Cisco Secure Endpoint and Elastic Security are leading solutions in the cybersecurity market. Cisco Secure Endpoint seems to have the upper hand with its customer support and ease of deployment.
Features: Cisco Secure Endpoint is valued for its comprehensive threat detection and response capabilities, ease of integration with other Cisco products, and scalable protection. Elastic Security users appreciate its powerful search capabilities, customizable alerts, and open-source flexibility. While both offer strong feature sets, Elastic Security's openness and extensive customization options give it an edge.
Room for Improvement: Cisco Secure Endpoint users suggest enhancements in reporting functionalities, advanced threat detection capabilities, and improved user interfaces. Elastic Security users point out the need for improved user documentation, more intuitive navigation processes, and enhanced support for less technical users.
Ease of Deployment and Customer Service: Cisco Secure Endpoint users report a straightforward deployment process and commendable customer support that ensures smooth operations. In contrast, Elastic Security requires more configuration and technical expertise for deployment. Although Elastic Security's customer service is rated positively, the initial setup complexity may pose challenges for some organizations.
Pricing and ROI: Cisco Secure Endpoint users find the setup costs reasonable with a satisfactory return on investment, especially considering the robust support provided. Elastic Security, while potentially having higher setup costs, is viewed as delivering significant long-term value due to its extensive features and customization options. Both products demonstrate strong ROI, but Elastic Security is often seen as worth the investment for its advanced capabilities.
Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader.
Cisco Secure Endpoint was formerly known as Cisco AMP for Endpoints.
Reviews from Real Users
Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.
Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
Elastic Security combines the features of a security information and event management (SIEM) system with endpoint protection, allowing organizations to detect, investigate, and respond to threats in real time. This unified approach helps reduce complexity and improve the efficiency of security operations.
Additional offerings and benefits:
Finally, Elastic Security benefits from a global community of users who contribute to its threat intelligence, helping to enhance its detection capabilities. This collaborative approach ensures that the solution remains on the cutting edge of cybersecurity, with up-to-date information on the latest threats and vulnerabilities.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.