Try our new research platform with insights from 80,000+ expert users

Cisco Secure Endpoint vs McAfee Total Protection for Data Loss Prevention vs Trend Micro Endpoint Encryption comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

Endpoint Protection Platform (EPP)
Data Loss Prevention (DLP)
Endpoint Encryption
 

Featured Reviews

Mark Broughton - PeerSpot reviewer
Tighter integration with Umbrella and Firepower gave us eye-opening information
We were using a third-party help desk. One of the ways that they were fixing problems was to delete the client and then add the client back if there was an issue where the client had stopped communicating. Any improvement in the client communicating back to the server would be good, particularly for machines that are offline for a couple of weeks. A lot of our guys were working on a rotation where the machine might be offline for that long. They were also terrible about rebooting their machines, so those network connections didn't necessarily get refreshed. So, anything that could improve that communication would be good. Also, an easier way to do deduplication of machines, or be alerted to the fact that there's more than one instance of a machine, would be useful. If you could say, "Okay, we've got these two machines. This one says it's not reporting and this one says it's been reporting. Obviously, somebody did a reinstall," it would help. That way you could get a more accurate device count, so you're not having an inflated number. Not that Cisco was going to come down on you and say, "Oh, you're using too many licenses," right away. But to have a much more accurate license usage count by being able to better dedupe the records would be good. I also sent over a couple of other ideas to our technical rep. A lot of that had to do with the reporting options. It would be really nice to be able to do a lot more in the reporting. You can't really drill down into the reports that are there. The reporting and the need for the documentation to be updated and current would be my two biggest areas of complaint. Also, there was one section when I was playing with the automation where it was asking for the endpoint type rather than the machine name. If I could have just put in the machine name, that would have been great. So there are some opportunities, when it comes to searching, to have more options. If I wanted to search, for example, by a Mac address because, for some reason, I thought there was a duplication and I didn't have the machine name, how could I pull it up with the Mac address? When you're getting to that level, you're really starting to get into the ticky tacky. I would definitely put the reporting and documentation way ahead of that.
VivekGupta7 - PeerSpot reviewer
Versatile with good patching and a straightforward setup
There is some fine-tuning needed, even once you define something. We need to do a lot of configuration. It would be easier if they made the configuration simpler, especially in the beginning. They need to give the user more choices and provide more guidance to help avoid problems later on. We'd like some more built-in predictive analytics so we can be prepared for what might happen in the future. We did have some bandwidth issues during setup. If your update fails, you may have stability issues. We find it difficult to reach higher levels of support when we face larger issues.
AltafSiddiqui - PeerSpot reviewer
Though it provides good endpoint security, there is a need to improve scalability
I don't have any idea about the implementation part because the tool was configured in my company's infrastructure. When I joined the organization, everything was configured. Currently, I am involved in the endpoint management and control. My company uses the product for the endpoints in our company so that it offers protection against viruses and other malicious activities. My company operates as a service provider, owing to which we deal with multiple clients and their data, which are stored in a PDF format. My company also provides applications to our clients. There are different types of data that my company protects from malicious activities and ransomware attacks. The most beneficial part of the product for our company's security needs stems from the fact that it offers an agentless service, which makes it better to manage our endpoint devices. I am not the right person to speak about how the full disc encryption capability of Trend Micro has impacted our data protection strategies since I am not the right person to provide any information about it. I am a system engineer who manages virtualization tools like VMware. There is a separate team for endpoint management in my organization. Speaking about the user experience and management console of Trend Micro Endpoint Encryption, I would say that the product offers a very unique GUI. The unique GUI of the tool makes it possible to easily use the management console for some tasks, like creating and downloading reports. There is a separate team with six to seven engineers in my company to manage the troubleshooting part of endpoint solutions. I recommend the product to those who plan to use it. The product is easy to use. The product is useful in the area of ePO reporting. It is very easy to create general reports with the product. I rate the overall product a seven out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution's integration capabilities are excellent. It's one of the best features."
"The most valuable feature of the solution is its technical support."
"One of the best features of AMP is its cloud feature. It doesn't matter where the device is in regards to whether it's inside or outside of your network environment, especially right now when everybody's remote and taken their laptops home. You don't have to be VPNed into the environment for AMP to work. AMP will work anywhere in the world, as long as it has an Internet connection. You get protection and reporting with it. No matter where the device is, AMP has still got coverage on it and is protecting it. You still have the ability to manage and remediate things. The cloud feature is the magic bullet. This is what makes the solution a valuable tool as far as I'm concerned."
"Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP."
"The ability to detonate a particular problem in a sandbox environment and understand what the effects are, is helpful. We're trying, for example, to determine, when people send information in, if an attachment is legitimate or not. You just have to open it. If you can do that in a secure sandbox environment, that's an invaluable feature. What you would do otherwise would be very risky and tedious."
"The integration with other Cisco products seemed to be really effective. We had Umbrella in place and we were using AnyConnect as well as Firepower. Once a threat was detected, being able to do the threat lookups and the live tracking was really useful."
"Its most valuable features are its scalability and advanced threat protection for customers."
"Definitely, the best feature for Cisco Secure Endpoint is the integration with Talos. On the backend, Talos checks all the signatures, all the malware, and for any attacks going on around the world... Because Secure Endpoint has a connection to it, we get protected by it right then and there."
"This solution has a rich set of policies."
"The pricing of the product is excellent. It's very affordable."
"The ability to block all USBs from the McAfee portal has been great."
"The most valuable feature is the ability to control access to USB drives and other external devices."
"The most valuable features of McAfee Total Protection for Data Loss Prevention are the DLP. The DLP, data loss prevention is the most important feature right now that users are looking for."
"The administrative capabilities and the interface make this product accessible and easy to use."
"It can scale."
"The overall features of McAfee Total Protection for Data Loss Prevention are very good."
"Offers very good endpoint security solutions."
"Trend Micro Endpoint Encryption has good performance and is secure."
"The most valuable feature of Trend Micro Endpoint Encryption is security."
"The solution is good overall. All of its features are good."
"We're very satisfied with Trend Micro support."
"The most valuable feature is the support for email."
"The solution enables all the development and technical team members to work from home while, at the same time, ensuring the security of the work environment."
"Overall, I think that it's very interesting."
 

Cons

"The pricing policy could be more competitive, similar to Cisco's offerings."
"The technical support is very slow."
"It's pretty good as it is, but its cost could be improved."
"In the next release, I would for it to have back up abilities. I would like the ability to go back to a point in time to when my PC was uninfected and to the moment of when the infection happened."
"The initial setup of Cisco Secure Endpoint is complex."
"We don't have issues. We think that Cisco covers all of the security aspects on the market. They continue to innovate in the right way."
"The product does not provide options like tunnel creation or virtual appliances."
"In the next version of this solution, I would like to see the addition of local authentication."
"The product fails to offer automatic classification capabilities to its users."
"McAfee Total Protection for Data Loss Prevention could improve by having artificial intelligence."
"The initial setup is very complex."
"We faced many issues with the solution's customer support, and it should be made customer-friendly and more responsive."
"McAfee Total Protection for Data Loss Prevention could improve by making the customer aware of the benefits of the solution which would increase the adoption. Additionally, if there were features to suit multi-cloud environments it would be helpful. If the solution can intelligently identify which is important data for the organization and should not be released from the organization without authorization would be a benefit."
"The UI needs to be simplified."
"We need to do a lot of configuration."
"The solution needs an easier integration in heterogeneous and dynamic environments."
"In the next release, it would be better if it was more user-friendly. It is a little complicated for the average technical person. If they can make it more user-friendly, it would be much easier and more helpful."
"They need to come up with cloud solutions."
"Support from them was not fast."
"We would like to see a wider, better dashboard for the purposes of monitoring the users of the Trend Micro software."
"Integration and support could be improved."
"I would like to see more integration. Good cloud-based solutions need to be arrayed. I'd like to see better integration with administrative tools as well as Active Directory integration."
"In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support."
"To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically."
 

Pricing and Cost Advice

"The pricing and licensing of the security solutions of Cisco are very good in comparison with the competitors, but sometimes, it's difficult to see all the discounts and other kinds of things. So, you have to be careful, but the pricing is good."
"I rate the pricing a five or six on a scale of one to ten, where one is expensive, and ten is cheap."
"The Enterprise Agreement is like an all-you-can-eat buffet of Cisco products. In that vein, it was very affordable."
"The pricing and licensing fees are okay."
"The solution is highly affordable; I believe we pay $2 or $3 per endpoint. It's significantly cheaper than the competitors on the market."
"Cisco Secure Endpoint is not too expensive and it's not cheap. It's quite fair."
"Because we do see the value of what it's bringing, I think they have priced it well."
"It is an expensive solution."
"There is an annual license to use this solution."
"I would rate the solution's pricing a six out of ten."
"The price is high for this type of product."
"The pricing seems expensive both for the license and the support."
"McAfee Total Protection for Data Loss Prevention is an expensive solution."
"Licensing fees are paid on a yearly basis."
"The price of the solution could improve."
"The price of the solution could improve, it is expensive. We typically sell one and three-year licenses."
"One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
"The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems."
"You have to pay for the license annually."
"I rate the product price a seven on a scale of one to ten, where one is cheap, and ten is expensive."
"I rate the product price a six on a scale of one to ten, where one is high price, and ten is low price."
"The solution's licensing costs are yearly."
"We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
845,040 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
18%
Government
9%
Financial Services Firm
8%
Manufacturing Company
8%
Computer Software Company
15%
Financial Services Firm
14%
Retailer
8%
Healthcare Company
7%
Government
14%
Computer Software Company
11%
Real Estate/Law Firm
10%
Financial Services Firm
10%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
I am not entirely sure about the exact licensing cost. It ranges from 2,000 to 2,500 INR annually.
What needs improvement with Cisco Secure Endpoint?
Previously, there were options to uninstall the agent without a password if you had admin access, and this could be i...
What do you like most about McAfee Total Protection for Data Loss Prevention?
The tool focuses on endpoints rather than networks. Endpoints cover everything. It wouldn't be possible to steal conf...
What is your experience regarding pricing and costs for Trend Micro Endpoint Encryption?
Compared to other solutions, it's neither cheap nor expensive. It offers good value for what you're paying for.
What needs improvement with Trend Micro Endpoint Encryption?
There are issues like recovery that arise. We've managed to overcome them. In some instances where the system crashes...
 

Also Known As

Cisco AMP for Endpoints
McAfee Total Protection for Data, McAfee Total Protection for DLP, Total Protection for Data, Intel Security Total Protection for Data
No data available
 

Overview

 

Sample Customers

Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Kleberg Bank
Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
Find out what your peers are saying about Microsoft, CrowdStrike, SentinelOne and others in Endpoint Protection Platform (EPP). Updated: March 2025.
845,040 professionals have used our research since 2012.