We secure the laptops down, making sure that where we build the policy, every policy is consistent on every laptop.
Director of Technical Services at a educational organization with 51-200 employees
Streamlines security policy creation and saves a lot of time in identifying threats
Pros and Cons
- "It used to take us a month to find out that something is infected, we now know that same day, as soon it is infected."
- "The user interface is dull."
What is our primary use case?
How has it helped my organization?
It has greatly improved my organization from a security standpoint.
What is most valuable?
The most valuable feature is being able to push a policy. Whenever we update a corporate policy, we update it in one place, push it down, and it updates the policy on every laptop.
Secure Endpoint is good for creating actionable alerts so we can detect and remediate threats. If somebody does get infected, we don't have to wait for them to say, "Oh, I can't use my email." We immediately know about it. We would absolutely know about the problem before the person did. That was our biggest impact.
Secure Endpoint decreased our time to remediation. Where it used to take us a month to find out that something is infected, we now know that same day, as soon it is infected.
Cisco Secure Endpoint has helped improve our cybersecurity resilience. We only have about two IT guys. So it just makes them better at what they do. It saves them time, so they can focus on other things.
It saves them time so they can focus on other tasks.
What needs improvement?
It does a great job for what it is. The user interface face could be slicker. It does not have to be flashy, but the user interface is dull.
Buyer's Guide
Cisco Secure Endpoint
February 2025

Learn what your peers think about Cisco Secure Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
For how long have I used the solution?
I have been using Cisco Secure Endpoint for two years.
What do I think about the stability of the solution?
The solution is rock solid.
What do I think about the scalability of the solution?
The solution is really easy to scale.
How are customer service and support?
I have engaged with tech support and I think they're great at what they do, two thumbs up. I recommend them.
Which solution did I use previously and why did I switch?
We were using Avast and Norton. We felt it was time to switch to something Cisco branded that we could trust because we are a Cisco shop. All of them are proactive, but identity services was a big reason we switched to Secure Endpoint. You cannot really hook Norton into a Cisco ICE. We chose it for the integration abilities.
What other advice do I have?
I rate the product a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner

Sales Director at Samsung
Helps protect data on user devices
Pros and Cons
- "The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices."
- "It could be improved in connection with artificial intelligence and IoT."
What is our primary use case?
It is used especially to connect with MDM, covering security and monitoring services.
It protects user devices, especially for field services.
Customers need some infrastructure on the cloud, e.g., Amazon and Google. We also need some testing and stage environments to perform tests.
How has it helped my organization?
We need to follow many countries' laws about data privacy. This is a requirement that is key for users. Cybersecurity resiliency has been important for us because we need to protect against loss.
What is most valuable?
The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices.
What needs improvement?
It could be improved in connection with artificial intelligence and IoT.
For how long have I used the solution?
I have been using this solution for three years.
What do I think about the stability of the solution?
The stability is good.
It doesn't require much maintenance, just in a few cases.
What do I think about the scalability of the solution?
It is good.
How are customer service and support?
The technical support is fair. I would rate them as nine out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used IBM. We switched because customers made decisions to work natively with the Cisco features, especially on infrastructure and security environments.
How was the initial setup?
In many cases, we can deploy it in a week. In other cases, we have to connect and test with more complex architectures. However, this is not related to the security endpoint services. The testing around another product is important, so it can take two to four months.
We use the agile method for our implementation strategy.
What about the implementation team?
We worked with IBM, Amazon, Google, Microsoft, and a few partners.
It takes three to 10 people to do the deployment, including pre-sales and technical guys, testing guys, and some software architecture.
What was our ROI?
We get more value out of our portfolio. We have pretty much seen ROI. When the endpoint service is well connected devices, it covers many important key features,
What's my experience with pricing, setup cost, and licensing?
The price is very fair to the customer.
Which other solutions did I evaluate?
We need to be open as an integrator to figure out other situations and features, especially from Microsoft and IBM. Everything is related to the customer's architecture, which is why we have to be open-minded.
What other advice do I have?
I really recommend to test and connect it with different devices, especially mobile, tablets, notebooks, and servers. Then, the potential customer can understand the value of naturally integrating all these devices together.
When it comes to data security, it is important to protect the data.
I would rate the solution as nine out of 10.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Real user
Buyer's Guide
Cisco Secure Endpoint
February 2025

Learn what your peers think about Cisco Secure Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
Technical Solutions Architect - Cyber & Cloud Security Expert at Secure Cloud
Is easy to deploy and applies multi-factor authentication
Pros and Cons
- "The solution is easy to deploy and applies multi-factor authentication."
- "It is an expensive solution."
What is most valuable?
The solution is easy to deploy and applies multi-factor authentication.
What needs improvement?
The solution can be cheaper.
For how long have I used the solution?
I have been using Cisco Secure Endpoint for six years.
How was the initial setup?
The initial setup is straightforward.
What's my experience with pricing, setup cost, and licensing?
It is an expensive solution.
What other advice do I have?
I rate the overall solution a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: customer/partner
System Administrator at bluegr Hotels & Resorts
Offers stable functionality and has comprehensive security measures
Pros and Cons
- "There are several valuable features including strong prevention and exceptional reporting capabilities."
- "The pricing policy could be more competitive, similar to Cisco's offerings."
What is most valuable?
Emphasizing robust prevention and comprehensive security measures, it offers stable functionality. There are several valuable features including strong prevention and exceptional reporting capabilities.
What needs improvement?
The pricing policy could be more competitive, similar to Cisco's offerings. Cisco recently introduced the SecureX platform, where all the different platforms are consolidated. This means you need a single account to access all the platforms, simplifying the process. However, it can still be a bit frustrating because the access isn't straightforward. There are different links for logging in, and depending on which link you use, you might encounter issues with admin rights, even if you are an admin. It seems there are some access problems during the transition and migration process, which has affected my system as well.
For instance, we had the Cisco Mail gateway, and I used to have specific links to report and configure guardian and spam checks for emails. Now, all of these have also been moved to the SecureX platform, which doesn't always function smoothly when logging in. Sometimes, I still have to log in using my old links. It's a bit inconvenient, but that's how it is.
For how long have I used the solution?
I have been using Cisco Secure Endpoint for the past two years.
What do I think about the stability of the solution?
I would rate the stability nine out of ten.
What do I think about the scalability of the solution?
It is a scalable product and I would rate it eight out of ten.
How are customer service and support?
They have separate support departments for different products, and the experience can vary depending on the product. For instance, Cisco Meraki Support is notably excellent and quick. In contrast, the support for some other Cisco products may be slightly less effective or even more outstanding. They tend to be slow when responding to inquiries. Personally, I have had a good experience with Cisco.
How was the initial setup?
Regarding maintenance, we receive the latest updates automatically. I handle tasks such as installing the updates, assigning licenses, and installing the agent. Additionally, I check for insights on the computers where the agent is installed. These insights provide reports on various aspects, such as the computer's Windows update status and whether the antivirus is on the latest version, among other things.
What's my experience with pricing, setup cost, and licensing?
It is a subscription-based product.
What other advice do I have?
I would overall rate the product an eight out of ten and recommend it to fellow users.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Director of IT at Oriental Weavers
It is stable, easy to scale and I like the price
Pros and Cons
- "I am really satisfied with the technical support."
- "I would like more seamless integration."
What is most valuable?
I like that this program is very light on the computer and very powerful. I also like the price.
What needs improvement?
I would like more seamless integration, because I have a security solution based on Cisco and I'm looking at integration for the old solution. It would be much easier for the security administrator to monitor integration.
For how long have I used the solution?
I have you been using this solution for almost a year now.
What do I think about the scalability of the solution?
I guess it's easy to scale, because I started a project with the requirements and when I needed to move forward to scale it up, it's been so easy. We currently have around 50 users.
How are customer service and technical support?
I am really satisfied with the technical support.
Which solution did I use previously and why did I switch?
I also use Trend Micro. I use both programs, because they have different security layers. Both programs are very good.
How was the initial setup?
The initial setup was straightforward as we used one of the Cisco partners. The deployment took a couple of days.
What other advice do I have?
On a scale from one to ten, I will rate this solution an eight. I do recommend it to others.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
A tool for managed endpoint protection that helps to detect possible malware or attacks
Pros and Cons
- "The most valuable feature of the solution is its technical support."
- "The initial setup of Cisco Secure Endpoint is complex."
What is our primary use case?
I implemented the solution in my company to use its managed endpoint protection in my company's use cases. Most of the users of Cisco Secure Endpoint in my company are unaware that they use the product. Our company only uses it to isolate possible malware on the endpoints. Our company uses the solution in collaboration with other software protection tools we have so that it helps us to look into cases where possible malware or attacks can happen.
What is most valuable?
The most valuable feature of the solution is its technical support. In most cases, it's very difficult or complicated to incorporate Cisco Secure Endpoint in the IT environment, and most of the messages that appear are not very clear. It is a reliable tool. After the setup phase, I realized that it is a reliable tool.
What needs improvement?
The initial implementation of Cisco Secure Endpoint can be a pain and is an area in the solution that needs improvement. After the initial implementation phase, a person gets support from Cisco, making it a solid tool.
The solution needs to improve in the area of the specific details of the threats it provides to its users.
For how long have I used the solution?
I have been using Cisco Secure Endpoint for three years.
What do I think about the stability of the solution?
After the presence and use of the solution in our company for three years, I rate the solution's stability a nine out of ten.
What do I think about the scalability of the solution?
Since we haven't had any expansion in our company's infrastructure, I won't be able to comment on the solution's scalability feature.
All of the employees in the back-end processes of our company are users of the solution since the product is implemented on all the PCs and servers. From an IT perspective, only two people use the solution in the company. One person looks after the maintenance of the solution, while the other person looks at the messaging part of the solution.
How are customer service and support?
My company has chosen an outsourced option to get technical support of the solution since we don't get any technical support internally.
How was the initial setup?
The initial setup of Cisco Secure Endpoint is complex.
Speaking about the deployment process, during the initial phase of using Cisco Secure Endpoint, we were getting a lot of false positives in our company, making it pretty hard for us initially since we had to cut endpoints until we could stabilize the solution.
What's my experience with pricing, setup cost, and licensing?
My company does make annual payments towards the licensing costs of the solution. Cisco Secure Endpoint is a little bit expensive. The pricing for licenses is pretty expensive for the moment, but it is a good solution.
Which other solutions did I evaluate?
My company wants to stop using Cisco Secure Endpoint and opt for another solution.
What other advice do I have?
I recommend the solution to those planning to use it.
I rate the overall solution an eight or nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Implementer
AE at a tech services company with 1-10 employees
Has cloud-based management feature that helps customers to manage their security from anywhere with an internet connection
Pros and Cons
- "The tool's most valuable feature is its integration with other Cisco products, such as switches and routers. This integration allows comprehensive coverage of security parameters across the customer's entire network. Customers find it easier to manage because they already know Cisco products. The cloud-based management is another valuable feature, enabling customers to manage their security from anywhere with an internet connection."
- "Cisco Meraki could benefit from AI assistance or intelligent assistance features. Compared to competitors like Juniper, Cisco Meraki currently lacks a digital network assistant, which is an area Cisco is reportedly working on."
What is our primary use case?
Cisco Secure Endpoint, often paired with Firepower and Cisco Umbrella, is primarily used for perimeter security and DNS protection.
What is most valuable?
The tool's most valuable feature is its integration with other Cisco products, such as switches and routers. This integration allows comprehensive coverage of security parameters across the customer's entire network. Customers find it easier to manage because they already know Cisco products. The cloud-based management is another valuable feature, enabling customers to manage their security from anywhere with an internet connection.
What needs improvement?
Cisco Meraki could benefit from AI assistance or intelligent assistance features. Compared to competitors like Juniper, Cisco Meraki currently lacks a digital network assistant, which is an area Cisco is reportedly working on.
For how long have I used the solution?
I have been working with the product for three years.
What do I think about the stability of the solution?
The solution is very stable. I don't hear complaints from customers about it not working right.
What do I think about the scalability of the solution?
I rate the solution's scalability a nine out of ten.
Which solution did I use previously and why did I switch?
Palo Alto has a portfolio similar to that of Cisco.
How was the initial setup?
Setting up Cisco Secure Endpoint is complex, primarily because it needs to be tailored to each customer's specific needs and network configuration. Factors like whether the customer has a segmented network or uses VLANs affect how the solution is implemented.
While it's straightforward for a customer with ten branches, it becomes more complicated with 30-50 branches - not due to technical issues, but because of logistical challenges.
One or two people are enough for deployment for complex cases with 20-30 branches. They're network or security specialists with Cisco certifications like CCNP or CCNA. The number depends on how complex the project is, but most times, it's pretty easy to deploy. We also typically need one or two people for maintenance, depending on how many branches there are and how complex the project is. If there are more than 50 branches, it can be complex to manage. Our solution architects often have CCNP certification, which helps manage the customer's network across branches.
What's my experience with pricing, setup cost, and licensing?
The solution's price is about the same as that of Palo Alto solutions.
What other advice do I have?
I recommend Cisco Secure Endpoint to others. It has been around for a long time and knows its stuff. Their Talos intelligence tool allows customers to see and secure their networks. I rate the product a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: Aug 9, 2024
Flag as inappropriateEngineer at Innovo
A security solution to protect the endpoints with centralized management
Pros and Cons
- "The console feature gives a centralized management of what's going on, and if something happens, it gives you an alert. So, that's the most important feature for me."
- "It is not very stable because we have new versions four times a year, which fixes bugs. We had some problems with some deployments."
What is our primary use case?
We use this solution to protect our IT environment. We use it to secure our user endpoints.
How has it helped my organization?
It gives awareness of our users' security posture.
What is most valuable?
The console feature gives a centralized management of what's going on, and if something happens, it gives you an alert. That's the most important feature for me.
What needs improvement?
Compared to other products, Cisco Secure Endpoint has some limitations and issues, it is still catching up with competition. For example, protection for USB is fairly recent and it is still limited to Windows platforms, and there are significant differences in the product packaging and distribution for Windows and MacOS platforms.
Another area of improvement is stability.
For how long have I used the solution?
I have been using Cisco Secure Endpoint for two years.
What do I think about the stability of the solution?
We had a couple of deferred releases this year.
I rate the solution’s stability a seven out of ten.
What do I think about the scalability of the solution?
Our deployment is very small. We only have a few dozen endpoints. So I can't really say if it scales well to a large number of endpoints. However, it seems like it could scale well so, the solution could be easy to scale up as needed.
How are customer service and support?
The customer support team solves the problems, but it takes a while to contact them.
How would you rate customer service and support?
Neutral
How was the initial setup?
The initial setup is straightforward.
What about the implementation team?
What other advice do I have?
Overall, I rate the solution an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner

Buyer's Guide
Download our free Cisco Secure Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2025
Product Categories
Endpoint Protection Platform (EPP) Endpoint Detection and Response (EDR) Cisco Security PortfolioPopular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
SentinelOne Singularity Complete
Fortinet FortiClient
Cortex XDR by Palo Alto Networks
Symantec Endpoint Security
Intercept X Endpoint
Trend Vision One Endpoint Security
Trellix Endpoint Security
Kaspersky Endpoint Security for Business
ESET Endpoint Protection Platform
HP Wolf Security
Check Point Harmony Endpoint
Buyer's Guide
Download our free Cisco Secure Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?
- Which ransomware is the biggest threat in 2020?
- Are you aware of SIEM platforms that integrate both Active Directory auditing and security monitoring tools?
- What is the best solution for ransomware attack?