Cisco Secure Endpoint and Huntress Managed EDR are key players in the cybersecurity solutions space. Cisco Secure Endpoint takes a slight edge where integration within Cisco’s ecosystem is crucial, but Huntress shines with its hands-on SOC services, ideal for organizations seeking managed security expertise.
Features: Cisco Secure Endpoint provides advanced threat prevention with seamless integration into Cisco’s ecosystem, offering real-time visibility and automated processes. It is lightweight, making it appealing for extensive EDR capabilities. Huntress Managed EDR stands out with its dedicated threat-hunting SOC that actively manages threats and includes tools like Foothold Detection and managed antivirus, crucial for smaller organizations needing cybersecurity assistance.
Room for Improvement: Cisco Secure Endpoint could enhance its integration with third-party products, improve report generation, and advance automated remediation and UI simplification. Huntress Managed EDR would benefit from more intuitive dashboards, stronger API capabilities for improved data retrieval, and integration of antivirus functionalities to augment overall efficacy.
Ease of Deployment and Customer Service: Cisco Secure Endpoint supports various cloud and on-premise deployments, though initial deployment can be complex. Its technical support is highly rated. Huntress Managed EDR provides a simpler setup with versatile cloud and hybrid options, gaining praise for its customer service that addresses issues with personalized care.
Pricing and ROI: Cisco Secure Endpoint is priced favorably for enterprises, often part of larger Cisco security suites, delivering good ROI through enhanced security measures. Huntress Managed EDR offers competitive pricing, especially for MSPs and small businesses, emphasizing value with its included features and proactive threat management, which reduce security overheads and boost productivity.
Cisco has good technical support, especially considering these are newer solutions compared to traditional routing and switching products.
I felt it was important to raise awareness about this new technique where attackers use legitimate applications to gain remote access and control of computers.
They are thorough and ensure the problem is addressed without pushing responsibilities onto me unnecessarily.
Our team on the security side has contacted Huntress support, and they have been pleased.
Cisco Secure Endpoint is definitely scalable.
I know other techs with thousands deployed, so scalability isn't an issue.
Scaling Huntress is simple; I can manage up to a thousand devices without issue.
I can easily scale from one machine to thousands without any fuss.
We have not encountered any problems.
We have not experienced any issues with lagging, crashing, or downtime.
I never experienced issues, but once there was an instance with false positives with their Rio service, which was quickly resolved by customer service.
It barely takes up resources on the computer, and I have had no issues with lagging or crashing.
The forensic capabilities need enhancement, especially for deep forensic data collection.
A more transparent way for the support team at Huntress and our IT team to collaborate to make it faster and easier would be beneficial.
Since we support customers in different countries, expanding the language options for their training would be beneficial.
Their EDR is pretty mature in terms of what it does.
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdStrike, Microsoft Defender, or SentinelOne.
The savings from utilizing the included Windows Defender offset the cost of Huntress Managed EDR, making it an affordable solution overall.
It is not too expensive or too cheap. It is just right.
It can get expensive for small to medium businesses if large license quantities are not purchased.
Cisco Secure Endpoint is very good in machine learning, which allows it to secure offline contents even if not connected to the internet.
What stands out most is their human element: when faced with an unknown threat, real people, not just automated processes, are investigating it, and they're people we trust.
They provide detailed remediation steps, explaining why an issue is a problem and what steps to take.
Previously, I could not modify it unless I had special Microsoft licensing, so it was beneficial to control Windows Defender through a central console to add policies and things like that.
Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader.
Cisco Secure Endpoint was formerly known as Cisco AMP for Endpoints.
Reviews from Real Users
Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.
Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
Huntress Managed EDR offers robust managed detection and response capabilities with 24/7 threat hunting, intuitive deployment, and proactive threat management for small to medium businesses.
Huntress Managed EDR provides essential cybersecurity services to businesses by integrating seamlessly with existing tools like Microsoft Defender. Around-the-clock SOC expertise, proactive alerts, and automatic remediation define its core offerings. It effectively monitors threats, detecting footholds and malicious IPs while providing quick isolation of suspicious activities. The platform simplifies security management, reducing reliance on multiple security solutions and enhancing threat response efficiency.
What are the key features of Huntress Managed EDR?Huntress Managed EDR is commonly implemented in industries requiring enhanced cybersecurity, including finance, healthcare, and IT services. Its ability to complement traditional antivirus tools and integration with remote monitoring supports a comprehensive defense strategy against advanced threats. Its deployment is simplified for diverse IT environments, ensuring automated and fast response to emerging security challenges.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.