Try our new research platform with insights from 80,000+ expert users

Cisco Secure Endpoint vs Trend Micro Endpoint Encryption [EOL] comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
105
Ranking in other categories
Endpoint Protection Platform (EPP) (5th), Endpoint Detection and Response (EDR) (8th), Extended Detection and Response (XDR) (7th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (2nd)
Cisco Secure Endpoint
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
49
Ranking in other categories
Endpoint Protection Platform (EPP) (35th), Endpoint Detection and Response (EDR) (27th), Cisco Security Portfolio (6th)
Trend Micro Endpoint Encryp...
Average Rating
8.0
Reviews Sentiment
6.3
Number of Reviews
22
Ranking in other categories
Endpoint Encryption (6th)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
JavedHashmi - PeerSpot reviewer
Chief Technology Officer at Future Point Technologies
Reliable threat protection is achieved while integration and analysis capabilities need refinement
Cisco Secure Endpoint is very good in machine learning, which allows it to secure offline contents even if not connected to the internet. We haven't encountered a single breach after it's deployed. It controls USB devices and has a separate antivirus solution called Tetra, providing security even for real-time, day-zero attacks through its strong Talos threat intelligence platform.
VL
Senior Technical Solutions Architect at CMS Computers India Pvt Ltd.
Centralized encryption management has strengthened compliance and protects sensitive data daily
When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and the policies may not have been created properly, which is the reason it was not working. There could be improvements specifically about the scanning part and policy part where we have to deploy what we actually require. I would like to see features that include collaboration of all alerts and applied analytics so we can immediately identify issues. Analytics can provide immediate reporting before issues spread, as sometimes one issue captured at the site level can spread to high-level operations. If identified and communicated to the team immediately, it could prevent issues. Usually, downloading and reviewing the report takes too much time, and many engineers skip it due to the volume of tasks. However, analytics could generate alerts and ticketing if integrated with the EMS application.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Stability is one of the features we like the most."
"Cortex is the best tool for endpoint detection, and I have used it to verify hashes or domains to identify malicious activity, trigger playbooks that automate and gather endpoint logs, block malicious processes, and update incident tickets, showcasing end-to-end processes with automation in investigation and reducing the analysis workflow."
"The stability of this product is very good."
"I've found the solution to be highly scalable for enterprises."
"Since they've done their most recent update, the ease to isolate endpoints is valuable. If we find one where there is a virus on it, we can easily isolate it. We don't even have to contact the user. We don't have to manually take them off the network. We can easily isolate them."
"WildFire AI is the best option for this product."
"The solution allows us to make investigations. Other XDR solutions also provide similar capabilities but for investigation, Cortex XDR is better."
"Cortex XDR by Palo Alto Networks's ability to block sophisticated threats in real time is quite good and is on par with SentinelOne's."
"Device Trajectory is one of the most valuable features. We're able to dig in and really understand how things came to be and where to focus our efforts."
"One of the best features of AMP is its cloud feature. It doesn't matter where the device is in regards to whether it's inside or outside of your network environment, especially right now when everybody's remote and taken their laptops home. You don't have to be VPNed into the environment for AMP to work. AMP will work anywhere in the world, as long as it has an Internet connection. You get protection and reporting with it. No matter where the device is, AMP has still got coverage on it and is protecting it. You still have the ability to manage and remediate things. The cloud feature is the magic bullet. This is what makes the solution a valuable tool as far as I'm concerned."
"The biggest lesson that I have learned from using this product is that there is a lot more malware slipping through my email filters than I expected."
"It is extensive in terms of providing visibility and insights into threats. It allows for research into a threat, and you can chart your progress on how you're resolving it."
"appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst. I can track everything that happens on our server from my PC or device. Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us."
"The tool's most valuable feature is its integration with other Cisco products, such as switches and routers. This integration allows comprehensive coverage of security parameters across the customer's entire network. Customers find it easier to manage because they already know Cisco products. The cloud-based management is another valuable feature, enabling customers to manage their security from anywhere with an internet connection."
"Definitely, the best feature for Cisco Secure Endpoint is the integration with Talos. On the backend, Talos checks all the signatures, all the malware, and for any attacks going on around the world... Because Secure Endpoint has a connection to it, we get protected by it right then and there."
"The solution's integration capabilities are excellent. It's one of the best features."
"We use the solution for data encryption."
"Overall, I think that it's very interesting."
"Very good interface."
"The disk encryption is great."
"Fast encryption feature."
"Trend Micro Endpoint Encryption has good performance and is secure."
"We're very satisfied with Trend Micro support."
"If a laptop is stolen, no one can steal the data since it is fully protected."
 

Cons

"I would like to see some additional features related to email protection included."
"We would also like to have advanced tech protection and email scanning."
"If Palo Alto reduces the pricing slightly for their products, it would make them more scalable in markets such as India and globally for cybersecurity."
"Being able to filter the events to see those that are related to the actual alert would save time spent by the engineer."
"The dashboard is the area that needs to improve so that we can have the ability to drill down without having to go elsewhere to verify results."
"The solution could improve by providing better integration with their own products and others."
"We have found that there are times Cortex XDR by Palo Alto Networks does not detect some of the viruses, we have to use another protection solution called Kaspersky."
"Technology evolves every day, so it would be nice if it gets more secure. It can also have more integration with other platforms."
"We would like to have an API integration with a SIEM solution, because as far as I know, it currently hasn't yet been released."
"It cannot currently block URLs over websites."
"The connector updates are very easily done now, and that's improving. Previously, the connector had an issue, where almost every time it needed to be updated, it required a machine reboot. This was always a bit of an inconvenience and a bug. Because with a lot of software now, you don't need to do that and shouldn't need to be rebooting all the time."
"The integration of the Cisco products for security could be better in the sense that not everything is integrated, and they aren't working together. In addition, not all products are multi-tenant, so you can't separate different customer environments from each other, which makes it a little bit hard for a managed service provider to deliver services to the customers."
"Due to the complexity of the technology that is used and its advanced threat detection capabilities, it is possible to encounter many delays in operation."
"In terms of the user experience, if the UX design could be much simpler [that would improve things]... if they could make it more intuitive for someone who is not an engineer so that they still can read what's going on in their webpage and understand, that would be something."
"The reporting and analytics areas of the solution need to be improved."
"Its price is okay for us, but it can always be better. There's always room for improvement when it comes to pricing."
"We had to use an integrator for the implementation of Trend Micro Endpoint Encryption. We have two people who work on this solution."
"There are recovery issues that arise."
"In the next release, it would be better if it was more user-friendly. It is a little complicated for the average technical person. If they can make it more user-friendly, it would be much easier and more helpful."
"It would be great if this solution had support for file integrity monitoring."
"Integration and support could be improved."
"Support from them was not fast."
"The user interface is a little challenging, especially for beginners. It's hard for new users to understand how to configure the correct access for each company function."
"If Trend Micro Endpoint Encryption comes up with a SaaS solution, it will be better rather than just having an on-premises solution."
 

Pricing and Cost Advice

"The price of the solution is high for the license and in general."
"The pricing is a little bit on the expensive side."
"This is an expensive solution."
"It is "expensive" and flexible."
"I don't recall what the cost was, but it wasn't really that expensive."
"The solution has one subscription for endpoint protection and one subscription for detection and response. The two licenses combined give you the BRO version."
"Cortex XDR is a costly solution."
"It has a yearly renewal."
"The solution's price is about the same as that of Palo Alto solutions."
"We have a license for 3,000 users and if we get up to 3,100 users, it doesn't stop working, but on the next renewal date you're supposed to go in there and add that extra 100 licenses. It's really good that they let you grow and expand and then pay for it. Sometimes, with other products, you overuse a license and they just don't work."
"Cisco Secure Endpoint is not too expensive and it's not cheap. It's quite fair."
"The costs of 50 licenses of AMP for three years is around $9,360."
"The price is very good."
"It can always be cheaper."
"We had faced some license issues, but it has been improved. At the beginning of the implementation, we faced a lot of licensing issues, but now, we have EA licensing, which gives us an opportunity to grow."
"The pricing and licensing fees are okay."
"I rate the product price a seven on a scale of one to ten, where one is cheap, and ten is expensive."
"I rate the product price a six on a scale of one to ten, where one is high price, and ten is low price."
"The solution's licensing costs are yearly."
"One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
"The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems."
"We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable."
"You have to pay for the license annually."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
883,026 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
10%
Financial Services Firm
10%
Manufacturing Company
9%
Government
6%
Computer Software Company
11%
Manufacturing Company
10%
Government
8%
Comms Service Provider
6%
Performing Arts
16%
Manufacturing Company
10%
Marketing Services Firm
8%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business42
Midsize Enterprise21
Large Enterprise47
By reviewers
Company SizeCount
Small Business21
Midsize Enterprise14
Large Enterprise21
By reviewers
Company SizeCount
Small Business14
Midsize Enterprise4
Large Enterprise5
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdS...
What needs improvement with Cisco Secure Endpoint?
Cisco Secure Endpoint lacks features like DLP which other vendors offer. XDR is new, so integration capabilities with...
What needs improvement with Trend Micro Endpoint Encryption?
When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and t...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Cisco AMP for Endpoints
No data available
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP). Updated: February 2026.
883,026 professionals have used our research since 2012.