Comparison of Malware Protection: Firepower vs. AMP for Endpoints

Advanced Malware Protection Differences by Detecting Product

Feature

Firepower Malware Protection (malware defense)

AMP for Endpoints

File type detection and blocking method (file control)

In network traffic, using access control and file policies

Not supported

Malware detection and blocking method

In network traffic, using access control and file policies

On individual endpoints (end-user computers and mobile devices), using a connector that communicates with the AMP cloud

Network traffic inspected

Traffic passing through a managed device

None; connectors installed on endpoints directly inspect files

Malware intelligence data source

AMP cloud (public or private)

AMP cloud (public or private)

Malware detection robustness

Limited file types

All file types

Malware analysis choices

management center-based, plus analysis in the AMP cloud

management center-based, plus additional options on the AMP for Endpoints management console

Malware mitigation

Malware blocking in network traffic, management center-initiated remediations

AMP for Endpoints-based quarantine and outbreak control options, management center-initiated remediations

Events generated

File events, captured files, malware events, and retrospective malware events

Malware events

Information in malware events

Basic malware event information, plus connection data (IP address, port, and application protocol)

In-depth malware event information; no connection data

Network file trajectory

management center-based

management center and the AMP for Endpoints management console each have a network file trajectory. Both are useful.

Required licenses or subscriptions

Licenses required to perform file control and malware defense

AMP for Endpoints subscription. No license is required to bring AMP for Endpoints data into management center.