Cisco Secure Endpoint and Bitdefender Total Security are leading solutions in endpoint protection. User reviews indicate that Cisco Secure Endpoint excels in support and comprehensive service, while Bitdefender Total Security is favored for its robust features and user satisfaction.
Features: Cisco Secure Endpoint offers strong network visibility, seamless integration, and advanced threat detection. Bitdefender Total Security provides a wide array of security tools, including VPN, anti-tracker, and multi-layer ransomware protection.
Room for Improvement: User reviews for Cisco Secure Endpoint highlight occasional performance slowdowns, a need for simplifying management tasks, and improving user interface. Bitdefender Total Security users seek enhancements in the update process, lighter system impact, and faster scanning speeds.
Ease of Deployment and Customer Service: Cisco Secure Endpoint has a straightforward deployment process and strong customer service support. Bitdefender Total Security users note a generally smooth deployment process with mixed customer service experiences.
Pricing and ROI: Cisco Secure Endpoint is considered premium-priced but justified by its comprehensive support. Bitdefender Total Security is seen as cost-effective with significant value due to its extensive features.
Bitdefender Total Security protects devices from online threats, malware, and ransomware, helping businesses, government entities, and personal users safeguard critical data, scan internet traffic, and perform vulnerability assessments.
Bitdefender Total Security offers real-time defenses, antivirus functions, patch management, and VPN services for secure remote access. It features a user-friendly dashboard, robust ransomware protection, and efficient optimization. Centralized management through Bitdefender Central and lightweight performance are key aspects. Users of this software are from various sectors, benefiting from its comprehensive security measures. Room for improvement includes stability, resource usage optimization, and enhanced global presence.
What are the key features of Bitdefender Total Security?Various sectors implement Bitdefender Total Security to fortify their cybersecurity frameworks. Businesses rely on its capabilities for maintaining data confidentiality and integrity, while government institutions use it to protect sensitive information from cyber threats. Personal users benefit from easy-to-use features that ensure comprehensive protection across all devices.
Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader.
Cisco Secure Endpoint was formerly known as Cisco AMP for Endpoints.
Reviews from Real Users
Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.
Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.