Try our new research platform with insights from 80,000+ expert users

Cisco Secure Endpoint vs Seqrite Endpoint Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Endpoint
Ranking in Endpoint Protection Platform (EPP)
26th
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
49
Ranking in other categories
Endpoint Detection and Response (EDR) (20th), Cisco Security Portfolio (6th)
Seqrite Endpoint Security
Ranking in Endpoint Protection Platform (EPP)
28th
Average Rating
7.6
Reviews Sentiment
6.9
Number of Reviews
23
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of September 2025, in the Endpoint Protection Platform (EPP) category, the mindshare of Cisco Secure Endpoint is 1.5%, down from 1.6% compared to the previous year. The mindshare of Seqrite Endpoint Security is 1.4%, up from 1.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP) Market Share Distribution
ProductMarket Share (%)
Cisco Secure Endpoint1.5%
Seqrite Endpoint Security1.4%
Other97.1%
Endpoint Protection Platform (EPP)
 

Featured Reviews

Mark Broughton - PeerSpot reviewer
Tighter integration with Umbrella and Firepower gave us eye-opening information
We were using a third-party help desk. One of the ways that they were fixing problems was to delete the client and then add the client back if there was an issue where the client had stopped communicating. Any improvement in the client communicating back to the server would be good, particularly for machines that are offline for a couple of weeks. A lot of our guys were working on a rotation where the machine might be offline for that long. They were also terrible about rebooting their machines, so those network connections didn't necessarily get refreshed. So, anything that could improve that communication would be good. Also, an easier way to do deduplication of machines, or be alerted to the fact that there's more than one instance of a machine, would be useful. If you could say, "Okay, we've got these two machines. This one says it's not reporting and this one says it's been reporting. Obviously, somebody did a reinstall," it would help. That way you could get a more accurate device count, so you're not having an inflated number. Not that Cisco was going to come down on you and say, "Oh, you're using too many licenses," right away. But to have a much more accurate license usage count by being able to better dedupe the records would be good. I also sent over a couple of other ideas to our technical rep. A lot of that had to do with the reporting options. It would be really nice to be able to do a lot more in the reporting. You can't really drill down into the reports that are there. The reporting and the need for the documentation to be updated and current would be my two biggest areas of complaint. Also, there was one section when I was playing with the automation where it was asking for the endpoint type rather than the machine name. If I could have just put in the machine name, that would have been great. So there are some opportunities, when it comes to searching, to have more options. If I wanted to search, for example, by a Mac address because, for some reason, I thought there was a duplication and I didn't have the machine name, how could I pull it up with the Mac address? When you're getting to that level, you're really starting to get into the ticky tacky. I would definitely put the reporting and documentation way ahead of that.
Rathin-Vaidya - PeerSpot reviewer
Offers endpoint protection and data loss prevention functionality
The console is in the cloud, while some of the software runs on on-prem endpoint devices. We use Seqrite Endpoint Security as an antivirus product for its data loss prevention functionality. We configure it to define the types of files that can be attached to emails, and then we receive notifications regarding these actions. Most environments have a sizable number of endpoints. Typically, such environments already have a firewall, providing first-level protection. We have two resources to provide support. I rate the overall product an eight out of ten. It has still not been deployed in large numbers, so I'm unsure if it caters to all security environments. It can reasonably care for smaller setups of around a hundred user clients. For larger numbers of users, it might require a different kind of product.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Device Trajectory is one of the most valuable features. We're able to dig in and really understand how things came to be and where to focus our efforts."
"appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst. I can track everything that happens on our server from my PC or device. Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us."
"The entirety of our network infrastructure is Cisco and the most valuable feature is the integration."
"Cisco has definitely improved our organization a lot. In terms of business, our company feels safer. We actually switched from legacy signature-based solutions to threat intelligence-based and machine learning-based solutions, which is Cisco Secure. This has improved our security significantly, from 10% of signature-based technology security to 99.9% of the current one which we are running. We were happy."
"One of the best features of AMP is its cloud feature. It doesn't matter where the device is in regards to whether it's inside or outside of your network environment, especially right now when everybody's remote and taken their laptops home. You don't have to be VPNed into the environment for AMP to work. AMP will work anywhere in the world, as long as it has an Internet connection. You get protection and reporting with it. No matter where the device is, AMP has still got coverage on it and is protecting it. You still have the ability to manage and remediate things. The cloud feature is the magic bullet. This is what makes the solution a valuable tool as far as I'm concerned."
"It provides real-time visibility and control over endpoints, allowing its users to promptly respond to any security incidents and remediate any vulnerabilities."
"Among the most valuable features are the exclusions. And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source."
"The stability of the solution is perfect. I believe it's the most stable solution on the market right now."
"The solution's current features include antivirus, web filtering, file activity monitoring, PAM, firewall, IDS/IPS, and DLP. Though I'm not familiar with the whole solution, it is good."
"Seqrite Endpoint Security is a good solution."
"The most valuable features are the file activity monitors, DLP solutions, and application controls."
"The two valuable features are anti-ransomware and data loss protection."
"The product's initial setup phase is easy."
"The most valuable part of the solution is its ransomware backup feature."
"The overall performance of the server and the dashboard are the most interesting aspects of the solution."
"I like Seqrite's web protection features and external device control."
 

Cons

"The initial setup is a bit complex because you need to execute existing antiviruses or security software that you have on your device."
"In the next release, I would for it to have back up abilities. I would like the ability to go back to a point in time to when my PC was uninfected and to the moment of when the infection happened."
"The pricing policy could be more competitive, similar to Cisco's offerings."
"In the next version of this solution, I would like to see the addition of local authentication."
"The reporting and analytics areas of the solution need to be improved."
"The user interface is dull."
"One of the things that Cisco Secure Endpoint really needs is that it's not just Secure Endpoint, it's a point product, and I think we really need to move into solution-based selling, designing, and architecting. So that we're not worried about putting things on endpoints and selling 'x' amount of endpoints, but to provide a solution that covers all of the remote access and sell them as solutions that cover multiple things."
"I would like more seamless integration."
"I would like to see Seqrite add a remote profile so we can implement different policies for users connecting to the in-office LAN and those accessing the office network from home or a public internet connection."
"Deployment of Seqrite Endpoint Security is generally straightforward. The only complexity we encounter is that, since it is cloud-based, there can be delays in updating the endpoint's status."
"Sometimes, small and medium businesses, or even startups with just five, ten, or fifteen systems, are also keen to secure their data. There is a reluctance on the part of the technical team to extend installation support when the opportunity sizes are smaller. Seqrite Endpoint Security has a lot of value. Still, its marketing could be done much better on a larger scale, especially in India, in light of the new DPDP 2023 Act, which the Indian Parliament passed. It would be even more valuable if Seqrite could incorporate features to help companies comply with this law, it would be even more helpful."
"The solution could improve by providing better security and a cloud base version."
"The interface is slow."
"A handbook of known issues and quick fixes should be given so that troubleshooting and frustration are less."
"The cost of the solution can be improved."
"The solution's integration capabilities are moderate and could be improved."
 

Pricing and Cost Advice

"The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost."
"Because we do see the value of what it's bringing, I think they have priced it well."
"The pricing and licensing fees are okay."
"It is a subscription-based product."
"The Enterprise Agreement is like an all-you-can-eat buffet of Cisco products. In that vein, it was very affordable."
"Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection."
"Cisco's pricing is reasonable. We also do not need to opt for niche players, which would have charged us significantly more than Cisco for ecosystem solutions. We are highly satisfied with the pricing structure of Cisco's solutions they are reasonable."
"The price is very good."
"As per the suggestions from one of the experts we know, it is advisable to make a proper comparison with the local vendors instead of solely relying on online prices, which are often higher and quite expensive."
"Endpoint Security is cheaper than Trend Micro."
"I give the cost of the solution a seven out of ten."
"We get the tool for around 1200 rupees for a three-year subscription. I rate its pricing a nine out of ten."
"It is a cheaply priced product."
"Licensing fees are on a yearly basis. Compared to other solutions, this solution is cheaper."
"Though I don't think that this is a cheaply priced product, I feel that it is an affordable solution."
"You need to pay for a yearly license for Seqrite Endpoint Security, which is expensive."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
867,676 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
21%
Manufacturing Company
9%
Government
7%
Financial Services Firm
6%
Computer Software Company
18%
Manufacturing Company
10%
Financial Services Firm
8%
Educational Organization
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business21
Midsize Enterprise14
Large Enterprise21
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise12
Large Enterprise1
 

Questions from the Community

What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdStrike, Microsoft Defender, or SentinelOne.
What needs improvement with Cisco Secure Endpoint?
Cisco Secure Endpoint lacks features like DLP which other vendors offer. XDR is new, so integration capabilities with third-party tools need improvement. The forensic capabilities need enhancement,...
What do you like most about Seqrite Endpoint Security?
The most valuable part of the solution is its ransomware backup feature.
What is your experience regarding pricing and costs for Seqrite Endpoint Security?
The solution's pricing is good for us, where it is neither cheap nor expensive.
What needs improvement with Seqrite Endpoint Security?
The solution's integration capabilities are moderate and could be improved.
 

Also Known As

Cisco AMP for Endpoints
Seqrite End Point Security, Seqrite EPS
 

Overview

 

Sample Customers

Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Gadre, Bharat Vikas Group, Fernandez Hospital, Fabtech Projects & Engineering, KIMS Hospital, National Steel And Agro Industries, Sardar Patel University, Sterling Wilson, Chowgule Industries
Find out what your peers are saying about Cisco Secure Endpoint vs. Seqrite Endpoint Security and other solutions. Updated: September 2025.
867,676 professionals have used our research since 2012.