If your organization has high privacy requirements that restrict using a public cloud, the Cisco Advanced Malware Protection (AMP) Private Cloud Virtual Appliance is an on-premises option. It delivers comprehensive advanced malware protection using big data analytics, continuous analysis, and security intelligence stored locally.
John Chambers discusses securely capturing the IoE opportunity.
Cisco AMP gives you the visibility and control to stop malware in its tracks. (04:24 min)
In the event that Cisco AMP discovers an unknown, suspicious file, it will interact with the vast public cloud security intelligence networks of both Cisco and Sourcefire (now a part of Cisco) for file disposition lookup. It will send only anonymized SHA256 information and then update the AMP Private Cloud and enable retrospective security.
The AMP Private Cloud and management system is a single on-premises product that you install on your hardware through a self-contained virtual machine.
The AMP Private Cloud Virtual Appliance connects to Cisco AMP for Endpoints through connectors and directly to Cisco AMP for Networks for protection against network malware.
Each private cloud instance supports up to 10,000 connectors, and multiple Private Cloud Virtual Appliances can be added to the environment.
The Cisco AMP private cloud option includes many of the same capabilities as the AMP public cloud deployment option.
CAPABILITIES |
AMP PRIVATE CLOUD DEPLOYMENT OPTION |
AMP PUBLIC CLOUD DEPLOYMENT OPTION |
---|---|---|
File and device trajectory |
Included |
Included |
Threat root cause |
Included |
Included |
Local cloud indications of compromise (IoC) and alerting |
Included |
Included |
Simple and advanced |
Included |
Included |
Cloud lookups and retrospective alerting |
Included |
Included |
File analysis and properties, and scheduled scans |
Not included |
Included |
Learn how attackers profit from gaps between defender intent and action.
Understand the buying criteria to effectively deal with advanced malware.
Learn why Cisco AMP leads in security effectiveness and total cost of ownership.