Try our new research platform with insights from 80,000+ expert users

Cisco Secure Endpoint vs Trend Micro Endpoint Encryption comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
105
Ranking in other categories
Endpoint Protection Platform (EPP) (5th), Endpoint Detection and Response (EDR) (8th), Extended Detection and Response (XDR) (7th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (2nd)
Cisco Secure Endpoint
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
49
Ranking in other categories
Endpoint Protection Platform (EPP) (35th), Endpoint Detection and Response (EDR) (27th), Cisco Security Portfolio (6th)
Trend Micro Endpoint Encryp...
Average Rating
8.0
Reviews Sentiment
6.3
Number of Reviews
22
Ranking in other categories
Endpoint Encryption (6th)
 

Mindshare comparison

Endpoint Protection Platform (EPP) Market Share Distribution
ProductMarket Share (%)
Cisco Secure Endpoint1.3%
Microsoft Defender for Endpoint7.8%
CrowdStrike Falcon6.7%
Other84.2%
Endpoint Protection Platform (EPP)
Endpoint Encryption Market Share Distribution
ProductMarket Share (%)
Trend Micro Endpoint Encryption3.5%
Microsoft BitLocker21.6%
ESET Endpoint Encryption10.5%
Other64.4%
Endpoint Encryption
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
JavedHashmi - PeerSpot reviewer
Chief Technology Officer at Future Point Technologies
Reliable threat protection is achieved while integration and analysis capabilities need refinement
Cisco Secure Endpoint is very good in machine learning, which allows it to secure offline contents even if not connected to the internet. We haven't encountered a single breach after it's deployed. It controls USB devices and has a separate antivirus solution called Tetra, providing security even for real-time, day-zero attacks through its strong Talos threat intelligence platform.
VL
Senior Technical Solutions Architect at CMS Computers India Pvt Ltd.
Centralized encryption management has strengthened compliance and protects sensitive data daily
When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and the policies may not have been created properly, which is the reason it was not working. There could be improvements specifically about the scanning part and policy part where we have to deploy what we actually require. I would like to see features that include collaboration of all alerts and applied analytics so we can immediately identify issues. Analytics can provide immediate reporting before issues spread, as sometimes one issue captured at the site level can spread to high-level operations. If identified and communicated to the team immediately, it could prevent issues. Usually, downloading and reviewing the report takes too much time, and many engineers skip it due to the volume of tasks. However, analytics could generate alerts and ticketing if integrated with the EMS application.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cortex covers everything I need. It's a perfect solution. Cortex provides a different level of visibility because it's an extended EDR, allowing you to grab logs from the network and firewalls. Palo Alto invented the concept of the extended EDR or XDR."
"It's very stable. I've never experienced downtime for the ASM console or ASM core."
"This software helps us understand any issues that may arise when someone is not at work."
"The anti-exploit is impenetrable. We chose Traps because it is the only product that we were not able to get anything past."
"It'll not slow down your system when compared to others."
"It collects and caches and the knowledge of machine learning from different customers to take to the cloud. It makes it better to use for everybody. It allows for quick learning and updates and can, therefore, offer zero-day malware security. This sharing of metadata helps make the solution very safe."
"The most valuable feature of Cortex XDR by Palo Alto Networks is the low consumption of system resources. The solution uses a lot of AI and machine learning."
"The dashboard is customizable."
"The stability of the solution is perfect. I believe it's the most stable solution on the market right now."
"The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices."
"The simplicity of use is its most valuable feature. You can very clearly see things."
"The console feature gives a centralized management of what's going on, and if something happens, it gives you an alert. So, that's the most important feature for me."
"Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP."
"The most valuable features of this solution are the IPS and the integration with ISE."
"It doesn't impact the devices. It is an agent-based solution, and we see no performance knock on cell phones. That was a big thing for us, especially in the mobile world. We don't see battery degradation like you do with other solutions which really drain the battery, as they're constantly doing things. That can shorten the useful life of a device."
"It is extensive in terms of providing visibility and insights into threats. It allows for research into a threat, and you can chart your progress on how you're resolving it."
"Overall, I think that it's very interesting."
"Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level."
"The most valuable feature of the solution is the antivirus part it offers."
"The product's initial setup phase is easy, considering the management console and software."
"Fast encryption feature."
"The solution enables all the development and technical team members to work from home while, at the same time, ensuring the security of the work environment."
"The encryption is very good."
"We're very satisfied with Trend Micro support."
 

Cons

"The installation should be easier and the Palo Alto pre-sales and sales teams should have more information on the product because they don't know what they are selling."
"I think sometimes Cortex XDR agent automatically stops event capturing from the device, and then even the dashboard does not get any notifications from the agent."
"Cortex XDR could improve its sales support team, including better commission structures and referral programs."
"Currently, if you use Palo Alto endpoint protection as the only solution it's very complicated to remove pre-existing threats."
"The solution should force customers to integrate with network traffic to see the full benefits of XDR."
"Being able to filter the events to see those that are related to the actual alert would save time spent by the engineer."
"Palo Alto Networks Cortex XDR does not detect malicious activity like in other anti-virus solutions like Trend Micro and Windows with Cisco."
"It'll help if customization was easier."
"The pricing policy could be more competitive, similar to Cisco's offerings."
"In the next version of this solution, I would like to see the addition of local authentication."
"We have had some problems with updates not playing nice with our environment. This is important, because if there is a new version, we need to test it thoroughly before it goes into production. We cannot just say, "There's a new version. It's not going to give us any problems." With the complexity of the solution using multiple engines for multiple tasks, it can sometimes cause performance issues on our endpoints. Therefore, we need to test it before we deploy. That takes one to three days before we can be certain that the new version plays nice with our environment."
"The product does not provide options like tunnel creation or virtual appliances."
"This product has issues with the number of false positives that it reports."
"The reporting and analytics areas of the solution need to be improved."
"One of the things that Cisco Secure Endpoint really needs is that it's not just Secure Endpoint, it's a point product, and I think we really need to move into solution-based selling, designing, and architecting. So that we're not worried about putting things on endpoints and selling 'x' amount of endpoints, but to provide a solution that covers all of the remote access and sell them as solutions that cover multiple things."
"Its price is okay for us, but it can always be better. There's always room for improvement when it comes to pricing."
"There are scalability limitations. I'd rate scalability five out of ten."
"Trend Micro Endpoint Encryption currently lacks something similar to a firewall that can detect any vulnerabilities."
"If Trend Micro Endpoint Encryption comes up with a SaaS solution, it will be better rather than just having an on-premises solution."
"Compared to Bitlocker or McAfee Disk Encryption, it's not quite as robust."
"There are recovery issues that arise."
"Should have more features of Deep Scanning"
"To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically."
"I would like to see more integration. Good cloud-based solutions need to be arrayed. I'd like to see better integration with administrative tools as well as Active Directory integration."
 

Pricing and Cost Advice

"I don't like that they have different types of licenses."
"Our license will require renewal in August, after which the maintenance will continue as usual."
"It's the most expensive solution, but features-wise, it's quite strong. It's very good for protection, so the results are very good in the case of protection. I would rate it a two out of ten in terms of pricing."
"Cortex XDR's pricing is ok."
"The price of the product is not very economical."
"It's about $55 per license on a yearly basis."
"I don't recall what the cost was, but it wasn't really that expensive."
"I don't have any issues with the pricing. We are satisfied with the price."
"It is a subscription-based product."
"The price is very fair to the customer."
"Because we do see the value of what it's bringing, I think they have priced it well."
"The solution is highly affordable; I believe we pay $2 or $3 per endpoint. It's significantly cheaper than the competitors on the market."
"...the licensing needs to be improved. All the product features we need are there. It's just a matter of the complexity and the different offerings and trying to figure things out."
"Cisco's pricing is reasonable. We also do not need to opt for niche players, which would have charged us significantly more than Cisco for ecosystem solutions. We are highly satisfied with the pricing structure of Cisco's solutions they are reasonable."
"Its price is fair for us."
"Licensing fees are on a yearly basis and I am happy with the pricing."
"The solution's licensing costs are yearly."
"You have to pay for the license annually."
"I rate the product price a seven on a scale of one to ten, where one is cheap, and ten is expensive."
"I rate the product price a six on a scale of one to ten, where one is high price, and ten is low price."
"The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems."
"One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
"We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
882,637 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
10%
Financial Services Firm
10%
Manufacturing Company
8%
Comms Service Provider
6%
Computer Software Company
12%
Manufacturing Company
10%
Government
9%
Healthcare Company
6%
Performing Arts
17%
Manufacturing Company
10%
Marketing Services Firm
8%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business42
Midsize Enterprise21
Large Enterprise47
By reviewers
Company SizeCount
Small Business21
Midsize Enterprise14
Large Enterprise21
By reviewers
Company SizeCount
Small Business14
Midsize Enterprise4
Large Enterprise5
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdS...
What needs improvement with Cisco Secure Endpoint?
Cisco Secure Endpoint lacks features like DLP which other vendors offer. XDR is new, so integration capabilities with...
What needs improvement with Trend Micro Endpoint Encryption?
When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and t...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Cisco AMP for Endpoints
No data available
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP). Updated: January 2026.
882,637 professionals have used our research since 2012.