This resource is no longer available

Criteria for Advanced Malware Protection Buyers Guide


Traditional defenses are no match for today’s attackers, who have the resources, persistence, and intelligence to breach any organization at any time. In response, Advanced Malware Protection (AMP) must become as pervasive as the threats that it fends off, extending from the network to the endpoint and everywhere in between. It must also involve detection, confirmation, tracking, analysis, and remediation of threats at all stages of an attack.

This buyer’s guide includes a variety of questions to ask AMP and anti-malware vendors to determine the extent of the protection that they offer, including:

  • How do you protect devices that roam outside the protected network?
  • How do you deal with malware that has evaded initial detection or is not blocked at the network?
  • How are you using big data for persistent malware determination?
  • And more



By registering for this asset, you indicate that you would like to receive email about products and offerings from Cisco and its family of companies and agree to the use of your personal information according to the Cisco Privacy Statement. You understand that your personal information may be transferred for processing outside my country of residence, where standards of data protection may be different.

Cisco Systems, Inc.
09 Jul 2014
31 Mar 2014
9 Page(s)
White Paper

This resource is no longer available.