Try our new research platform with insights from 80,000+ expert users

Cisco Secure Endpoint vs Seqrite Endpoint Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Endpoint
Ranking in Endpoint Protection Platform (EPP)
13th
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
49
Ranking in other categories
Endpoint Detection and Response (EDR) (12th), Cisco Security Portfolio (6th)
Seqrite Endpoint Security
Ranking in Endpoint Protection Platform (EPP)
19th
Average Rating
7.6
Reviews Sentiment
6.9
Number of Reviews
23
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2025, in the Endpoint Protection Platform (EPP) category, the mindshare of Cisco Secure Endpoint is 1.5%, down from 1.9% compared to the previous year. The mindshare of Seqrite Endpoint Security is 1.4%, up from 1.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Mark Broughton - PeerSpot reviewer
Tighter integration with Umbrella and Firepower gave us eye-opening information
We were using a third-party help desk. One of the ways that they were fixing problems was to delete the client and then add the client back if there was an issue where the client had stopped communicating. Any improvement in the client communicating back to the server would be good, particularly for machines that are offline for a couple of weeks. A lot of our guys were working on a rotation where the machine might be offline for that long. They were also terrible about rebooting their machines, so those network connections didn't necessarily get refreshed. So, anything that could improve that communication would be good. Also, an easier way to do deduplication of machines, or be alerted to the fact that there's more than one instance of a machine, would be useful. If you could say, "Okay, we've got these two machines. This one says it's not reporting and this one says it's been reporting. Obviously, somebody did a reinstall," it would help. That way you could get a more accurate device count, so you're not having an inflated number. Not that Cisco was going to come down on you and say, "Oh, you're using too many licenses," right away. But to have a much more accurate license usage count by being able to better dedupe the records would be good. I also sent over a couple of other ideas to our technical rep. A lot of that had to do with the reporting options. It would be really nice to be able to do a lot more in the reporting. You can't really drill down into the reports that are there. The reporting and the need for the documentation to be updated and current would be my two biggest areas of complaint. Also, there was one section when I was playing with the automation where it was asking for the endpoint type rather than the machine name. If I could have just put in the machine name, that would have been great. So there are some opportunities, when it comes to searching, to have more options. If I wanted to search, for example, by a Mac address because, for some reason, I thought there was a duplication and I didn't have the machine name, how could I pull it up with the Mac address? When you're getting to that level, you're really starting to get into the ticky tacky. I would definitely put the reporting and documentation way ahead of that.
ManishKumar14 - PeerSpot reviewer
Centrally managed, easy to configure, and easy to use
Seqrite Endpoint Security protects individual machines, servers, and emails against malware, viruses, and spam attacks The solution is centrally managed, easy to configure, and easy to use. It allows you to patch your required reports. The solution provides central deployment, remote deployment,…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It doesn't impact the devices. It is an agent-based solution, and we see no performance knock on cell phones. That was a big thing for us, especially in the mobile world. We don't see battery degradation like you do with other solutions which really drain the battery, as they're constantly doing things. That can shorten the useful life of a device."
"It's quite simple, and the advantage I see is that I get the trajectory of what happened inside the network, how a file has been transmitted to the workstation, and which files have got corrupted."
"The VPN is most valuable. It's the best thing in the market today. We can use two-factor authentication with another platform, and we can authenticate with two-factor."
"The visibility and insight this solution gives you into threats is pretty granular. It has constant monitoring. You can get onto the device trajectory to look at a threat, but you can also see what happened prior to the threat. You can see what happened after the threat. You can see what other applications were incorporated into the execution of the threat. For example, you have the event, but you see that the event was launched by Google Chrome, which was launched by something else. Then, after the event, something else was launched by whatever the threat was. Therefore, it gives you great detail, a timeline, and continuity of events leading up to whatever the incident is, and then, after. This helps you understand and nail down what the threat is and how to fix it."
"For the initial first level of support, we provide it from our side. If there's escalation required, we use Cisco tech for the AMP. And again, they are perfect. I mean, one of the best, compared to any other vendors."
"The simplicity of use is its most valuable feature. You can very clearly see things."
"The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices."
"Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP."
"The most valuable features are the file activity monitors, DLP solutions, and application controls."
"The overall performance of the server and the dashboard are the most interesting aspects of the solution."
"Seqrite Endpoint Security provides external protection in terms of hard drives."
"Seqrite Endpoint Security is a good solution."
"In case it works, we are looking to use features like USB blocking, file upload alerts, and other antivirus features as well, but this software has to work first."
"The setup process was easy for our remote clients and us as well."
"The product's initial setup phase is easy."
"The only thing that I have found useful is that I have an overview of my systems in the networks."
 

Cons

"The pricing policy could be more competitive, similar to Cisco's offerings."
"The one challenge that I see is the use of multiple endpoint protection platforms. For instance, we have AMP, but we also have Microsoft Windows Defender, System Center Endpoint Protection, and Microsoft Malware Protection Engine deployed. So, we have a bunch of different things that do the same thing. What winds up happening is, e.g., if I get an alert for a potential incident or malware and want to pull the file, I'll go to fetch the file to analyze it. But, one of these other programs has already gotten it, so the file has already been quarantined by another endpoint protection system. AMP doesn't realize that and the file fetch fails, then you're left wondering what's going on."
"It is not very stable because we have new versions four times a year, which fixes bugs. We had some problems with some deployments."
"It could be improved in connection with artificial intelligence and IoT."
"The solution needs more in-depth analytics."
"Integration and dashboard are areas with certain shortcomings in Cisco Secure Endpoint."
"We have had some problems with updates not playing nice with our environment. This is important, because if there is a new version, we need to test it thoroughly before it goes into production. We cannot just say, "There's a new version. It's not going to give us any problems." With the complexity of the solution using multiple engines for multiple tasks, it can sometimes cause performance issues on our endpoints. Therefore, we need to test it before we deploy. That takes one to three days before we can be certain that the new version plays nice with our environment."
"The user interface is dull."
"I would like to see Seqrite add a remote profile so we can implement different policies for users connecting to the in-office LAN and those accessing the office network from home or a public internet connection."
"It should be able to detect and report any ransomware attack but currently, it doesn't detect and it doesn't report any."
"The solution could improve by providing better security and a cloud base version."
"Sometimes, small and medium businesses, or even startups with just five, ten, or fifteen systems, are also keen to secure their data. There is a reluctance on the part of the technical team to extend installation support when the opportunity sizes are smaller. Seqrite Endpoint Security has a lot of value. Still, its marketing could be done much better on a larger scale, especially in India, in light of the new DPDP 2023 Act, which the Indian Parliament passed. It would be even more valuable if Seqrite could incorporate features to help companies comply with this law, it would be even more helpful."
"The cost of the solution can be improved."
"I don't feel that the scalability part of Seqrite Endpoint Security is better than the other products in the market."
"The support offered by the tool is an area of concern where improvements are required."
"User management could be improved."
 

Pricing and Cost Advice

"The solution's price is about the same as that of Palo Alto solutions."
"​Pricing can be more expensive than similar software that does less functionality, but not recognized by customers.​"
"We had faced some license issues, but it has been improved. At the beginning of the implementation, we faced a lot of licensing issues, but now, we have EA licensing, which gives us an opportunity to grow."
"Its price is fair for us."
"I rate the pricing a five or six on a scale of one to ten, where one is expensive, and ten is cheap."
"It is an expensive solution."
"We have a license for 3,000 users and if we get up to 3,100 users, it doesn't stop working, but on the next renewal date you're supposed to go in there and add that extra 100 licenses. It's really good that they let you grow and expand and then pay for it. Sometimes, with other products, you overuse a license and they just don't work."
"It is a subscription-based product."
"Though I don't think that this is a cheaply priced product, I feel that it is an affordable solution."
"As per the suggestions from one of the experts we know, it is advisable to make a proper comparison with the local vendors instead of solely relying on online prices, which are often higher and quite expensive."
"Endpoint Security is cheaper than Trend Micro."
"You need to pay for a yearly license for Seqrite Endpoint Security, which is expensive."
"The solution has reasonable pricing. There is one pricing without any hidden charges. They have to pay once a year or three years."
"We pay approximately $1,500 for licenses for the solution."
"The license isn't expensive."
"The licensing fee is 200 Bangladeshi Taka per client per year."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
842,296 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
18%
Government
9%
Financial Services Firm
9%
Manufacturing Company
8%
Computer Software Company
19%
Educational Organization
9%
Manufacturing Company
9%
Financial Services Firm
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
I am not entirely sure about the exact licensing cost. It ranges from 2,000 to 2,500 INR annually.
What needs improvement with Cisco Secure Endpoint?
Previously, there were options to uninstall the agent without a password if you had admin access, and this could be improved. It may require a password for uninstalling clients, which would be help...
What do you like most about Seqrite Endpoint Security?
The most valuable part of the solution is its ransomware backup feature.
What is your experience regarding pricing and costs for Seqrite Endpoint Security?
The solution's pricing is good for us, where it is neither cheap nor expensive.
What needs improvement with Seqrite Endpoint Security?
The solution's integration capabilities are moderate and could be improved.
 

Also Known As

Cisco AMP for Endpoints
Seqrite End Point Security, Seqrite EPS
 

Overview

 

Sample Customers

Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Gadre, Bharat Vikas Group, Fernandez Hospital, Fabtech Projects & Engineering, KIMS Hospital, National Steel And Agro Industries, Sardar Patel University, Sterling Wilson, Chowgule Industries
Find out what your peers are saying about Cisco Secure Endpoint vs. Seqrite Endpoint Security and other solutions. Updated: March 2025.
842,296 professionals have used our research since 2012.