Try our new research platform with insights from 80,000+ expert users

Cisco Secure Endpoint vs Microsoft BitLocker comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Endpoint
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
48
Ranking in other categories
Endpoint Protection Platform (EPP) (13th), Endpoint Detection and Response (EDR) (12th), Cisco Security Portfolio (6th)
Microsoft BitLocker
Average Rating
8.2
Reviews Sentiment
7.4
Number of Reviews
65
Ranking in other categories
Endpoint Encryption (1st), Mobile Data Protection (1st)
 

Mindshare comparison

While both are Endpoint Security solutions, they serve different purposes. Cisco Secure Endpoint is designed for Endpoint Protection Platform (EPP) and holds a mindshare of 1.5%, down 1.9% compared to last year.
Microsoft BitLocker, on the other hand, focuses on Endpoint Encryption, holds 40.9% mindshare, up 39.9% since last year.
Endpoint Protection Platform (EPP)
Endpoint Encryption
 

Featured Reviews

Mark Broughton - PeerSpot reviewer
Tighter integration with Umbrella and Firepower gave us eye-opening information
We were using a third-party help desk. One of the ways that they were fixing problems was to delete the client and then add the client back if there was an issue where the client had stopped communicating. Any improvement in the client communicating back to the server would be good, particularly for machines that are offline for a couple of weeks. A lot of our guys were working on a rotation where the machine might be offline for that long. They were also terrible about rebooting their machines, so those network connections didn't necessarily get refreshed. So, anything that could improve that communication would be good. Also, an easier way to do deduplication of machines, or be alerted to the fact that there's more than one instance of a machine, would be useful. If you could say, "Okay, we've got these two machines. This one says it's not reporting and this one says it's been reporting. Obviously, somebody did a reinstall," it would help. That way you could get a more accurate device count, so you're not having an inflated number. Not that Cisco was going to come down on you and say, "Oh, you're using too many licenses," right away. But to have a much more accurate license usage count by being able to better dedupe the records would be good. I also sent over a couple of other ideas to our technical rep. A lot of that had to do with the reporting options. It would be really nice to be able to do a lot more in the reporting. You can't really drill down into the reports that are there. The reporting and the need for the documentation to be updated and current would be my two biggest areas of complaint. Also, there was one section when I was playing with the automation where it was asking for the endpoint type rather than the machine name. If I could have just put in the machine name, that would have been great. So there are some opportunities, when it comes to searching, to have more options. If I wanted to search, for example, by a Mac address because, for some reason, I thought there was a duplication and I didn't have the machine name, how could I pull it up with the Mac address? When you're getting to that level, you're really starting to get into the ticky tacky. I would definitely put the reporting and documentation way ahead of that.
Douglas Curry - PeerSpot reviewer
Users can easily deploy and manage it
The solution's most valuable feature is that it is simple to deploy and manage. I can't say what features of the tool I like since it is very much a deploy-and-forget product. We don't use any advanced features of the tool in my company. The tool's recovery options are good, especially since it integrates with Active Directory, making everything a simple process. The product's integration capabilities are good.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I am really satisfied with the technical support."
"Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP."
"Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
"Device Trajectory is one of the most valuable features. We're able to dig in and really understand how things came to be and where to focus our efforts."
"The most valuable feature is signature-based malware detection."
"The biggest lesson that I have learned from using this product is that there is a lot more malware slipping through my email filters than I expected."
"Cisco has definitely improved our organization a lot. In terms of business, our company feels safer. We actually switched from legacy signature-based solutions to threat intelligence-based and machine learning-based solutions, which is Cisco Secure. This has improved our security significantly, from 10% of signature-based technology security to 99.9% of the current one which we are running. We were happy."
"It used to take us a month to find out that something is infected, we now know that same day, as soon it is infected."
"The ease of administering and integrating the solution is great."
"The most valuable feature is the TPM (Trusted Platform Module), which makes the PC security stronger because somebody who is not from the team cannot access the PC without the decryption PIN."
"The platform provides good performance."
"Being able to encrypt an entire hard disk has been most valuable."
"It is easy to use. It is usually easy to recover someone's privacy. The manageability is much easier than McAfee. I think that Microsoft is a leader in this area. We are in the Microsoft school so our judgment of McAfee will be a little bit unfair as we recommend Microsoft all the time because of the easy manageability and support. I think that McAfee is designed for a different customer and every time we open a ticket with their support, it takes a very, very long time. The main difference is just the manageability and support. In terms of the solution itself or the functionality, I know that McAfee is very strong, but manageability and support, for us, is much more important. It's strengthens the solution for us."
"The most important aspect of this solution is that if your laptop gets stolen, the information is encrypted."
"Technical support is excellent."
"It is easy to implement and has AD integration."
 

Cons

"The pricing policy could be more competitive, similar to Cisco's offerings."
"Cisco Meraki could benefit from AI assistance or intelligent assistance features. Compared to competitors like Juniper, Cisco Meraki currently lacks a digital network assistant, which is an area Cisco is reportedly working on."
"The reporting and analytics areas of the solution need to be improved."
"It could be improved in connection with artificial intelligence and IoT."
"In Orbital, there are tons of prebuilt queries, but there is not a lot of information in lay terms. There isn't enough information to help us with what we're looking for and why we are looking for it with this query. There are probably a dozen queries in there that really focus on what I need to focus on, but they are not always easy to find the first time through."
"The one challenge that I see is the use of multiple endpoint protection platforms. For instance, we have AMP, but we also have Microsoft Windows Defender, System Center Endpoint Protection, and Microsoft Malware Protection Engine deployed. So, we have a bunch of different things that do the same thing. What winds up happening is, e.g., if I get an alert for a potential incident or malware and want to pull the file, I'll go to fetch the file to analyze it. But, one of these other programs has already gotten it, so the file has already been quarantined by another endpoint protection system. AMP doesn't realize that and the file fetch fails, then you're left wondering what's going on."
"It's pretty good as it is, but its cost could be improved."
"It does not include encryption and decryption of local file shares."
"The implementation of BitLocker is not simple. There are many prerequisites and hours of study and testing."
"Some of the technical internal functions, such as encryption protocols or something similar, could be improved."
"BitLocker should be available on standard Windows. We need to spend money on a Pro license to get BitLocker because it's essential to protect our customers' data. We don't want that to fall into the wrong hands."
"I would like to see improvement in the solution's central management of passwords. Currently, we install it separately."
"At the end of it all, we are looking for something that can be easier to manage."
"There is room for improvement in stability."
"The only thing that could be slightly improved is the occasional stability issue."
"The solution’s user interface could be improved."
 

Pricing and Cost Advice

"It can always be cheaper."
"The solution's price is about the same as that of Palo Alto solutions."
"We have a license for 3,000 users and if we get up to 3,100 users, it doesn't stop working, but on the next renewal date you're supposed to go in there and add that extra 100 licenses. It's really good that they let you grow and expand and then pay for it. Sometimes, with other products, you overuse a license and they just don't work."
"The solution is highly affordable; I believe we pay $2 or $3 per endpoint. It's significantly cheaper than the competitors on the market."
"...the licensing needs to be improved. All the product features we need are there. It's just a matter of the complexity and the different offerings and trying to figure things out."
"I rate the pricing a five or six on a scale of one to ten, where one is expensive, and ten is cheap."
"The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost."
"It is a subscription-based product."
"On a scale from one to ten, where one is expensive and ten is cheap, I rate the solution's pricing an eight out of ten."
"The solution is priced low. I would rate the product's pricing one out of ten."
"We can activate the product at no cost."
"The cost of this solution is bundled in with part of the subscription for the Microsoft Cloud. We have users subscribed to Enterprise E5 and it comes with E5"
"The tool is cheap compared to the products offered by competitors. If one is cheap and ten is expensive, I rate the tool's price as one."
"I don't know the costs. In terms of Microsoft licensing, we are at E3 on the business, and we're in the process of pricing out and moving to E5. So, a lot of this is included within our licensing agreements."
"It is free. It is enabled as part of the operating system. Once you have an operating system license, you're licensed for Bitlocker."
"It operates on a subscription model on an annual basis."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
841,605 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
18%
Government
9%
Financial Services Firm
9%
Manufacturing Company
8%
Computer Software Company
12%
Government
10%
Manufacturing Company
9%
Financial Services Firm
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
I am not entirely sure about the exact licensing cost. It ranges from 2,000 to 2,500 INR annually.
What needs improvement with Cisco Secure Endpoint?
Previously, there were options to uninstall the agent without a password if you had admin access, and this could be improved. It may require a password for uninstalling clients, which would be help...
What should one take into account when replacing PGP with Microsoft BitLocker?
Beware to make backup of useful data, then use reverse decryption policy from Symantec panel/McAfee ePO to decrypt the DE partitions while it is sometimes more straightforward and faster to reinsta...
Would you choose Microsoft BitLocker or McAfee Complete Data Protection?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and successfully fulfills regulatory needs in terms of data protection....
How does Microsoft BitLocker compare with Symantec Endpoint Encryption?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and it successfully fulfills regulatory needs in terms of data protecti...
 

Also Known As

Cisco AMP for Endpoints
BitLocker, MS BitLocker
 

Overview

 

Sample Customers

Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
ACV, Proaxis Therapy, Choice Hotels International, adnymics GmbH, Intermedia, NMBS/SNCB
Find out what your peers are saying about Microsoft, CrowdStrike, SentinelOne and others in Endpoint Protection Platform (EPP). Updated: March 2025.
841,605 professionals have used our research since 2012.