Try our new research platform with insights from 80,000+ expert users

Cisco Secure Endpoint vs Jamf Protect comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Endpoint
Ranking in Endpoint Protection Platform (EPP)
13th
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
49
Ranking in other categories
Endpoint Detection and Response (EDR) (12th), Cisco Security Portfolio (5th)
Jamf Protect
Ranking in Endpoint Protection Platform (EPP)
30th
Average Rating
9.4
Reviews Sentiment
7.9
Number of Reviews
10
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of April 2025, in the Endpoint Protection Platform (EPP) category, the mindshare of Cisco Secure Endpoint is 1.5%, down from 1.9% compared to the previous year. The mindshare of Jamf Protect is 0.8%, up from 0.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Mark Broughton - PeerSpot reviewer
Tighter integration with Umbrella and Firepower gave us eye-opening information
We were using a third-party help desk. One of the ways that they were fixing problems was to delete the client and then add the client back if there was an issue where the client had stopped communicating. Any improvement in the client communicating back to the server would be good, particularly for machines that are offline for a couple of weeks. A lot of our guys were working on a rotation where the machine might be offline for that long. They were also terrible about rebooting their machines, so those network connections didn't necessarily get refreshed. So, anything that could improve that communication would be good. Also, an easier way to do deduplication of machines, or be alerted to the fact that there's more than one instance of a machine, would be useful. If you could say, "Okay, we've got these two machines. This one says it's not reporting and this one says it's been reporting. Obviously, somebody did a reinstall," it would help. That way you could get a more accurate device count, so you're not having an inflated number. Not that Cisco was going to come down on you and say, "Oh, you're using too many licenses," right away. But to have a much more accurate license usage count by being able to better dedupe the records would be good. I also sent over a couple of other ideas to our technical rep. A lot of that had to do with the reporting options. It would be really nice to be able to do a lot more in the reporting. You can't really drill down into the reports that are there. The reporting and the need for the documentation to be updated and current would be my two biggest areas of complaint. Also, there was one section when I was playing with the automation where it was asking for the endpoint type rather than the machine name. If I could have just put in the machine name, that would have been great. So there are some opportunities, when it comes to searching, to have more options. If I wanted to search, for example, by a Mac address because, for some reason, I thought there was a duplication and I didn't have the machine name, how could I pull it up with the Mac address? When you're getting to that level, you're really starting to get into the ticky tacky. I would definitely put the reporting and documentation way ahead of that.
Ashitosh Bankar - PeerSpot reviewer
Searches incoming and outgoing traffic for malware and monitors the network for security
Jamf Protect provides zero-touch integration, and we can add various IdPs for synchronization or authentication.The most effective feature of the solution for security needs is that users can create a zero-touch environment network access and VPN access. Jamf Protect searches incoming and outgoing traffic for malware to monitor the network for security.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
"The solution’s most valuable feature is malware protection."
"The product provides sandboxing options like file reputation and file analysis."
"If somebody has been compromised, the question always is: How has it affected other devices in the network? Cisco AMP gives you a very neat view of that."
"The tool's most valuable feature is its integration with other Cisco products, such as switches and routers. This integration allows comprehensive coverage of security parameters across the customer's entire network. Customers find it easier to manage because they already know Cisco products. The cloud-based management is another valuable feature, enabling customers to manage their security from anywhere with an internet connection."
"There are several valuable features including strong prevention and exceptional reporting capabilities."
"The entirety of our network infrastructure is Cisco and the most valuable feature is the integration."
"The visibility and insight this solution gives you into threats is pretty granular. It has constant monitoring. You can get onto the device trajectory to look at a threat, but you can also see what happened prior to the threat. You can see what happened after the threat. You can see what other applications were incorporated into the execution of the threat. For example, you have the event, but you see that the event was launched by Google Chrome, which was launched by something else. Then, after the event, something else was launched by whatever the threat was. Therefore, it gives you great detail, a timeline, and continuity of events leading up to whatever the incident is, and then, after. This helps you understand and nail down what the threat is and how to fix it."
"Jamf Protect searches incoming and outgoing traffic for malware to monitor the network for security."
"The product's initial setup phase is straightforward and as simple as CrowdStrike."
"The tool's tech support is helpful and efficient. It also has an active community."
"Jamf Protect's most effective features for threat detection include managing devices and applications, deploying and upgrading the OS, and its overall security features."
"The product's initial setup phase has very simple steps."
"I rate the technical support a ten out of ten."
"Jamf Protect is a security product that helps us with CIS benchmarks and threat prevention."
"The quick updates are really good. If a new OS update drops today, I'll have the Jamf Protect update within a few hours. It's also compatible with all Mac OS versions, and there's zero lag or performance impact."
 

Cons

"It could be improved in connection with artificial intelligence and IoT."
"The GUI needs improvement, it's not good."
"Its price is okay for us, but it can always be better. There's always room for improvement when it comes to pricing."
"The reporting and analytics areas of the solution need to be improved."
"Cisco Secure Endpoint is an expensive solution."
"Maybe there is room for improvement in some of the automated remediation. We have other tools in place that AMP feeds into that allow for that to happen, so I look at it as one seamless solution. But if you're buying AMP all by itself, I don't know if it can remove malicious software after the fact or if it requires the other tools that we use to do some of that."
"The connector updates are very easily done now, and that's improving. Previously, the connector had an issue, where almost every time it needed to be updated, it required a machine reboot. This was always a bit of an inconvenience and a bug. Because with a lot of software now, you don't need to do that and shouldn't need to be rebooting all the time."
"Due to the complexity of the technology that is used and its advanced threat detection capabilities, it is possible to encounter many delays in operation."
"The scope of improvement will fall under the support hierarchy that the tool offers to the latest version that Apple derives for any of the latest operating systems to launch."
"Beginners need initial training."
"I'd really like to see some data loss prevention (DLP) capabilities. More visibility into user activity on laptops would be helpful."
"The solution's integration with other tools is slow."
"The dependency on Jamf Pro or SIEM or SOAR for some automations and integrations could be reduced."
"The tool's drawback is that it fails to offer support for Linux."
"Jamf Protect protects just Mac devices, and we would love to have one solution for other platforms and not just Mac devices."
"The product's price is an area of concern where improvements are required."
 

Pricing and Cost Advice

"The pricing and licensing are reasonable. The cost of AMP for Endpoints is inline with all the other software that has a monthly endpoint cost. It might be a little bit higher than other antivirus type products, but we're only talking about a dollar a month per user. I don't see that cost as being an issue if it's going to give us the confidence and security that we're looking for. We have had a lot of success and happiness with what we're using, so there's no point in changing."
"Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc."
"The price is very good."
"The Enterprise Agreement is like an all-you-can-eat buffet of Cisco products. In that vein, it was very affordable."
"It is a subscription-based product."
"Pricing is a big issue."
"The pricing and licensing fees are okay."
"...the licensing needs to be improved. All the product features we need are there. It's just a matter of the complexity and the different offerings and trying to figure things out."
"Jamf Protect costs double the price that we were paying before."
"The product is not an averagely priced tool."
"Jamf Protect is an expensive solution."
"The licensing costs are yearly and expensive."
"It's significantly cheaper than other options like ApexOne."
"I rate the product price as a five on a scale of one to ten, where one is a low price, and ten is a high price."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
845,485 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
18%
Government
9%
Financial Services Firm
8%
Manufacturing Company
8%
Computer Software Company
16%
University
12%
Financial Services Firm
9%
Educational Organization
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
I am not entirely sure about the exact licensing cost. It ranges from 2,000 to 2,500 INR annually.
What needs improvement with Cisco Secure Endpoint?
Previously, there were options to uninstall the agent without a password if you had admin access, and this could be improved. It may require a password for uninstalling clients, which would be help...
What do you like most about Jamf Protect?
Jamf Protect searches incoming and outgoing traffic for malware to monitor the network for security.
What is your experience regarding pricing and costs for Jamf Protect?
The product is not an averagely priced tool. If the organization is fully on Apple's fleet, they can consider Jamf Protect, but it is quite costly. Jamf Protect is costly compared with any other so...
What needs improvement with Jamf Protect?
The dependency on Jamf Pro or SIEM or SOAR for some automations and integrations could be reduced. In-built automation and remediation of behavior-based threats would be beneficial enhancements.
 

Also Known As

Cisco AMP for Endpoints
No data available
 

Overview

 

Sample Customers

Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Information Not Available
Find out what your peers are saying about Cisco Secure Endpoint vs. Jamf Protect and other solutions. Updated: March 2025.
845,485 professionals have used our research since 2012.