Clear your endpoints of malware
April 30, 2021

Clear your endpoints of malware

Oleksandr Tsapenko | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User

Overall Satisfaction with Cisco Advanced Malware Protection (AMP) for Endpoints

Currently I'm using Cisco Advanced Malware Protection (AMP) for Endpoints but have a plan to implement it widely in my company. I think Cisco Advanced Malware Protection (AMP) for Endpoints is a very useful solution for achieving our goal to secure users from risk to be infected by malware.
  • Ease of use
  • Straight method to solve specific security issues and fulfill the security gap
  • Cisco Advanced Malware Protection (AMP) for Endpoints could have some features to integrate with third-party solutions
  • Ease of management
  • Reduced expenses on protection
Great web interface, which allows you to easily manage all devices and have an overall view of the whole security picture.
Like most Cisco products, Cisco Advanced Malware Protection (AMP) for Endpoints has a great knowledge base on Cisco's community portal, but unfortunately the Cisco support team cannot always clearly describe the solution for your issue, especially if it is related to the demo period. Nevertheless, Cisco goes to great efforts to improve your current situation with Cisco Advanced Malware Protection (AMP) for Endpoints support.
Cisco Advanced Malware Protection (AMP) for Endpoints is one of a wide spectrum of Cisco security products and is the first step that can bring you to start using Cisco AnyConnect and Cisco ISE to integrate with them.
Specific tool for specific need. If you have a gap in your security infrastructure (protection from malware) you might think to use Cisco Advanced Malware Protection (AMP) for Endpoints to make sure your company's devices are safe. But also you can go beyond and enforce your SOC with Cisco AnyConnect where Cisco Advanced Malware Protection (AMP) for Endpoints is used as one of modules.

Cisco Secure Endpoint Feature Ratings

Anti-Exploit Technology
7
Endpoint Detection and Response (EDR)
8
Centralized Management
9
Infection Remediation
4
Vulnerability Management
6
Malware Detection
8