Malwarebytes and Cisco Secure Endpoint compete in the malware protection and security software category. Cisco Secure Endpoint appears to have the upper hand due to its more comprehensive suite of advanced security features and superior overall protection and support despite its higher price.
Features: Malwarebytes is valued for its simplicity and effectiveness in malware detection and removal. Cisco Secure Endpoint offers advanced threat protection, extensive integrations, and robust analytics. The comprehensive feature set of Cisco Secure Endpoint appeals to users with complex security needs.
Room for Improvement: Users suggest that Malwarebytes could enhance its real-time protection capabilities and add more advanced features. Cisco Secure Endpoint users note the room for improvement in its user experience and the need for more intuitive management tools. Malwarebytes needs more advanced functionalities, while Cisco Secure Endpoint could benefit from better usability.
Ease of Deployment and Customer Service: Malwarebytes is praised for its simple and quick deployment process, with users noting responsive and helpful customer service. Cisco Secure Endpoint's deployment is seen as more complex, requiring a steeper learning curve, but users report high satisfaction with the support received post-deployment. Malwarebytes stands out for ease of deployment, while Cisco Secure Endpoint excels in customer service quality.
Pricing and ROI: Malwarebytes is noted for its competitive pricing and perceived good return on investment. Cisco Secure Endpoint is seen as more expensive, but users believe the cost is justified by the extensive features and superior protection it offers. Users seeking affordability and simplicity lean towards Malwarebytes, whereas those prioritizing features and long-term value find Cisco Secure Endpoint more appealing.
It lacks enterprise-level management and more enterprise functionality.
Malwarebytes is a bit pricey for some regions, such as Ukraine, since it's priced in US dollars.
The behavior-based detection is very nice, and it combats zero-day threats by looking for anomalous behaviors.
Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader.
Cisco Secure Endpoint was formerly known as Cisco AMP for Endpoints.
Reviews from Real Users
Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.
Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
Malwarebytes is used for malware detection, endpoint protection, ransomware prevention, and behavior monitoring on Windows and Mac, serving as an EDR for detecting usage behaviors and providing comprehensive security features.
Primarily deployed for compliance scanning, real-time threat monitoring, and as a supplementary antivirus, Malwarebytes is favored for security assessments, cloud management, and endpoint protection for both personal and company use. Featuring robust scanning, ease of use, and a user-friendly interface, it effectively prevents and removes malware, detects unwanted programs, and provides real-time updates. The management interface and dashboard offer strong endpoint protection, automated updates, detailed reporting, and quick remediation, minimizing downtime. Comprehensive protection, extensive visibility, and efficient performance are highly valued.
What are the key features of Malwarebytes?Industries implementing Malwarebytes benefit from enhanced endpoint protection, compliance scanning, and security assessments. It is frequently utilized in IT departments for real-time threat monitoring, automated remediation, and cloud management, providing organizations with reliable security for both personal and company endpoints.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.