<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NGIPS Vs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3925457#M979751</link>
    <description>&lt;P&gt;They are all the same hardware and software. The difference is in how you configure and use them.&lt;/P&gt;
&lt;P&gt;Other minor differences are things like if you specify the appliance with ASA image, the ordering tool doesn't allow you to choose Fail-to-wire (FTW) netmods as they are incompatible with ASA software.&lt;/P&gt;</description>
    <pubDate>Tue, 17 Sep 2019 08:51:09 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2019-09-17T08:51:09Z</dc:date>
    <item>
      <title>NGIPS Vs</title>
      <link>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3917146#M979707</link>
      <description>&lt;P&gt;Dears&lt;/P&gt;&lt;P&gt;I want to know more on the NGIPS of Cisco, hence what i know the NGIPS are signature less and they detected on the pattern based , actually can anybody share with me an example how threat will be detected by a pattern algorithm, If it is pattern algorithm then what are the&amp;nbsp; rule update in the Cisco Firepower.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As if now the fortinet firewalls are capable of doing DLP, Antivirus, NGIPS, Web Filtering, APP Filtering, WAF, EMAIL Security all in one box,, is it Cisco Firepower supports DLP, Antivirus, WAF,Email Security&amp;nbsp; i don't think so becz i don't see any option to configure them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also i would like to know about Cisco AMP, Cisco has 2 types of AMP , AMP for endpoint and Network AMP ( AMP 7150, 8050 etc etc ),what difference these AMP do then a Threat grid ( Sandboxing),&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If a customer has an AMP does he require a Cisco Threat Grid subscription or on premises ??? and if a customer has a Threat Grid does he needs a Cisco AMP. ( network or endpoint)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 03 Sep 2019 04:56:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3917146#M979707</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2019-09-03T04:56:51Z</dc:date>
    </item>
    <item>
      <title>Re: NGIPS Vs</title>
      <link>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3920239#M979726</link>
      <description>&lt;P&gt;It's easiest to just have a look at a typical IPS rule (see screenshot below) than to explain it in general. Rule updates in Firepower are new Snort rules created by Cisco Talos = IPS rules.&lt;/P&gt;
&lt;P&gt;Firepower is not a Unified threat Management (UTM) device so its coverage of the other areas you mentioned is little to none. You can do very crude DLP with sensitive data protection feature.&lt;/P&gt;
&lt;P&gt;AMP is available on Firepower as well as as an endpoint product. They are complimentary. If we can see and block the file as it transits the perimeter then that's a good thing. The endpoint product is more comprehensive but only for the endpoints where it is installed.&lt;/P&gt;
&lt;P&gt;AMP (all kinds) uses the Threatgrid backend to a certain extent. Without a Threatgrid subscription your account is limited to a small number of file submissions (200 if I recall correctly) for Threatgrid analysis per 24 hour period. You also get the detailed insight when you have full threatgrid and the ability to play the sandbox recordings, submit files on an ad hoc basis directly etc. It's more useful for a full Security Operations Center and/or forensic investigative purpose. If you only have Threatgrid (and no AMP) then you are only doing manual file submission - not very useful for most enterprises.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2019 14:41:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3920239#M979726</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-09-06T14:41:08Z</dc:date>
    </item>
    <item>
      <title>Re: NGIPS Vs</title>
      <link>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3925200#M979733</link>
      <description>&lt;P&gt;Dear marvin&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for the reply,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can AMP4E replaces&amp;nbsp; corporate antivirus solution which is been used for years and years.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As you have mentioned that without a AMP we can manual submission to threat grid , what if i dont have a AMP ( All kinds) ans i have a ASA with firepoewer services or FTD, they can send file to threatgrid for sanboxing and accordingly they can block, Please correct me if i m wrong.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2019 20:33:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3925200#M979733</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2019-09-16T20:33:25Z</dc:date>
    </item>
    <item>
      <title>Re: NGIPS Vs</title>
      <link>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3925310#M979743</link>
      <description>&lt;P&gt;You're welcome.&lt;/P&gt;
&lt;P&gt;Yes AMP4E can replace traditional antivirus products.&lt;/P&gt;
&lt;P&gt;If you do not have AMP for Networks licensing on your ASA Firepower service module or FTD device then they cannot avail themselves of Threatgrid by themselves. The automated file upload requires an AMP for Network license.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2019 03:14:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3925310#M979743</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-09-17T03:14:54Z</dc:date>
    </item>
    <item>
      <title>Re: NGIPS Vs</title>
      <link>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3925386#M979747</link>
      <description>&lt;P&gt;Dear Marvin&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the reply,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please find the attached , I have once question here , is it FPR4110-NGIPS-K9 and FPR4110-AMP-K9 all are using the same OS ???,&amp;nbsp; so i am confused here AMP for Network has different appliance but are these appliance use the same OS 6.X???&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also want to know for NGIPS OS even,&amp;nbsp; what i understand is FPR 2100,4100,9100 can act as a standalone NGIPS with the same image of FPR 6.X&amp;nbsp; only configuring the IPS part from the FTD OS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please confirm.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2019 06:49:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3925386#M979747</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2019-09-17T06:49:44Z</dc:date>
    </item>
    <item>
      <title>Re: NGIPS Vs</title>
      <link>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3925457#M979751</link>
      <description>&lt;P&gt;They are all the same hardware and software. The difference is in how you configure and use them.&lt;/P&gt;
&lt;P&gt;Other minor differences are things like if you specify the appliance with ASA image, the ordering tool doesn't allow you to choose Fail-to-wire (FTW) netmods as they are incompatible with ASA software.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2019 08:51:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3925457#M979751</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-09-17T08:51:09Z</dc:date>
    </item>
    <item>
      <title>Re: NGIPS Vs</title>
      <link>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3925857#M979753</link>
      <description>&lt;P&gt;Dear marvin&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the reply, You are the one from whom i can expect the replies, Please reply for below queries&amp;nbsp; to have more clarity on the&amp;nbsp; products&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;AMP appliance such as ( 7150, 8050 etc etc ) are also based on FTD image&lt;/LI&gt;&lt;LI&gt;In AMP4E who is the server for endpoints&amp;nbsp; Talos cloud or AMP appliance ( 7150,8050 etc etc ) can become a server.&lt;/LI&gt;&lt;LI&gt;Is it Cisco AMP4E EDR capable??&lt;/LI&gt;&lt;LI&gt;If incase i need to have a dedicated NGIPS then i can add a FTD device 2100,4100 or 9300 models with FTD image using only the IPS Tab in the FTD OS&amp;nbsp; acting as an transparent FW scanning traffic becz i will be having a another box such as 21XX for NGFW. I am assuming the same concept as we use to do in older IPS&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2019 19:38:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3925857#M979753</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2019-09-17T19:38:43Z</dc:date>
    </item>
    <item>
      <title>Re: NGIPS Vs</title>
      <link>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3926335#M979754</link>
      <description>&lt;P&gt;You're welcome.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. 3D Series (71xx and 8xxx) are NOT based on FTD. They are all NGIPS and use classic Firepower OS (from Sourcefire).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. In AMP4E the "server" is usually Cisco's AMP cloud. It can be an on-premises AMP Private appliance. It is never a 3D series appliance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. Cisco contends the AMP for Endpoints product can be characterized as both Endpoint Detection and Response (EDR) and Endpoint Protection Platform (EPP).&lt;/P&gt;
&lt;P&gt;&lt;A href="https://blogs.cisco.com/security/epp-edr-cisco-amp-for-endpoints-is-next-generation-endpoint-security" target="_blank"&gt;https://blogs.cisco.com/security/epp-edr-cisco-amp-for-endpoints-is-next-generation-endpoint-security&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/products/security/endpoint-security/what-is-endpoint-detection-response-edr.html" target="_blank"&gt;https://www.cisco.com/c/en/us/products/security/endpoint-security/what-is-endpoint-detection-response-edr.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Neither term is exact though so people may differ in their opinion.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;4. I'm not sure I understand your question.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2019 14:58:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3926335#M979754</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-09-18T14:58:37Z</dc:date>
    </item>
    <item>
      <title>Re: NGIPS Vs</title>
      <link>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3926526#M979758</link>
      <description>&lt;P&gt;Dear Marvin&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;As per the datasheet classic series ( 71XX, 81XX) are acting as an AMP for Networks for private cloud i assume, and in previous post you confirm to me as per the screenshot attached FTD 21XX,41XX,93XX can act also as a &lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;NGIPS in FTD OS,&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;If i want to order AMP for Network so which part number I have to order becz as u r mentioning 71xx, 81xx are for NGIPS&lt;/LI&gt;&lt;LI&gt;in previous post last question which u didnt understood, I mean to say if 41XX is used as an NGIPS with FTD OS then only the IPS Tab needs to be configured, Please find the attacehd.&lt;/LI&gt;&lt;LI&gt;The 3rd Point above is also applicable for AMP instead of NGIPS&lt;/LI&gt;&lt;LI&gt;Gartner doesn't mentioned AMP4E in a antivirus solution list&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Wed, 18 Sep 2019 20:15:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3926526#M979758</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2019-09-18T20:15:06Z</dc:date>
    </item>
    <item>
      <title>Re: NGIPS Vs</title>
      <link>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3926663#M979759</link>
      <description>&lt;P&gt;1. 7XXX and 8XXX are NOT AMP private cloud appliances. AMP Private cloud is orderable as a virtual or physical appliance:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/fireamp-private-cloud-virtual-appliance/datasheet-c78-742267.html#OrderingInformation" target="_blank"&gt;https://www.cisco.com/c/en/us/products/collateral/security/fireamp-private-cloud-virtual-appliance/datasheet-c78-742267.html#OrderingInformation&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;It acts as the "server" in an AMP for Networks or AMP for Endpoints deployment.&lt;/P&gt;
&lt;P&gt;2. AMP for Networks is not a separate product but rather refers to AMP (Malware) licensing on network devices - those include classic Firepower (7XXX, 8XXX 3D series appliances and NSIPSv), Firepower Threat Defense devices or ASAs with Firepower service modules.&lt;/P&gt;
&lt;P&gt;3. Yes if you want to use your 41XX as only NGIPS then you create inline interfaces and only configure the IPS-specific features (Intrusion policy).&lt;/P&gt;
&lt;P&gt;4. Similarly if you only wanted to use your appliance only for file protection then you would only configure file policy. this would be a very unusual setup though as the cost of an appliance would not normally be justified to use it in such a limited sense.&lt;/P&gt;
&lt;P&gt;5. I cannot comment on why Gartner does or doesn't include certain products in certain categories.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2019 03:28:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3926663#M979759</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-09-19T03:28:23Z</dc:date>
    </item>
    <item>
      <title>Re: NGIPS Vs</title>
      <link>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3927419#M979760</link>
      <description>&lt;P&gt;Dear Marvin&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the reply we are near to the closure of the post. You have cleared 90% of my doubts hence Cisco has made things complicated in datasheets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;In which situation i will come across to use the Classic series, becz whatever classic series is providing is been provided by FTD and ASA/w firepower services.&lt;/LI&gt;&lt;LI&gt;But Cisco has made things complicated in comparison with Fortinet , now in Cisco we have ASA, FTD, source fire (Classic series)&lt;/LI&gt;&lt;LI&gt;As you mentioned that one will not position an appliance for AMP but the same is also not a good practice for position as IPS instead i can positioned a classic series..&amp;nbsp;&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Fri, 20 Sep 2019 07:27:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3927419#M979760</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2019-09-20T07:27:04Z</dc:date>
    </item>
    <item>
      <title>Re: NGIPS Vs</title>
      <link>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3927512#M979762</link>
      <description>&lt;P&gt;Very few new installations will use the classic series.&lt;/P&gt;
&lt;P&gt;Most of the larger vendors have differences in their product lines for various reasons - compatibility with older products, some features customers rely on have not been ported to new architecture, operational models that are slow to adopt new products etc.&lt;/P&gt;
&lt;P&gt;For a dedicated IPS with absolutely no need for other FTD features some (but fewer than before) might still select a new classic series. They might cost a bit less, all other things being equal. On the other hand, they are limited should the organization decide later they want the non-IPS features.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2019 11:24:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3927512#M979762</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-09-20T11:24:24Z</dc:date>
    </item>
    <item>
      <title>Re: NGIPS Vs</title>
      <link>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3927905#M979764</link>
      <description>&lt;P&gt;Dear marvin&lt;/P&gt;&lt;P&gt;Thanks for the reply,&lt;/P&gt;&lt;PRE&gt;For a dedicated IPS with absolutely no need for other FTD features some (but fewer than before) might still select a new classic series. They might cost a bit less, all other things being equal. On the other hand, they are limited should the organization decide later they want the non-IPS features.&lt;/PRE&gt;&lt;P&gt;U mean to say that anybody if planing to deploy a dedicated IPS in their network then&amp;nbsp; they should go with Classics series by configuring IPS features only in the classic boxes, apart from IPS feature if they want to configure any other feature it is their choice to do that. Please correct me if my understandings are not correct according to your reply in above post.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have found some post mentioning about IPS.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/upgrade-to-a-ngips/ta-p/3635567" target="_blank"&gt;https://community.cisco.com/t5/security-documents/upgrade-to-a-ngips/ta-p/3635567&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The one mentioning in the below link is not been covered by Firepower.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/5-reasons-for-choosing-a-dedicated-ngips/ta-p/3635560" target="_blank"&gt;https://community.cisco.com/t5/security-documents/5-reasons-for-choosing-a-dedicated-ngips/ta-p/3635560&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 21 Sep 2019 07:12:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3927905#M979764</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2019-09-21T07:12:52Z</dc:date>
    </item>
    <item>
      <title>Re: NGIPS Vs</title>
      <link>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3927920#M979766</link>
      <description>&lt;P&gt;I was saying that sometimes the customer insists in IPS only. At the end of the day they may make decisions different from my recommendations. There are few reasons for needing a dedicated IPS such as the classic series. If that's their choice then so be it. I usually advise otherwise though.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Those links you mentioned are marketing documents from 2+ years ago. I try to focus on technical and functional requirements and not debate marketing presentations.&lt;/P&gt;</description>
      <pubDate>Sat, 21 Sep 2019 10:10:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngips-vs/m-p/3927920#M979766</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-09-21T10:10:36Z</dc:date>
    </item>
  </channel>
</rss>

