Try our new research platform with insights from 80,000+ expert users

Cisco Secure Endpoint vs Trend Micro Endpoint Encryption comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Endpoint
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
49
Ranking in other categories
Endpoint Protection Platform (EPP) (35th), Endpoint Detection and Response (EDR) (27th), Cisco Security Portfolio (6th)
Trend Micro Endpoint Encryp...
Average Rating
8.0
Reviews Sentiment
6.3
Number of Reviews
22
Ranking in other categories
Endpoint Encryption (6th)
 

Mindshare comparison

While both are Endpoint Security solutions, they serve different purposes. Cisco Secure Endpoint is designed for Endpoint Protection Platform (EPP) and holds a mindshare of 1.3%, down 1.5% compared to last year.
Trend Micro Endpoint Encryption, on the other hand, focuses on Endpoint Encryption, holds 3.5% mindshare, down 3.5% since last year.
Endpoint Protection Platform (EPP) Market Share Distribution
ProductMarket Share (%)
Cisco Secure Endpoint1.3%
Microsoft Defender for Endpoint7.8%
CrowdStrike Falcon6.7%
Other84.2%
Endpoint Protection Platform (EPP)
Endpoint Encryption Market Share Distribution
ProductMarket Share (%)
Trend Micro Endpoint Encryption3.5%
Microsoft BitLocker21.6%
ESET Endpoint Encryption10.5%
Other64.4%
Endpoint Encryption
 

Featured Reviews

JavedHashmi - PeerSpot reviewer
Chief Technology Officer at Future Point Technologies
Reliable threat protection is achieved while integration and analysis capabilities need refinement
Cisco Secure Endpoint is very good in machine learning, which allows it to secure offline contents even if not connected to the internet. We haven't encountered a single breach after it's deployed. It controls USB devices and has a separate antivirus solution called Tetra, providing security even for real-time, day-zero attacks through its strong Talos threat intelligence platform.
VL
Senior Technical Solutions Architect at CMS Computers India Pvt Ltd.
Centralized encryption management has strengthened compliance and protects sensitive data daily
When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and the policies may not have been created properly, which is the reason it was not working. There could be improvements specifically about the scanning part and policy part where we have to deploy what we actually require. I would like to see features that include collaboration of all alerts and applied analytics so we can immediately identify issues. Analytics can provide immediate reporting before issues spread, as sometimes one issue captured at the site level can spread to high-level operations. If identified and communicated to the team immediately, it could prevent issues. Usually, downloading and reviewing the report takes too much time, and many engineers skip it due to the volume of tasks. However, analytics could generate alerts and ticketing if integrated with the EMS application.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cisco Secure Endpoint is very good in machine learning, which allows it to secure offline contents even if not connected to the internet."
"I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It should protect all kinds of things that might happen on the servers, things that I cannot see."
"The product's initial setup phase was very simple."
"Secure Endpoint has decreased our time to remediate by providing the tools and the integrations we need so we can quickly look across our entire network, look for those threats, and actually make good decisions."
"The console feature gives a centralized management of what's going on, and if something happens, it gives you an alert. So, that's the most important feature for me."
"Device Trajectory is one of the most valuable features. We're able to dig in and really understand how things came to be and where to focus our efforts."
"The solution's integration capabilities are excellent. It's one of the best features."
"The most valuable feature is signature-based malware detection."
"The most valuable feature is the support for email."
"Logging and reporting capabilities of Trend Micro Endpoint Encryption help with compliance verification, and there are no issues."
"The most valuable feature of Trend Micro Endpoint Encryption is security."
"We use the solution for data encryption."
"The product's initial setup phase is easy, considering the management console and software."
"One valuable feature is full disk encryption."
"Trend Micro Endpoint Encryption has good performance and is secure."
"The solution enables all the development and technical team members to work from home while, at the same time, ensuring the security of the work environment."
 

Cons

"The reporting and analytics areas of the solution need to be improved."
"It is an expensive solution."
"The user interface is dull."
"The GUI needs improvement, it's not good."
"In the next release, I would for it to have back up abilities. I would like the ability to go back to a point in time to when my PC was uninfected and to the moment of when the infection happened."
"We would like to have an API integration with a SIEM solution, because as far as I know, it currently hasn't yet been released."
"The connector updates are very easily done now, and that's improving. Previously, the connector had an issue, where almost every time it needed to be updated, it required a machine reboot. This was always a bit of an inconvenience and a bug. Because with a lot of software now, you don't need to do that and shouldn't need to be rebooting all the time."
"Logging could be better in terms of sending more logs to Cisco Firepower or Cisco ASA. That's an area where it could be made better."
"The product's scalability is an area of concern where improvements are required."
"In the next release, it would be better if it was more user-friendly. It is a little complicated for the average technical person. If they can make it more user-friendly, it would be much easier and more helpful."
"We had to use an integrator for the implementation of Trend Micro Endpoint Encryption. We have two people who work on this solution."
"Integration and support could be improved."
"They need to come up with cloud solutions."
"To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically."
"There are recovery issues that arise."
"Support from them was not fast."
 

Pricing and Cost Advice

"You must make monthly payments towards the licensing charges attached to the product. There are no extra charges apart from the standard licensing fees associated with the product."
"The solution's price is about the same as that of Palo Alto solutions."
"Pricing is a big issue."
"The Enterprise Agreement is like an all-you-can-eat buffet of Cisco products. In that vein, it was very affordable."
"It is an expensive solution."
"In our case, it is a straightforward annual payment through our Enterprise Agreement."
"The price is very good."
"Because we do see the value of what it's bringing, I think they have priced it well."
"The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems."
"I rate the product price a six on a scale of one to ten, where one is high price, and ten is low price."
"The solution's licensing costs are yearly."
"One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
"I rate the product price a seven on a scale of one to ten, where one is cheap, and ten is expensive."
"We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable."
"You have to pay for the license annually."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
881,455 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Manufacturing Company
10%
Government
8%
Healthcare Company
6%
Performing Arts
16%
Manufacturing Company
10%
Marketing Services Firm
8%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business21
Midsize Enterprise14
Large Enterprise21
By reviewers
Company SizeCount
Small Business14
Midsize Enterprise4
Large Enterprise5
 

Questions from the Community

What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdStrike, Microsoft Defender, or SentinelOne.
What needs improvement with Cisco Secure Endpoint?
Cisco Secure Endpoint lacks features like DLP which other vendors offer. XDR is new, so integration capabilities with third-party tools need improvement. The forensic capabilities need enhancement,...
What needs improvement with Trend Micro Endpoint Encryption?
If Trend Micro Endpoint Encryption comes up with a SaaS solution, it will be better rather than just having an on-premises solution.
 

Also Known As

Cisco AMP for Endpoints
No data available
 

Overview

 

Sample Customers

Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP). Updated: January 2026.
881,455 professionals have used our research since 2012.