SlideShare a Scribd company logo
1 of 2
Download to read offline
Advanced Malware Protection 
Everywhere 
A Leader in NSS Labs breach detection systems security value map 
Today’s constantly evolving advanced 
malware and APTs can evade point-in-time 
defenses to penetrate networks. 
Security professionals must evolve their 
strategy in lock-step to confront these advanced threats 
before, during and after attacks. NSS Labs recently cut 
through the noise surrounding advanced threats and 
the tools that fight them in the industry’s most rigorous 
testing to date of Breach Detection Systems, including 
Sourcefire (Cisco) Advanced Malware Protection. 
Advanced Malware Protection (AMP) is the only solution that goes beyond 
point-in-time detection to also offer continuous analysis, retrospective 
security and multi-source Indicators of Compromise for protection before, 
during and after attacks. AMP is available everywhere including networks, 
endpoints, email, web, mobile devices, cloud and virtual systems, for 
integrated, best-in-class advanced threat protection. It’s why we’re a leader 
in the NSS Labs Security Value Map (SVM) for Breach Detection Systems 
in total cost of ownership and security effectiveness—protecting against 
99 percent of all attacks tested and the lowest total cost of ownership 
as measured by protected megabits. It also excelled in time to detection, 
meaning it caught threats faster than competing Breach Detection systems. 
Following our success in other NSS Labs testing for FirePOWER™ NGIPS 
and NGFW, AMP proves again our commitment to deliver the best 
protection for your security budget.
To see exactly why we received a Recommended rating from NSS Labs, 
receive your free copy of the 2014 NSS Labs Breach Detection System 
Product Analysis for Sourcefire (Cisco) Advanced Malware Protection. Simply 
visit www.sourcefire.com/NSS_BreachDetection. 
About Sourcefire 
Sourcefire, now part of Cisco, is a world leader in intelligent cybersecurity 
solutions. Together with Cisco, Sourcefire provides a broad portfolio of 
integrated solutions that deliver unmatched visibility and continuous 
advanced threat protection across the entire attack continuum—before, 
during and after an attack. For more information about Sourcefire, please 
visit www.sourcefire.com. 
©2014 Cisco and/or its affiliates. Sourcefire, the Sourcefire logo, Snort, the Snort and Pig logo, Agile Security and the Agile Security 
logo, ‘Before, During, and After,’ ClamAV, FireAMP, FirePOWER, FireSIGHT and certain other trademarks and logos are trademarks 
or registered trademarks of Cisco in the United States and other countries. Other company, product and service names may be 
trademarks or service marks of others. 
4.14 | REV1

More Related Content

More from Cisco Security

Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkCisco Security
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco Security
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation FirewallCisco Security
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsCisco Security
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityCisco Security
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and PerformanceCisco Security
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicCisco Security
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security ChallengesCisco Security
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyCisco Security
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of InactivityCisco Security
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityCisco Security
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security StrategiesCisco Security
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardCisco Security
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Cisco Security
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessCisco Security
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
String of Paerls Infographic
String of Paerls InfographicString of Paerls Infographic
String of Paerls InfographicCisco Security
 
Midyear Security Report Infographic
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report InfographicCisco Security
 

More from Cisco Security (20)

Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
String of Paerls Infographic
String of Paerls InfographicString of Paerls Infographic
String of Paerls Infographic
 
Midyear Security Report Infographic
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report Infographic
 

NSS Labs Advanced Malware Protection Report

  • 1. Advanced Malware Protection Everywhere A Leader in NSS Labs breach detection systems security value map Today’s constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lock-step to confront these advanced threats before, during and after attacks. NSS Labs recently cut through the noise surrounding advanced threats and the tools that fight them in the industry’s most rigorous testing to date of Breach Detection Systems, including Sourcefire (Cisco) Advanced Malware Protection. Advanced Malware Protection (AMP) is the only solution that goes beyond point-in-time detection to also offer continuous analysis, retrospective security and multi-source Indicators of Compromise for protection before, during and after attacks. AMP is available everywhere including networks, endpoints, email, web, mobile devices, cloud and virtual systems, for integrated, best-in-class advanced threat protection. It’s why we’re a leader in the NSS Labs Security Value Map (SVM) for Breach Detection Systems in total cost of ownership and security effectiveness—protecting against 99 percent of all attacks tested and the lowest total cost of ownership as measured by protected megabits. It also excelled in time to detection, meaning it caught threats faster than competing Breach Detection systems. Following our success in other NSS Labs testing for FirePOWER™ NGIPS and NGFW, AMP proves again our commitment to deliver the best protection for your security budget.
  • 2. To see exactly why we received a Recommended rating from NSS Labs, receive your free copy of the 2014 NSS Labs Breach Detection System Product Analysis for Sourcefire (Cisco) Advanced Malware Protection. Simply visit www.sourcefire.com/NSS_BreachDetection. About Sourcefire Sourcefire, now part of Cisco, is a world leader in intelligent cybersecurity solutions. Together with Cisco, Sourcefire provides a broad portfolio of integrated solutions that deliver unmatched visibility and continuous advanced threat protection across the entire attack continuum—before, during and after an attack. For more information about Sourcefire, please visit www.sourcefire.com. ©2014 Cisco and/or its affiliates. Sourcefire, the Sourcefire logo, Snort, the Snort and Pig logo, Agile Security and the Agile Security logo, ‘Before, During, and After,’ ClamAV, FireAMP, FirePOWER, FireSIGHT and certain other trademarks and logos are trademarks or registered trademarks of Cisco in the United States and other countries. Other company, product and service names may be trademarks or service marks of others. 4.14 | REV1