(844) 773-7734 mk@mkss.us

Cisco Bolsters Endpoint Security to Stop Threats with Simple, Unified Defense

Cyberattacks hit businesses every day. Ransomware is especially problematic, with the number of successful ransomware attacks increasing Year Over Year (YoY). Clearly, organizations need to defend against ransomware if they are going to avoid its costly damages. Cisco Secure Endpoint protects against cyberattacks with a cloud-delivered, single agent solution. It is the only endpoint security solution that comes with a built-in extended detection and response (XDR) platform, allowing you to see more threats, block more attacks, and remediate faster.

Cisco Endpoint Security expands to stop more stop threats easier, faster

In my blog yesterday, I had mentioned the introduction of Secure Cloud Insights, which enriches the Cisco SecureX platform with context from your cloud assets. Today, we are announcing enhancements to Cisco’s endpoint security product — Secure Endpoint — to deliver outcomes that radically simplify your security, maximize your security operations, and help you achieve peace of mind.

Radically simplifying your security starts with unifying your security stack, reducing agent fatigue, and achieving Extended Detection and Response (XDR), Secure Access Service Edge (SASE), and zero-trust outcomes by consolidating endpoint security, cloud security, and remote access agents into our enhanced single agent that you can easily manage in the cloud with our built-in SecureX platform.

Maximizing your security operations involves two key ingredients: focus and speed. We help you focus on the most important vulnerabilities with integrated risk-based vulnerability management from Kenna Security to rapidly predict, prioritize, and guide the remediation of vulnerabilities.

Achieving peace of mind in endpoint security can be difficult but it is not impossible. We help you get the security confidence you need by offering endpoint detection and response capabilities completely managed by a team of dedicated Cisco experts that focus on reducing detection and response times while fortifying your security posture with always-on security operations.

Other key enhancements include:

  • Gain better threat visibility from the cloud to the endpoint with Secure Device Insights and Secure Cloud Insights, which provide enriched insights into your on-premises and cloud assets.
  • Simplify threat hunting and security investigations with our expanded advanced search and live querying capability to find threats quickly and confidently on your endpoints across Windows, Mac, and Linux environments.
  • Accelerate threat response and remediation by automatically promoting and prioritizing incidents from Secure Endpoint to SecureX.
  • Reduce the attack surface with our robust behavioral protection that maps our detections to the latest MITRE ATT&CK framework, while enhancing our ability to stop fileless malware attacks before any or further incidents affect your endpoints.

The dangers of ransomware and other threats to organizations drive our innovations

Ransomware continues to wreak havoc, affecting individuals, businesses, and governments –encrypting their files and holding them “hostage” until a ransom payment for the decryption key is paid. With ransomware actors successfully putting their victims in a position where paying the ransom is the easiest way to regain access to their files, there is no end in sight for this attack trend.

Meanwhile, another stealthy type of threat – fileless malware attacks – has experienced exponential growth over the last couple of years, and grew in prevalence by 900% YoY in 2020 alone. This figure may initially sound surreal, that is, until you consider how effective fileless malware can be when it comes to giving cybercriminals an easy way to infect your environment without leaving a trace. This type of malware avoids detection by executing in-memory. Fileless malware does not have signatures, making it especially difficult to prevent.

As ransomware, fileless malware and an array of new threats arise, organizations have resorted to deploying a myriad of security controls that are resulting in complexity and inefficiency along the way. Today, the average enterprise security operations (SecOps) center uses 45 disparate security tools from 13 different vendors – all while concurrently dealing with an ongoing cybersecurity talent shortage, agent fatigue, and other SecOps challenges. It is no wonder the industry is calling for simplicity, consolidation, and in some cases a completely managed security option.

Keeping endpoints secured from any threat is a top priority for organizations. A comprehensive, cloud-delivered single agent solution that provides the highest levels of security and the ability to reduce complexity with a simple, unified defense is essential. 

Cisco’s approach to endpoint security

When it comes to securing your endpoints, our focus is to effectively stop threats, while at the same time, accelerating and maximizing your security operations. We deliver the capabilities you need to see more threats, block more attacks, and remediate faster and more completely, all while helping you maximize your security operations. Here’s how.

Our relentless attention to simplifying cybersecurity allows our customers to boost their security operations effectiveness through a cloud-delivered, single agent approach that is easily managed with our built-in SecureX platform. Our customers maximize SecOps outcomes even as they gain always-on security operations while enjoying valuable time and cost savings with endpoint detection and response completely managed by our elite team of security experts. Consider our security specialists an extension of your SecOps team that lets you focus on the most important threats.

Seeing more threats can be the key to becoming a “victor not a victim” of a breach. We help you hunt for hidden threats while detecting and investigating the first sign of ransomware and other advanced attacks by up to 95% faster with the broadest threat intelligence from Talos and expertise from our specialists. Finding existing and emerging threats is easier with our 24x7x365 monitoring, detection, and response from a team of 2,200+ Security Operations Center (SOC) experts including threat researchers, investigators, and incident responders.

Blocking more attacks keep you away from the headlines. We help you stop threats before compromise by reducing the attack surface with our multifaceted prevention techniques, posture assessments, and risk-based vulnerability management.

The last key ingredient is remediating incidents faster and more completely, your way. Our customers have experienced a massive reduction in incident response time by as much as 97% with our advanced Endpoint Detection and Response (EDR) and built-in XDR from our SecureX platform. Our endpoint security licensing is simple, yet it gives you the flexibility you need to do it yourself, with a partner, or completely managed by Cisco. The latter option gives you access to our Cisco specialists who are laser-focused on drastically reducing the mean time to detect and respond to threats using in-depth telemetry, defined playbooks, and an integrated security architecture to quickly investigate and remediate threats. 


Join us at our upcoming webinar to learn more about how you can get maximum protection in a radically simplified approach to endpoint security.

Start a free trial of Cisco Secure Endpoint today.


We’d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!

Cisco Secure Social Channels