endpoints can be deployed as an on-premises, air-gapped solution built specifically for organizations with
Virtual Appliance high-privacy requirements that restrict using a public cloud.
Launch from With a Cisco AnyConnect v4.1 remote access VPN client installed, users can elect to launch the AMP for Endpoints
AnyConnect v4.1 connector on that remote endpoint. This allows for a rapid expansion of endpoint threat protection to VPN-enabled
endpoints and further minimizes the potential of an attack from a remote host. Gain more insight into remote endpoints,
and accelerate remediation efforts during or after an attack.
Warranty Information
Find warranty information on the Cisco.com Product Warranties page.
Ordering Information
Cisco AMP for Endpoints can be ordered using the appropriate License and Subscription part numbers:
1. Begin by searching for the AMP for Endpoints license part number: FP-AMP-LIC=
2. Enter the quantity that equals the number of AMP for Endpoints connectors that are being purchased
© 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 9 of 11
3. After the number is entered, the correct Subscription part number will be auto-selected. A 1-year subscription
is the default
4. AMP for Endpoints accounts are term-based subscriptions of 1, 3, or 5 years. Terms of 3 or 5 years will
require editing the Service/Subscription term for the FP-AMP-LIC= part number
Figure 5 shows the structure of the AMP for Endpoints part numbers.
To place an order, visit the Cisco Ordering Home Page, contact your Cisco sales representative, or call us at
800 553-6387.
© 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 10 of 11
Cisco Advanced Malware Protection for Endpoints Subscription SKUs
Part Number Subscription SKU Description
FP-AMP-LIC= FP-AMP-3Y-S11 Cisco Advanced Malware Protection 3YR, 22500-24999 Nodes
FP-AMP-LIC= FP-AMP-3Y-S12 Cisco Advanced Malware Protection 3YR, 25000+ Nodes
Cisco Capital
Financing to Help You Achieve Your Objectives
Cisco Capital can help you acquire the technology you need to achieve your objectives and stay competitive. We
can help you reduce CapEx, accelerate your growth, and optimize your investment dollars and ROI. Cisco Capital
financing gives you flexibility in acquiring hardware, software, services, and complementary third-party equipment.
And there’s just one predictable payment. Cisco Capital is available in more than 100 countries. Learn more.
© 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 11 of 11