04-25-2022 04:06 PM
Since the tetra antivirus engine is a part of the AMP for endpoint, do we need an Anti-virus software from other vendor in addition the AMP-4-Endpoint?
04-25-2022 04:51 PM
Nope,
As Tetra is Signature based it will work as your Offline AV solution eliminating the need of a solution from another vendor
04-25-2022 04:58 PM
04-26-2022 12:15 AM
Hello @Meddane ,
Tetra is one part of the whole File Scanning Sequence on Secure Endpoint. But, Secure Endpoint does much more than File Scanning. See Screenshot below:
In Addition to File Scanning on the Endpoint:
We also check the Behaviour of the file in nearly real-time on the endpoint as protection and in the backend as detection.
So finally, Secure Endpoint does a lot of more than traditional Anti-Virus on the endpoint, and therefore no other 3rd Party security software for Endpoint protection (EPP/EDR) is needed.
Greetings, Thorsten
05-16-2022 06:37 AM
It should also be noted that TETRA is not ClamAV in the Windows connector application but is a licensed version of BitDefender.
Similarly, the Exploit Prevention engine is licensed from Morphisec.
Cisco licenses these products and combines them with their own endpoint protection engines in a single package to provide a more complete endpoint protection package which uses a single console.
So, if you want to compare Cisco's TETRA antivirus signatures to other vendors, look to compare the BitDefender signatures and not the ClamAV signatures.
05-16-2022 08:36 AM
Hello @johnosn ,
right, Tetra is used for File Scanning and Parts of ClamAV Engine are used for the file type detection.
Greetings,
Thorsten
02-15-2023 01:06 PM
I know that this is probably closed, but is this still true? Does Tetra still use Bitdefender and Morphesec(and maybe others) for it's engines?
02-15-2023 01:37 PM
02-15-2023 01:57 PM
I appreciate that quick response! Someone in our environment found a bitdefender service and immediately reported to us in Security. Looked into it and found this thread. I appreciate the insight.
02-16-2023 10:33 AM
Hello @mandrews ,
all good!
So scanning on the endpoint is the base we do with Secure Endpoint. Finally the product and the architecture around the product provides much much more capabilities:
Greetings, Thorsten
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide