Find out in this report how the two Cisco Security Portfolio solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
Cisco's tech support can be hit or miss, depending on the engineer you get.
The support is pretty decent, with a rating of eight out of ten.
Cisco has good technical support, especially considering these are newer solutions compared to traditional routing and switching products.
The on-premises hardware is not very scalable, but switching to the SaaS offering is expected to improve scalability.
Cisco Secure Endpoint is definitely scalable.
Based on my experience, the stability of Cisco Secure Email is very strong.
We have not encountered any problems.
The solution should better analyze the actual content rather than only focusing on the email header or origin.
It would be beneficial to have the functionality of the Email Threat Defense integrated into the Email Security Gateway so customers don't have to buy two products for full email protection.
The forensic capabilities need enhancement, especially for deep forensic data collection.
Its cost is bundled with other Cisco products.
The pricing structure is good as it is user-based or email client-based, which is positive for clients.
The licensing is a mess and needs sorting out.
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdStrike, Microsoft Defender, or SentinelOne.
It is highly effective in catching phishing and spam emails.
It also possesses multiple modules for spam detection, malware detection, and threat intelligence, which are valuable in categorizing emails and determining actions.
It covers everything through email, like antivirus, IDS, and IPS.
Cisco Secure Endpoint is very good in machine learning, which allows it to secure offline contents even if not connected to the internet.
Cisco Secure Email ensures email traffic security, acting as a checkpoint before emails enter environments like Office 365. It filters out spam, phishing attempts, and malicious content, scanning emails for threats. It offers both inbound and outbound email security with features like URL filtering, spam filtering, and encryption.
Cisco Secure Email functions as an email gateway in cloud, on-premise, and hybrid deployments. Offering capabilities such as Advanced Malware Protection, URL and Reputation Filtering, and real-time threat intelligence from Talos, it efficiently safeguards email traffic. Detailed logging, reporting, and quarantine management features provide robust security while being highly configurable. Its integration with SecureX and customizable rules enhance its effectiveness. Though strong in malware protection, improvements in reporting, phishing detection, user-friendliness, and integration with Office 365 are areas of focus. Scalability, cost-effectiveness, and AI-driven features are also areas where it can advance.
What are the most important features of Cisco Secure Email?Cisco Secure Email integrates effectively in sectors like finance, healthcare, and education that need stringent data protection and compliance. Financial institutions favor it for its encryption and data leak protection features ensuring secure transactions. Healthcare organizations use it to adhere to compliance requirements like HIPAA, safeguarding patient data with advanced threat detection and email security. Educational institutions rely on it for protecting student data and intellectual property from phishing and malware attacks, ensuring a secure communication environment.
Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader.
Cisco Secure Endpoint was formerly known as Cisco AMP for Endpoints.
Reviews from Real Users
Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.
Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
We monitor all Cisco Security Portfolio reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.