Cisco Secure Endpoint Logo
Cisco Secure Endpoint Logo
Cisco Systems

Cisco Secure Endpoint

Composite Score
7.8 /10
CX Score
8.4 /10
Category
Cisco Secure Endpoint
7.8 /10

What is Cisco Secure Endpoint?

Secure Endpoint offers cloud-delivered, advanced endpoint detection and response across multidomain control points to rapidly detect, contain, and remediate advanced threats. Stop threats with built-in or completely managed endpoint detection and response (EDR), threat hunting, and integrated risk-based vulnerability management from Kenna Security The built-in SecureX platform delivers a unified view, simplified incident management, and automated playbooks. Our proactive, human-driven hunts for threats map to the MITRE ATT&CK framework to help you thwart attacks before they cause damage.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Cisco Secure Endpoint Ratings

Real user data aggregated to summarize the product performance and customer experience.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

91 Likeliness to Recommend

93 Plan to Renew

91 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+99 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Cisco Secure Endpoint?

0% Negative
0% Neutral
100% Positive

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Feature Ratings

Average 81

IOC Tools

88

Malware Identification Accuracy

87

Automated Threat Response

87

Continuous Monitoring

85

Whitelisting Blacklisting

85

IOC Consumption

84

Intrusion Detection Prevention

82

Agent Efficiency

80

Task Prioritization

80

Behavioural Analytics

78

Machine Learning

71

Vendor Capability Ratings

Average 85

Usability and Intuitiveness

89

Ease of Implementation

88

Business Value Created

88

Product Strategy and Rate of Improvement

88

Ease of IT Administration

88

Quality of Features

85

Vendor Support

85

Breadth of Features

84

Ease of Data Integration

83

Ease of Customization

79

Availability and Quality of Training

78

Cisco Secure Endpoint Reviews

Issac P.

  • Role: Information Technology
  • Industry: Engineering
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Mar 2023

A product that lives up to its name

Likeliness to Recommend

9 /10

What differentiates Cisco Secure Endpoint from other similar products?

The product does what it advertises, nothing much to compare

What is your favorite aspect of this product?

The threat definitions for the malware detection are updated through timely updates ensuring that the system is safe from malware. The secure connectivity ensures that the system connects to the secured network through VPN so that the company network files and programs can be easily accessed.

What do you dislike most about this product?

The user interface is not really intuitive and is looks very basic.

What recommendations would you give to someone considering this product?

The product lives up to its name and comes with the reliability of cisco.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Gabriel I.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: Business Leader or Manager
Validated Review
Verified Reviewer

Submitted Aug 2022

Solution meets all desired expectation

Likeliness to Recommend

10 /10

What differentiates Cisco Secure Endpoint from other similar products?

Powerful EDR capabilities: Stop threats with built-in or completely managed endpoint detection and response (EDR), threat hunting, and integrated risk-based vulnerability management from Kenna Security. Integrated XDR capabilities: You get a unified view, simplified incident management, and automated playbooks with our built-in SecureX platform, making our extended detection and response (XDR) the broadest in the industry.

What is your favorite aspect of this product?

Streamlined investigations, faster response: Time spent on complex investigations is time lost. Get the answers you need about your endpoints—quickly—with Orbital Advanced Search capability. Built-in SecureX threat hunting: A resilient business is proactive. Thwart attacks before they cause damage, while also preparing for the future, with human-driven threat hunting that maps to the MITRE ATT&CK framework.

What do you dislike most about this product?

Solution meets all desired expectation

What recommendations would you give to someone considering this product?

Secure Endpoint establishes protection, detection, response, and user access coverage to defend your endpoints.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Anthony O.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: Vendor Management and Renewal
Validated Review
Verified Reviewer

Submitted Jul 2022

Does what you need, but admin interface outdated

Likeliness to Recommend

5 /10

What differentiates Cisco Secure Endpoint from other similar products?

The admin interface. It's outdated in comparison with the likes of MS Defender

What is your favorite aspect of this product?

Very high efficacy due to the integration with Talos threat intelligence.

What do you dislike most about this product?

Administrators interface

What recommendations would you give to someone considering this product?

Try the alternatives first.

Pros

  • Continually Improving Product
  • Reliable
  • Respectful
  • Transparent

Most Popular Cisco Secure Endpoint Comparisons

  • ThreatDown EDR Logo

    ThreatDown EDR

    Compare
  • Crowdstrike Falcon Platform Logo

    Crowdstrike Falcon Platform

    Compare
  • Sophos Intercept X Endpoint Logo

    Sophos Intercept X Endpoint

    Compare
  • Microsoft Defender for Endpoint Logo

    Microsoft Defender for Endpoint

    Compare
  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • SentinelOne Singularity Platform Logo

    SentinelOne Singularity Platform

    Compare