AV-Comparatives named Cisco a Strategic Leader in its EPR report Cisco Secure Endpoint (previously AMP for Endpoints) was named a Strategic Leader by AV -Comparatives in the Endpoint Prevention and Response (EPR) CyberRisk Quadrant in their inaugural EPR Comparative Report. AV-Comparatives is a leading independent endpoint security software testing organization withtwo decades … [Read more...] about Cisco Secure Endpoint named an Endpoint Prevention and Response (EPR) Leader
Endpoint
Pinpoint Your SolarWinds Exposure with Cisco Endpoint Security Analytics
As various private organizations and high-value government bodies figure out the blast radius of the recent state-sponsored SolarWinds attack, with Cisco Endpoint Security Analytics (CESA) in your toolkit you could quickly assess your own exposure…like the CESA customer noted below. CESA brings together the unparalleled endpoint behavioral visibility of Cisco’s AnyConnect … [Read more...] about Pinpoint Your SolarWinds Exposure with Cisco Endpoint Security Analytics
Cisco Secure Endpoint Named an Endpoint Security Top Player
The Radicati Group has named Cisco a Top Player in the Endpoint Security – Market Quadrant 2020. Radicati recognizes endpoint security top players as “current market leaders with products that offer, both breadth and depth of functionality, as well as possess a solid vision for the future. Top Players shape the market with their technology and strategic vision.” We believe our … [Read more...] about Cisco Secure Endpoint Named an Endpoint Security Top Player
Threat Landscape Trends: Endpoint Security, Part 2
Part 2: LOLBins, operating systems, and threat types Being aware of what’s occurring on the threat landscape can be a valuable tool when it comes to defending your organization. If you’re well informed, that puts you in a good position to decide how best to protect your assets and allocate resources accordingly. While it’s important to stay up to date with the latest … [Read more...] about Threat Landscape Trends: Endpoint Security, Part 2
The Endless Evolution for Endpoint Security
Don’t you wish something — anything — in security was a checkbox? A box to tick and be done with it? Well, endpoint security isn’t one of those. Or is it? You and your organization must keep maturing along your security journey with better tools, more knowledge, and smarter people. The same is true for the security vendors you look to for protection. Vendors like Cisco must … [Read more...] about The Endless Evolution for Endpoint Security
Threat Landscape Trends: Endpoint Security
Part 1: Critical severity threats and MITRE ATT&CK tactics In the ongoing battle to defend your organization, deciding where to dedicate resources is vital. To do so efficiently, you need to have a solid understanding of your local network topology, cloud implementations, software and hardware assets, and the security policies in place. On top of that, you need to have an … [Read more...] about Threat Landscape Trends: Endpoint Security
MITRE ATT&CK: The Magic of Endpoint Protection
In our first blog, we introduced the Magic of Mitigations. They’re the key to getting started with MITRE ATT&CK. Now let’s look at some of the most magical ones, starting today with Behavior Prevention on Endpoint (M1040), Exploit Protection (M1050) and Execution Prevention (M1038). Wait, what’s the difference? At a quick glance, they might all sound about the same. So … [Read more...] about MITRE ATT&CK: The Magic of Endpoint Protection
Getting more value from your endpoint security tool #5: Querying Tips for Vulnerability & Compliance
Thank you for tuning in to the fifth and final installment of this blog series. As I stated in my previous blog posts on orbital advanced search, my father was an automobile mechanic. More specifically, he was a “brakes and front-end mechanic”. On several occasions, Pops would point out the wear on a set of tires and would tell me that either the car was out of alignment, … [Read more...] about Getting more value from your endpoint security tool #5: Querying Tips for Vulnerability & Compliance
Getting more value from your endpoint security tool #4: Querying Tips for IT Operations
As the son of a retired automotive mechanic, the lessons my father taught me are still just as important today. As I mentioned in my previous post about Orbital Advanced Search, “Pops” was always teaching me something. This time it was to always clean the tools after every job, maintain the tools that need oil, etc., and to always keep your tools organized neatly in the … [Read more...] about Getting more value from your endpoint security tool #4: Querying Tips for IT Operations
Getting more value from your endpoint security tool #3: Querying Tips for Incident Investigation
Have you ever looked around the house for a specific tool to complete a task? And, after looking high and low, even scouring through that bottomless “junk drawer,” you were unsuccessful locating it. Then, you decide to just use what you have readily available. You know, using that flathead screwdriver as a chisel or a prybar, which inevitably breaks because you did not use the … [Read more...] about Getting more value from your endpoint security tool #3: Querying Tips for Incident Investigation