Try our new research platform with insights from 80,000+ expert users

Cisco Secure Endpoint vs Trend Micro Endpoint Encryption comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Endpoint
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
49
Ranking in other categories
Endpoint Protection Platform (EPP) (26th), Endpoint Detection and Response (EDR) (20th), Cisco Security Portfolio (6th)
Trend Micro Endpoint Encryp...
Average Rating
8.0
Reviews Sentiment
7.2
Number of Reviews
21
Ranking in other categories
Endpoint Encryption (6th)
 

Mindshare comparison

While both are Endpoint Security solutions, they serve different purposes. Cisco Secure Endpoint is designed for Endpoint Protection Platform (EPP) and holds a mindshare of 1.5%, down 1.6% compared to last year.
Trend Micro Endpoint Encryption, on the other hand, focuses on Endpoint Encryption, holds 3.1% mindshare, down 4.3% since last year.
Endpoint Protection Platform (EPP) Market Share Distribution
ProductMarket Share (%)
Cisco Secure Endpoint1.5%
Microsoft Defender for Endpoint10.0%
CrowdStrike Falcon8.2%
Other80.3%
Endpoint Protection Platform (EPP)
Endpoint Encryption Market Share Distribution
ProductMarket Share (%)
Trend Micro Endpoint Encryption3.1%
Microsoft BitLocker35.3%
ESET Endpoint Encryption17.3%
Other44.3%
Endpoint Encryption
 

Featured Reviews

Mark Broughton - PeerSpot reviewer
Tighter integration with Umbrella and Firepower gave us eye-opening information
We were using a third-party help desk. One of the ways that they were fixing problems was to delete the client and then add the client back if there was an issue where the client had stopped communicating. Any improvement in the client communicating back to the server would be good, particularly for machines that are offline for a couple of weeks. A lot of our guys were working on a rotation where the machine might be offline for that long. They were also terrible about rebooting their machines, so those network connections didn't necessarily get refreshed. So, anything that could improve that communication would be good. Also, an easier way to do deduplication of machines, or be alerted to the fact that there's more than one instance of a machine, would be useful. If you could say, "Okay, we've got these two machines. This one says it's not reporting and this one says it's been reporting. Obviously, somebody did a reinstall," it would help. That way you could get a more accurate device count, so you're not having an inflated number. Not that Cisco was going to come down on you and say, "Oh, you're using too many licenses," right away. But to have a much more accurate license usage count by being able to better dedupe the records would be good. I also sent over a couple of other ideas to our technical rep. A lot of that had to do with the reporting options. It would be really nice to be able to do a lot more in the reporting. You can't really drill down into the reports that are there. The reporting and the need for the documentation to be updated and current would be my two biggest areas of complaint. Also, there was one section when I was playing with the automation where it was asking for the endpoint type rather than the machine name. If I could have just put in the machine name, that would have been great. So there are some opportunities, when it comes to searching, to have more options. If I wanted to search, for example, by a Mac address because, for some reason, I thought there was a duplication and I didn't have the machine name, how could I pull it up with the Mac address? When you're getting to that level, you're really starting to get into the ticky tacky. I would definitely put the reporting and documentation way ahead of that.
Sampath Acharya - PeerSpot reviewer
Full disk encryption safeguards data effectively and customer service provides excellent support
There weren't too many challenges with the setup. The initial setup is a little bit difficult as it requires skill. A person without the necessary experience or skill cannot handle it. Overall, I'd rate the implementation process seven out of ten. Deployment times vary depending on customer enrollment. If there are more than 100 machines, it might take 45 to 60 days.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
"There are no issues or drops in the solution's performance...The solution's technical support was helpful."
"Integration is a key selling factor for Cisco security products. We have a Cisco Enterprise Agreement with access to Cisco Email Security, Cisco Firepower, Cisco Stealthwatch, Cisco Talos, Cisco Threat Grid, Cisco Umbrella, and also third-party solutions. This is key to our security and maximizing operations. Because we do have the Email Security appliance and it is integrated with Threat Response, we have everything tied together. Additionally, we are using the Cisco SecureX platform, as we were a beta test for that new solution. With SecureX, we are able to pull all those applications into one pane for visibility and maintenance. This greatly maximizes our security operations."
"Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
"Secure Endpoint has decreased our time to remediate by providing the tools and the integrations we need so we can quickly look across our entire network, look for those threats, and actually make good decisions."
"The solution’s most valuable feature is malware protection."
"With Cisco Secure Endpoint, we now have visibility over what is happening on the endpoint side."
"It provides real-time visibility and control over endpoints, allowing its users to promptly respond to any security incidents and remediate any vulnerabilities."
"The product's initial setup phase is easy, considering the management console and software."
"The encryption is very good."
"We're very satisfied with Trend Micro support."
"The solution is good overall. All of its features are good."
"Overall, I think that it's very interesting."
"The most valuable feature is the support for email."
"Fast encryption feature."
"It's a secure and quick solution."
 

Cons

"The pricing policy could be more competitive, similar to Cisco's offerings."
"It cannot currently block URLs over websites."
"The reporting and analytics areas of the solution need to be improved."
"Previously, there were options to uninstall the agent without a password if you had admin access, and this could be improved."
"The connector updates are very easily done now, and that's improving. Previously, the connector had an issue, where almost every time it needed to be updated, it required a machine reboot. This was always a bit of an inconvenience and a bug. Because with a lot of software now, you don't need to do that and shouldn't need to be rebooting all the time."
"Logging could be better in terms of sending more logs to Cisco Firepower or Cisco ASA. That's an area where it could be made better."
"We have had some problems with updates not playing nice with our environment. This is important, because if there is a new version, we need to test it thoroughly before it goes into production. We cannot just say, "There's a new version. It's not going to give us any problems." With the complexity of the solution using multiple engines for multiple tasks, it can sometimes cause performance issues on our endpoints. Therefore, we need to test it before we deploy. That takes one to three days before we can be certain that the new version plays nice with our environment."
"The GUI needs improvement, it's not good."
"I would like to improve the solution's support."
"In the next release, it would be better if it was more user-friendly. It is a little complicated for the average technical person. If they can make it more user-friendly, it would be much easier and more helpful."
"Integration and support could be improved."
"Compared to Bitlocker or McAfee Disk Encryption, it's not quite as robust."
"The user interface is a little challenging, especially for beginners. It's hard for new users to understand how to configure the correct access for each company function."
"It is not easy to integrate with third party solutions."
"In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support."
"To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically."
 

Pricing and Cost Advice

"Cisco Secure Endpoint is not too expensive and it's not cheap. It's quite fair."
"The costs of 50 licenses of AMP for three years is around $9,360."
"The pricing and licensing fees are okay."
"Licensing fees are on a yearly basis and I am happy with the pricing."
"Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection."
"We had faced some license issues, but it has been improved. At the beginning of the implementation, we faced a lot of licensing issues, but now, we have EA licensing, which gives us an opportunity to grow."
"Cisco's pricing is reasonable. We also do not need to opt for niche players, which would have charged us significantly more than Cisco for ecosystem solutions. We are highly satisfied with the pricing structure of Cisco's solutions they are reasonable."
"The price is very good."
"I rate the product price a seven on a scale of one to ten, where one is cheap, and ten is expensive."
"The solution's licensing costs are yearly."
"I rate the product price a six on a scale of one to ten, where one is high price, and ten is low price."
"One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
"We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable."
"The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems."
"You have to pay for the license annually."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
867,676 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
21%
Manufacturing Company
9%
Government
7%
Financial Services Firm
6%
Government
17%
Performing Arts
15%
Manufacturing Company
8%
Educational Organization
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business21
Midsize Enterprise14
Large Enterprise21
By reviewers
Company SizeCount
Small Business14
Midsize Enterprise4
Large Enterprise4
 

Questions from the Community

What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdStrike, Microsoft Defender, or SentinelOne.
What needs improvement with Cisco Secure Endpoint?
Cisco Secure Endpoint lacks features like DLP which other vendors offer. XDR is new, so integration capabilities with third-party tools need improvement. The forensic capabilities need enhancement,...
What needs improvement with Trend Micro Endpoint Encryption?
If Trend Micro Endpoint Encryption comes up with a SaaS solution, it will be better rather than just having an on-premises solution.
 

Also Known As

Cisco AMP for Endpoints
No data available
 

Overview

 

Sample Customers

Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
Find out what your peers are saying about Microsoft, CrowdStrike, SentinelOne and others in Endpoint Protection Platform (EPP). Updated: September 2025.
867,676 professionals have used our research since 2012.