

Cisco Secure Endpoint and Huntress Managed EDR compete in the endpoint security market, each offering distinct advantages. Cisco Secure Endpoint has a slight edge in product integration, notably within the Cisco ecosystem, providing advanced threat prevention. Huntress Managed EDR stands out for its ease of management and efficient threat hunting capabilities.
Features: Cisco Secure Endpoint focuses on advanced threat prevention with features like real-time sandboxing, retrospective security, and strong integration within the Cisco ecosystem. It provides comprehensive real-time features and scalability with other Cisco products like Umbrella. Huntress Managed EDR shines in threat hunting and easy-to-use operations, offering 24/7 SOC monitoring, seamless integration with Microsoft Defender, and effortless threat remediation.
Room for Improvement: Cisco Secure Endpoint users seek better reporting, seamless third-party integrations, and enhanced support for platforms like IoT. Additionally, improving interoperability and reporting is essential. Huntress could improve in areas such as antivirus integration, more detailed dashboards, and longer data retention periods. Enhancements in alert management and network traffic analysis would also add value.
Ease of Deployment and Customer Service: Cisco Secure Endpoint offers versatile deployment options across on-premises, public, and hybrid clouds with generally good technical support, though response times can vary. Huntress Managed EDR is also deployable across diverse cloud environments and is praised for being user-friendly. Its customer support is noted for responsiveness and efficiency, often preferred over Cisco's support for its consistency.
Pricing and ROI: Cisco Secure Endpoint provides competitive pricing models fitting for enterprise agreements, delivering value through the extensive Cisco suite integration and measurable productivity improvements. Huntress Managed EDR features straightforward and competitive pricing, offering excellent value for small to medium-sized businesses. It aligns well with managed services, providing comprehensive security without the need for additional expensive tools, contributing significantly to ROI.
We have to provide endpoint security as a core part of our service as an MSP and using Huntress Managed EDR has saved us approximately a thousand dollars a month over using other more expensive, less effective solutions.
My advice to others looking into using Huntress Managed EDR is that if they're looking for an easy-to-use and manage solution, Huntress Managed EDR is a good fit for a small to medium company.
I have seen a return on investment mainly through time savings, as we know all the endpoints are protected 24/7, and we understand the value of the SOC team, with the human SOC team being very valuable.
Cisco has good technical support, especially considering these are newer solutions compared to traditional routing and switching products.
I felt it was important to raise awareness about this new technique where attackers use legitimate applications to gain remote access and control of computers.
They are thorough and ensure the problem is addressed without pushing responsibilities onto me unnecessarily.
For technical support, I would rate Huntress a ten out of ten, and in truth, they are better than that.
Cisco Secure Endpoint is definitely scalable.
I know other techs with thousands deployed, so scalability isn't an issue.
Scaling Huntress is simple; I can manage up to a thousand devices without issue.
I can easily scale from one machine to thousands without any fuss.
We have not encountered any problems.
About stability, we have not seen any lagging, crashing, downtime, or any sort of instability with Huntress Managed EDR.
We have not experienced any issues with lagging, crashing, or downtime.
I never experienced issues, but once there was an instance with false positives with their Rio service, which was quickly resolved by customer service.
The forensic capabilities need enhancement, especially for deep forensic data collection.
A more transparent way for the support team at Huntress and our IT team to collaborate to make it faster and easier would be beneficial.
Huntress Managed EDR indicated this is a normal behavior, but I would prefer to be alerted whenever there is any incident involving Windows Defender on any machines, regardless of the status of the incident.
Since we support customers in different countries, expanding the language options for their training would be beneficial.
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdStrike, Microsoft Defender, or SentinelOne.
The savings from utilizing the included Windows Defender offset the cost of Huntress Managed EDR, making it an affordable solution overall.
It is not too expensive or too cheap. It is just right.
It can get expensive for small to medium businesses if large license quantities are not purchased.
Cisco Secure Endpoint is very good in machine learning, which allows it to secure offline contents even if not connected to the internet.
What stands out most is their human element: when faced with an unknown threat, real people, not just automated processes, are investigating it, and they're people we trust.
They provide detailed remediation steps, explaining why an issue is a problem and what steps to take.
Previously, I could not modify it unless I had special Microsoft licensing, so it was beneficial to control Windows Defender through a central console to add policies and things like that.
| Product | Market Share (%) |
|---|---|
| Huntress Managed EDR | 3.2% |
| Cisco Secure Endpoint | 1.4% |
| Other | 95.4% |


| Company Size | Count |
|---|---|
| Small Business | 21 |
| Midsize Enterprise | 14 |
| Large Enterprise | 21 |
| Company Size | Count |
|---|---|
| Small Business | 54 |
| Midsize Enterprise | 3 |
Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader.
Cisco Secure Endpoint was formerly known as Cisco AMP for Endpoints.
Reviews from Real Users
Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.
Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
Huntress Managed EDR provides round-the-clock threat detection, incident response, and remediation services. It offers a cost-effective security solution tailored for small to medium businesses, integrating seamlessly with Microsoft Defender to bolster cybersecurity without needing extensive security personnel.
Huntress Managed EDR specializes in comprehensive threat-hunting and proactive defense, designed to operate alongside existing antivirus tools like Microsoft Defender. It delivers continuous monitoring and advanced threat detection to protect endpoints from threats beyond traditional antivirus capabilities. The platform features a user-oriented interface enabling efficient endpoint management and security. While valued for its 24/7 security operations and threat response, Huntress faces certain challenges such as enhancing reporting capabilities, expanding integration with third-party systems, and advancing its XDR functionalities. Users seek improved API capabilities, streamlined report generation, and broader Macintosh support to elevate their experience with the tool.
What are the key features?Industries leverage Huntress Managed EDR to enhance security frameworks and integrate with existing security measures, like Microsoft Defender. Its deployment spans financial, healthcare, and SMB sectors, where the need for robust endpoint protection and threat-hunting capabilities is paramount. Organizations benefit from its flexible deployment options, adapting Huntress to their specific cybersecurity strategies.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.