Cisco Secure Endpoint (formerly AMP for Endpoints)

Protection for Banking

Cisco Secure Endpoint (formerly AMP for Endpoints) integrates prevention, detection, threat hunting and response capabilities in a single solution, leveraging the power of cloud-based analytics. Secure Endpoint will protect your Windows, Mac, Linux, Android, and iOS devices through a public or private cloud deployment.

The solution offered by InfoSoft Systems delivers advanced malware protection using static analysis, dynamic analysis (sand-boxing), continuous monitoring of all file activity, and security intelligence stored locally. The virtual appliance satisfies privacy policy compliance of the costumer yet provides endpoint protection across the enterprise including comprehensive advanced malware protection without compromising costumer capabilities, and scalability.

Company specializations and certified staff in security make us able to bring to the client advanced solutions in Network security technology

Futures Benefits

Stopping threats at the earliest point in time ensures minimal damage to endpoints and less downtime after a breach. Secure Endpoint employs a robust set of preventative technologies to stop malware, in real-time, protecting endpoints against today’s most common attacks.

  • File reputation
  • Antivirus
  • Machine learning analysis
  • Exploit prevention.
  • Script protection
  • Behavioral protection


Though malware prevention techniques are necessary for a complete next-generation endpoint security solution, combatting advanced threats requires additional measures. Secure Endpoint continuously monitors endpoints to help detect new and unknown threats.

  • Malicious activity protection
  • Cloud-based indicators of compromise
  • Host-based IoCs
  • Vulnerabilities
  • Low prevalence

Threat Hunting

SecureX Threat Hunting is a proactive analyst-centric approach to detecting hidden advanced threats. This capability is offered exclusively as part of the new Premier license tier within Secure Endpoint. It tells the incident responders a narrative of how an attack was spotted or how it evolved and what to do next in terms of response. The purpose is to discover and thwart attacks before they cause any damage. As a side-effect of leveraging a regular and continuous threat hunting, an organization increases their knowledge of vulnerabilities and risks which further allows the hardening of their security environment.

SecureX Threat Hunting leverages the expertise of both Talos and the Cisco Research and Efficacy Team to help identify threats found within the customer environment. Cisco delivers highly automated human-driven hunts based on playbooks producing high-fidelity alerts. The process uniquely combines the Orbital Advanced Search technology with expertise from elite threat hunters, with 20 years of industry experience, to proactively find more sophisticated threats.

The Secure Endpoint Premier license is available to order globally in all regions. However, the SecureX Threat Hunting infrastructure that processes the customer telemetry and executes hunts is currently available only in North America.


As the number and variety of advanced threats designed to slip past preventative measures increase, the possibility of a breach should be treated as an eventuality. With that mindset, a powerful tool-set should be deployed to help easily identify infected endpoints and understand the scope of an attack. In addition to multiple prevention and detection capabilities, Secure Endpoint offers granular endpoint visibility and response tools to handle security breaches quickly and efficiently.

  • Dashboards and inbox
  • Endpoint forensics
  • Dynamic analysis
  • Retrospective security
  • Command line visibility
  • Endpoint isolation.
  • Advanced search

Cisco Secure Endpoint independent third party tests

Platform support and compatibility

Secure Endpoint is compatible with the following operating systems.

  • Microsoft
    • Windows 8, 8.1
    • Windows 10
    • Windows Server 2012, 2012 R2, 2016, 2019
  • Linux
    • Red Hat Enterprise Linux or CentOS 6.9, 6.10, 7.4-7.8, 8.1, 8.2
    • Oracle Linux (Red Hat Compatible Kernel) 6.10, 7.7, 7.8, 8.1, 8.2
  • Android
    •  Android 6.0 (Marshmallow) and above
  • Apple
    • iOS 11.3 and above
    • macOS 10.13, 10.14, 10.15

InfoSoft Systems

…stronger together...