\n Cisco FP-AMP-1Y-S2 antivirus security software Base license 1 year (s)\n \n \n \n \n \n \n Manufacturer:\n Cisco\n \n \n Category:\n Software\n \n \n Sub-Category:\n Antivirus Security Software\n \n \n SKU:\n FP-AMP-1Y-S2\n \n \n EAN:\n \n \n \n \n \n \n Description\n \n \n Organizations today are under the constant threat of cyber attack, & security breaches happen every day. Cisco Advanced Malware Protection (AMP) for Endpoints is a cloud-managed endpoint security solution that provides the visibility, context & control to not only prevent cyber attacks, but also rapidly detect, contain, & remediate advanced threats if they evade front-line defenses & get inside"all cost-effectively, without affecting operational efficiency, & before damage can be done.\n\n\n\n AMP for Endpoints prevents attacks by providing the latest global threat intelligence to strengthen defenses, a built-in antivirus (AV) engine to detect & block attacks at point-of-entry, built-in sandboxing technology to analyze unknown files, & proactive protection capabilities that close attack pathways & minimize vulnerabilities. But if malware evades these prevention measures & gets inside, AMP for Endpoints continuously monitors & records all file activity to quickly detect malicious behavior, retrospectively alert security teams, & then provide deep visibility & a detailed recorded history of the malware&153;s behavior over time"where it came from, where it&153;s been, & what it&153;s doing. AMP can then automatically contain & remediate the threat. AMP protects endpoints"like laptops, workstations, servers, & mobile devices"running Windows, Mac OS, Linux, Android & i OS. Understand AMP for Endpoints in 5 minutes.\n\n\n\n- Protection that goes beyond prevention: Cisco AMP for Endpoints goes beyond just preventing attacks. It analyzes files & traffic continuously. This capability helps enable retrospective security. You can look back in time & trace processes, file activities, & communications to understand the full extent of an infection, establish root causes, & perform remediation. The result: more effective, efficient, & pervasive protection for your organization.\n\n- Monitoring that enables unmatched visibility: Cisco AMP for Endpoints offers more than retrospection. It introduces a new level of intelligence, linking & correlating various forms of retrospection into a lineage of activity available for analysis in real time. It can then look for patterns of malicious behavior from an individual endpoint or across the environment of endpoints.\n\n- Advanced analysis that looks at behaviors over time: Cisco AMP for Endpoints provides automation through advanced behavioral detection capabilities that deliver a prioritized & collated view of top areas of compromise & risk.\n\n- Investigation that turns the hunted into the hunter: Cisco AMP for Endpoints shifts activity from looking for facts & clues as part of an investigation to a focused hunt for breaches based on actual events like malware detections & behavioral indications of compromise (Io Cs).\n\n- Containment that is truly simple: Cisco AMP for Endpoints provides visibility into the chain of events & context that complements its dashboards & trajectory views. AMP provides the ability to target specific applications, files, malware, & other root causes. Breaking the attack chain is not only quick but also easy.\n\n- Dashboards that are actionable & contextual: Reports are not limited to event enumeration & aggregation. Cisco AMP for Endpoints&153; actionable dashboards allow for streamlined management & faster response. (see Figure 1)\n\n- Integrated platforms that work better together: Cisco AMP for Endpoints can be fully integrated with the Cisco AMP for Networks solution, & other AMP deployments, to further increase visibility & control across your organization.\n \n \n \n Specifications\n \n License Number of years 1 year (s) License type Base license Software type Renewal License level purchase required 100
- 499 license (s) System requirements Windows operating systems supported Windows 10, Windows 10 Education, Windows 10 Education x 64, Windows 10 Enterprise, Windows 10 Enterprise x 64, Windows 10 Home, Windows 10 Home x 64, Windows 10 IOT Core, Windows 10 Pro, Windows 10 Pro x 64, Windows 7, Windows 7 Enterprise, Windows 7 Enterprise x 64, Windows 7 Home Basic, Windows 7 Home Basic x 64, Windows 7 Home Premium, Windows 7 Home Premium x 64, Windows 7 Professional, Windows 7 Professional x 64, Windows 7 Starter, Windows 7 Starter x 64, Windows 7 Ultimate, Windows 7 Ultimate x 64, Windows 8, Windows 8 Enterprise, Windows 8 Enterprise x 64, Windows 8 Pro, Windows 8 Pro x 64, Windows 8 x 64, Windows 8.1, Windows 8.1 Enterprise, Windows 8.1 Enterprise x 64, Windows 8.1 Pro, Windows 8.1 Pro x 64, Windows 8.1 x 64 Mac operating systems supported Mac OS X 10.10 Yosemite, Mac OS X 10.7 Lion, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks Linux operating systems supported Cent OS 6.2, Cent OS 7.0, Red Hat EL Linux 6.0, Red Hat EL Linux 7.0 Server operating systems supported Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 x 64, Windows Server 2008, Windows Server 2008 R2, Windows Server 2008 R2 x 64, Windows Server 2008 x 64, Windows Server 2012, Windows Server 2012 R2, Windows Server 2012 R2 x 64, Windows Server 2012 x 64, Windows Small Business Server 2003, Windows Small Business Server 2008 Mobile operating systems supported Android 2.1, Android 2.2, Android 2.3, Android 3.0, Android 3.1, Android 3.2, Android 4.0, Android 4.1, Android 4.2, Android 4.3, Android 4.4, Android 5.0, Android 5.1, Android 6.0, Android 7.1, i OS 11.0\n \n