Cisco Secure Endpoint and Kaspersky Endpoint Security Cloud compete in endpoint security. Kaspersky Endpoint Security Cloud has the upper hand due to its superior flexibility and comprehensive protection.
Features: Cisco Secure Endpoint is known for advanced threat detection, integration capabilities, and robust reporting and analytics tools. Kaspersky Endpoint Security Cloud stands out with comprehensive protection across devices, including mobile support, extensive feature sets, and integrated cloud management.
Room for Improvement: Cisco Secure Endpoint could improve resource utilization, provide a more intuitive upgrade process, and enhance system impact reduction. Kaspersky Endpoint Security Cloud needs more frequent updates, better malware detection algorithms, and to refine its algorithm accuracy.
Ease of Deployment and Customer Service: Cisco Secure Endpoint offers a straightforward deployment process and responsive customer service but requires better deployment documentation. Kaspersky Endpoint Security Cloud is praised for ease of deployment and efficient customer service, though initial setup can be complex and could be streamlined further.
Pricing and ROI: Cisco Secure Endpoint offers good value for money with lower initial setup costs and satisfactory ROI. Kaspersky Endpoint Security Cloud, while having a higher initial cost, provides strong ROI due to its extensive features and comprehensive protection. Cisco is recognized for affordability, and Kaspersky for justifying its cost with robust ROI.
Cisco has good technical support, especially considering these are newer solutions compared to traditional routing and switching products.
Cisco Secure Endpoint is definitely scalable.
We have not encountered any problems.
The forensic capabilities need enhancement, especially for deep forensic data collection.
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdStrike, Microsoft Defender, or SentinelOne.
Cisco Secure Endpoint is very good in machine learning, which allows it to secure offline contents even if not connected to the internet.
Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader.
Cisco Secure Endpoint was formerly known as Cisco AMP for Endpoints.
Reviews from Real Users
Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.
Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
All you need to protect Windows desktops and file servers, Mac OS devices, iOS and Android mobiles and even Microsoft Office 365.
Just sign up for an account instead of getting tied up in hardware and software provisioning.
Pre-defined policies are automatically applied to each newly connected device, delivering immediate protection.
Be anywhere and protect anywhere using a cloud-based console.
Secure geographically separated offices, home or field-based workers, at their desks or on the go regardless of device type.
Enable remote encryption to make sure your corporate data is safe, even if a device gets lost or stolen.
Shadow IT discovery manages uncontrolled sharing of corporate data in the cloud and reveals users wasting time on social media and messengers.
Ensure compliance readiness with a Data Discovery audit of your personal and financial data in the cloud.
Enable safe collaboration and communication in Microsoft Office 365 - protection for all its major apps is already included in the Kaspersky Endpoint Security Cloud Plus and Pro tiers.
Root Cause Analysis provides an attack visualization so you can see the cause and path of an attack.
Endpoint Detection and Response (EDR) provides simple investigation tools an effortless response to evasive threats.
Advance your skills with online cybersecurity training included in Kaspersky Endpoint Security Pro.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.