Try our new research platform with insights from 80,000+ expert users

Cisco Secure Endpoint vs Microsoft BitLocker vs WinMagic SecureDoc comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

Endpoint Protection Platform (EPP)
Endpoint Encryption
Endpoint Encryption
 

Featured Reviews

Mark Broughton - PeerSpot reviewer
Tighter integration with Umbrella and Firepower gave us eye-opening information
We were using a third-party help desk. One of the ways that they were fixing problems was to delete the client and then add the client back if there was an issue where the client had stopped communicating. Any improvement in the client communicating back to the server would be good, particularly for machines that are offline for a couple of weeks. A lot of our guys were working on a rotation where the machine might be offline for that long. They were also terrible about rebooting their machines, so those network connections didn't necessarily get refreshed. So, anything that could improve that communication would be good. Also, an easier way to do deduplication of machines, or be alerted to the fact that there's more than one instance of a machine, would be useful. If you could say, "Okay, we've got these two machines. This one says it's not reporting and this one says it's been reporting. Obviously, somebody did a reinstall," it would help. That way you could get a more accurate device count, so you're not having an inflated number. Not that Cisco was going to come down on you and say, "Oh, you're using too many licenses," right away. But to have a much more accurate license usage count by being able to better dedupe the records would be good. I also sent over a couple of other ideas to our technical rep. A lot of that had to do with the reporting options. It would be really nice to be able to do a lot more in the reporting. You can't really drill down into the reports that are there. The reporting and the need for the documentation to be updated and current would be my two biggest areas of complaint. Also, there was one section when I was playing with the automation where it was asking for the endpoint type rather than the machine name. If I could have just put in the machine name, that would have been great. So there are some opportunities, when it comes to searching, to have more options. If I wanted to search, for example, by a Mac address because, for some reason, I thought there was a duplication and I didn't have the machine name, how could I pull it up with the Mac address? When you're getting to that level, you're really starting to get into the ticky tacky. I would definitely put the reporting and documentation way ahead of that.
Douglas Curry - PeerSpot reviewer
Users can easily deploy and manage it
The solution's most valuable feature is that it is simple to deploy and manage. I can't say what features of the tool I like since it is very much a deploy-and-forget product. We don't use any advanced features of the tool in my company. The tool's recovery options are good, especially since it integrates with Active Directory, making everything a simple process. The product's integration capabilities are good.
it_user8931 - PeerSpot reviewer
How We Chose SED + WinMagic's SecureDoc For Full Disk Encryption
What if your organization’s leadership directed you to deploy an enterprise encryption solution in 120 days?  Could you do it? I received that message in May 2011 and our basic business goals were full disk encryption (FDE), low laptop performance impact, and low administrative overhead (easy to…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution is easy to deploy and applies multi-factor authentication."
"If somebody has been compromised, the question always is: How has it affected other devices in the network? Cisco AMP gives you a very neat view of that."
"Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP."
"The console feature gives a centralized management of what's going on, and if something happens, it gives you an alert. So, that's the most important feature for me."
"It provides real-time visibility and control over endpoints, allowing its users to promptly respond to any security incidents and remediate any vulnerabilities."
"The simplicity of use is its most valuable feature. You can very clearly see things."
"The best feature that we found most valuable, is actually the security product for the endpoint, formerly known as AMP. It has behavioral analytics, so you can be more proactive toward zero-day threats. I found that quite good."
"Cisco has definitely improved our organization a lot. In terms of business, our company feels safer. We actually switched from legacy signature-based solutions to threat intelligence-based and machine learning-based solutions, which is Cisco Secure. This has improved our security significantly, from 10% of signature-based technology security to 99.9% of the current one which we are running. We were happy."
"There's a lot of manageability within the solution. This is very helpful."
"It is easy to use. It is usually easy to recover someone's privacy. The manageability is much easier than McAfee. I think that Microsoft is a leader in this area. We are in the Microsoft school so our judgment of McAfee will be a little bit unfair as we recommend Microsoft all the time because of the easy manageability and support. I think that McAfee is designed for a different customer and every time we open a ticket with their support, it takes a very, very long time. The main difference is just the manageability and support. In terms of the solution itself or the functionality, I know that McAfee is very strong, but manageability and support, for us, is much more important. It's strengthens the solution for us."
"While it helps mitigate unauthorized data access by enhancing file and system protection through encryption, the tool is really enhanced with the combination of other Microsoft Security and Compliance features like data labeling."
"The most valuable feature is the simplicity and integration with the Microsoft Clouds platform."
"I like BitLocker because it gives us strong encryption to protect our data."
"The manageability of it is a valuable feature."
"The most valuable feature is the authentication process which is very fast."
"It's very straightforward to recover data. It's safe for us; in case of lost information, it provides multiple options to recover the data."
"The Central Management server."
 

Cons

"Integration and dashboard are areas with certain shortcomings in Cisco Secure Endpoint."
"Its price is okay for us, but it can always be better. There's always room for improvement when it comes to pricing."
"The initial setup of Cisco Secure Endpoint is complex."
"In terms of the user experience, if the UX design could be much simpler [that would improve things]... if they could make it more intuitive for someone who is not an engineer so that they still can read what's going on in their webpage and understand, that would be something."
"The integration of the Cisco products for security could be better in the sense that not everything is integrated, and they aren't working together. In addition, not all products are multi-tenant, so you can't separate different customer environments from each other, which makes it a little bit hard for a managed service provider to deliver services to the customers."
"I would like to see integration with Cisco Analytics."
"An easier way to do deduplication of machines, or be alerted to the fact that there's more than one instance of a machine, would be useful... That way you could get a more accurate device count, so you're not having an inflated number."
"The initial setup is a bit complex because you need to execute existing antiviruses or security software that you have on your device."
"The integration between Active Directory and BitLocker could be better."
"BitLocker should be available on standard Windows. We need to spend money on a Pro license to get BitLocker because it's essential to protect our customers' data. We don't want that to fall into the wrong hands."
"The solution could be improved if it was more user friendly."
"They could improve cloud integration regarding attribute and encryption key management."
"There is room for improvement in stability."
"The solution could improve by having a centralized GUI for management."
"It needs a management console."
"If integration with Active Directory are not mandatory for him, I think that there are many other solutions in the market that equal or are much stronger than Microsoft."
"MacOS X is missing features."
 

Pricing and Cost Advice

"Pricing is a big issue."
"There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization."
"It is quite cost-effective. I would rate it ten out of ten."
"Cisco Secure Endpoint is not too expensive and it's not cheap. It's quite fair."
"Cisco's pricing is reasonable. We also do not need to opt for niche players, which would have charged us significantly more than Cisco for ecosystem solutions. We are highly satisfied with the pricing structure of Cisco's solutions they are reasonable."
"The solution is highly affordable; I believe we pay $2 or $3 per endpoint. It's significantly cheaper than the competitors on the market."
"...the licensing needs to be improved. All the product features we need are there. It's just a matter of the complexity and the different offerings and trying to figure things out."
"The price is very fair to the customer."
"On a scale from one to ten, where one is expensive and ten is cheap, I rate the solution's pricing an eight out of ten."
"For reasons unknown, Microsoft products seem to be getting more expensive."
"It is free. It is enabled as part of the operating system. Once you have an operating system license, you're licensed for Bitlocker."
"This solution is included with Microsoft Server and my clients did not have to pay for anything extra."
"BitLocker is already in Windows 10 and its price has already been "paid"."
"The solution is priced low. I would rate the product's pricing one out of ten."
"The solution’s pricing is reasonable."
"The solution is cost efficient."
"Licensing and pricing is on par with the market."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
849,335 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
18%
Government
9%
Financial Services Firm
9%
Manufacturing Company
8%
Computer Software Company
12%
Government
10%
Manufacturing Company
9%
Financial Services Firm
9%
Government
16%
Financial Services Firm
14%
Healthcare Company
11%
Computer Software Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdS...
What needs improvement with Cisco Secure Endpoint?
Cisco Secure Endpoint lacks features like DLP which other vendors offer. XDR is new, so integration capabilities with...
What should one take into account when replacing PGP with Microsoft BitLocker?
Beware to make backup of useful data, then use reverse decryption policy from Symantec panel/McAfee ePO to decrypt th...
Would you choose Microsoft BitLocker or McAfee Complete Data Protection?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive en...
How does Microsoft BitLocker compare with Symantec Endpoint Encryption?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive en...
Ask a question
Earn 20 points
 

Also Known As

Cisco AMP for Endpoints
BitLocker, MS BitLocker
SecureDoc
 

Overview

 

Sample Customers

Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
ACV, Proaxis Therapy, Choice Hotels International, adnymics GmbH, Intermedia, NMBS/SNCB
NEC Group,Export Development Canada, SecureDoc University of Guelph, Swiss Bank, Suva (Swiss Accident Insurance), Money Partners (UK), Children's Hospital of Denver, The Hospital for Sick Children (SickKids), Arch Chemicals
Find out what your peers are saying about Microsoft, CrowdStrike, SentinelOne and others in Endpoint Protection Platform (EPP). Updated: April 2025.
849,335 professionals have used our research since 2012.