Loading
July 19, 2017

Cisco Advanced Malware Protection

Company Profile
Company: Yokogawa Electric Corporation
Company Size: Large Enterprise
Industry: Industrial Manufacturing

Challenges
The business challenges that led the profiled company to evaluate and ultimately select Cisco Advanced Malware Protection chose AMP for Endpoints for the following reasons:

  • Endpoint visibility into file activity and threats
  • Ability to continuously monitor file behaviour
  • Simple, easy to use management interface
  •                                                                                                                                                                                                                            

     

     

    About Cisco Advanced Malware Protection

    Get global threat intelligence, advanced sandboxing, and real-time malware blocking to prevent breaches with Cisco Advanced Malware Protection (AMP). But because you can’t rely on prevention alone, AMP also continuously analyzes file activity across your extended network, so you can quickly detect, contain, and remove advanced malware.

     

     

     

     

    Use Case
    The key features and functionalities of Cisco Advanced Malware Protection that the surveyed company uses:

  • Deployed the following in addition to AMP for Endpoints
  • AMP for Firewall (AMP on a Cisco ASA or NGFW Firewall)
  •  

     

     

     

     

    Results
    The surveyed company achieved the following results with Cisco Advanced Malware Protection and was able to do the following with AMP for Endpoints:

  • Improve security effectiveness
  • Detect threats faster
  • Evaluated the following companies prior to signing up with AMP for Endpoints:

  • TrendMicro
  • Symantec
  • McAfee
  • Prevented/Detected/Defeated the following with AMP for Endpoints:

  • Zero-day threats
  • Malvertising
  • Malicious email attachments
  • Experienced improvements in the following areas after deploying AMP for Endpoints:

  • Breach probability and business risk
  • Executive confidence in the security of the organization
  • Visibility into endpoints, vulnerabilities, and threats
  • Top