Try our new research platform with insights from 80,000+ expert users

Cisco Secure Endpoint vs Trend Micro Endpoint Encryption comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Cisco Secure Endpoint
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
48
Ranking in other categories
Endpoint Protection Platform (EPP) (14th), Endpoint Detection and Response (EDR) (12th), Cisco Security Portfolio (6th)
Trend Micro Endpoint Encryp...
Average Rating
8.0
Number of Reviews
20
Ranking in other categories
Endpoint Encryption (5th)
 

Mindshare comparison

While both are Endpoint Security solutions, they serve different purposes. Cisco Secure Endpoint is designed for Endpoint Protection Platform (EPP) and holds a mindshare of 1.6%, down 2.0% compared to last year.
Trend Micro Endpoint Encryption, on the other hand, focuses on Endpoint Encryption, holds 4.0% mindshare, down 5.6% since last year.
Endpoint Protection Platform (EPP)
Endpoint Encryption
 

Featured Reviews

Mark Broughton - PeerSpot reviewer
Aug 10, 2022
Tighter integration with Umbrella and Firepower gave us eye-opening information
We were using a third-party help desk. One of the ways that they were fixing problems was to delete the client and then add the client back if there was an issue where the client had stopped communicating. Any improvement in the client communicating back to the server would be good, particularly for machines that are offline for a couple of weeks. A lot of our guys were working on a rotation where the machine might be offline for that long. They were also terrible about rebooting their machines, so those network connections didn't necessarily get refreshed. So, anything that could improve that communication would be good. Also, an easier way to do deduplication of machines, or be alerted to the fact that there's more than one instance of a machine, would be useful. If you could say, "Okay, we've got these two machines. This one says it's not reporting and this one says it's been reporting. Obviously, somebody did a reinstall," it would help. That way you could get a more accurate device count, so you're not having an inflated number. Not that Cisco was going to come down on you and say, "Oh, you're using too many licenses," right away. But to have a much more accurate license usage count by being able to better dedupe the records would be good. I also sent over a couple of other ideas to our technical rep. A lot of that had to do with the reporting options. It would be really nice to be able to do a lot more in the reporting. You can't really drill down into the reports that are there. The reporting and the need for the documentation to be updated and current would be my two biggest areas of complaint. Also, there was one section when I was playing with the automation where it was asking for the endpoint type rather than the machine name. If I could have just put in the machine name, that would have been great. So there are some opportunities, when it comes to searching, to have more options. If I wanted to search, for example, by a Mac address because, for some reason, I thought there was a duplication and I didn't have the machine name, how could I pull it up with the Mac address? When you're getting to that level, you're really starting to get into the ticky tacky. I would definitely put the reporting and documentation way ahead of that.
AltafSiddiqui - PeerSpot reviewer
Feb 13, 2024
Though it provides good endpoint security, there is a need to improve scalability
I don't have any idea about the implementation part because the tool was configured in my company's infrastructure. When I joined the organization, everything was configured. Currently, I am involved in the endpoint management and control. My company uses the product for the endpoints in our company so that it offers protection against viruses and other malicious activities. My company operates as a service provider, owing to which we deal with multiple clients and their data, which are stored in a PDF format. My company also provides applications to our clients. There are different types of data that my company protects from malicious activities and ransomware attacks. The most beneficial part of the product for our company's security needs stems from the fact that it offers an agentless service, which makes it better to manage our endpoint devices. I am not the right person to speak about how the full disc encryption capability of Trend Micro has impacted our data protection strategies since I am not the right person to provide any information about it. I am a system engineer who manages virtualization tools like VMware. There is a separate team for endpoint management in my organization. Speaking about the user experience and management console of Trend Micro Endpoint Encryption, I would say that the product offers a very unique GUI. The unique GUI of the tool makes it possible to easily use the management console for some tasks, like creating and downloading reports. There is a separate team with six to seven engineers in my company to manage the troubleshooting part of endpoint solutions. I recommend the product to those who plan to use it. The product is easy to use. The product is useful in the area of ePO reporting. It is very easy to create general reports with the product. I rate the overall product a seven out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Secure Endpoint has decreased our time to remediate by providing the tools and the integrations we need so we can quickly look across our entire network, look for those threats, and actually make good decisions."
"appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst. I can track everything that happens on our server from my PC or device. Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us."
"Definitely, the best feature for Cisco Secure Endpoint is the integration with Talos. On the backend, Talos checks all the signatures, all the malware, and for any attacks going on around the world... Because Secure Endpoint has a connection to it, we get protected by it right then and there."
"There are several valuable features including strong prevention and exceptional reporting capabilities."
"I am told that we get over 100 million emails a month. This filters them down and allows only somewhere about three million emails, which is a great help."
"The most valuable feature at this moment is that Cisco AMP or Cisco Secure Endpoint solution is delivering a lot of things, and I always say to a lot of customers that if we didn't have Cisco AMP, we probably would have had ransomware somewhere. So, it's protecting us very well from a lot of hackers, malware, and especially ransomware."
"The most valuable feature is signature-based malware detection."
"The product itself is pretty reliable. The security features that it has make it reliable."
"We're very satisfied with Trend Micro support."
"Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level."
"The most valuable feature of Trend Micro Endpoint Encryption is security."
"The product's initial setup phase is easy, considering the management console and software."
"It's a secure and quick solution."
"Encryption is the basic feature, and that is what I like about it. I also like that it is kind of easy to install and easy to configure."
"We use the solution for data encryption."
"The disk encryption is great."
 

Cons

"It is an expensive solution."
"Due to the complexity of the technology that is used and its advanced threat detection capabilities, it is possible to encounter many delays in operation."
"The Linux agent is a simple offline classic agent, and it doesn't support Secure Boot, which is important to have on a Linux machine. The Linux agent has conflicts with other solutions, including the Exploit Prevention system found in Windows servers. We didn't find a fix during troubleshooting, and Cisco couldn't offer one either. Eventually, we had to shut down the Exploit Prevention system. We didn't like that as we always want a solution that can fit smoothly into the setup without causing problems, especially where security is concerned. The tool also caused CPU spikes on our production machine, and we were seriously considering moving to another product."
"The one challenge that I see is the use of multiple endpoint protection platforms. For instance, we have AMP, but we also have Microsoft Windows Defender, System Center Endpoint Protection, and Microsoft Malware Protection Engine deployed. So, we have a bunch of different things that do the same thing. What winds up happening is, e.g., if I get an alert for a potential incident or malware and want to pull the file, I'll go to fetch the file to analyze it. But, one of these other programs has already gotten it, so the file has already been quarantined by another endpoint protection system. AMP doesn't realize that and the file fetch fails, then you're left wondering what's going on."
"Its price is okay for us, but it can always be better. There's always room for improvement when it comes to pricing."
"On the firewall level, they were lagging a little bit behind, but they are running up again. I have full trust in the new 3000 series of firewalls where we would also be able to look more into the traffic that we're monitoring and get more security layers in our services. That would definitely be a big step."
"I would recommend that the solution offer more availability in terms of the product portfolio and integration with third-party products."
"In the next version of this solution, I would like to see the addition of local authentication."
"I would like to improve the solution's support."
"The user interface is a little challenging, especially for beginners. It's hard for new users to understand how to configure the correct access for each company function."
"Compared to Bitlocker or McAfee Disk Encryption, it's not quite as robust."
"It would be great if this solution had support for file integrity monitoring."
"Trend Micro Endpoint Encryption currently lacks something similar to a firewall that can detect any vulnerabilities."
"We would like to see a wider, better dashboard for the purposes of monitoring the users of the Trend Micro software."
"I would like to see more integration. Good cloud-based solutions need to be arrayed. I'd like to see better integration with administrative tools as well as Active Directory integration."
"There are recovery issues that arise."
 

Pricing and Cost Advice

"It is a subscription-based product."
"There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization."
"The solution's price is about the same as that of Palo Alto solutions."
"The price is very fair to the customer."
"I rate the pricing a five or six on a scale of one to ten, where one is expensive, and ten is cheap."
"The costs of 50 licenses of AMP for three years is around $9,360."
"The pricing and licensing of the security solutions of Cisco are very good in comparison with the competitors, but sometimes, it's difficult to see all the discounts and other kinds of things. So, you have to be careful, but the pricing is good."
"Cisco's pricing is reasonable. We also do not need to opt for niche players, which would have charged us significantly more than Cisco for ecosystem solutions. We are highly satisfied with the pricing structure of Cisco's solutions they are reasonable."
"The solution's licensing costs are yearly."
"You have to pay for the license annually."
"I rate the product price a seven on a scale of one to ten, where one is cheap, and ten is expensive."
"One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
"I rate the product price a six on a scale of one to ten, where one is high price, and ten is low price."
"The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems."
"We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
814,649 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
18%
Government
9%
Financial Services Firm
8%
Manufacturing Company
8%
Computer Software Company
14%
Government
13%
Financial Services Firm
10%
Real Estate/Law Firm
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
The solution's price is about the same as that of Palo Alto solutions.
What needs improvement with Cisco Secure Endpoint?
Cisco Secure Endpoint is an expensive solution.
What is your experience regarding pricing and costs for Trend Micro Endpoint Encryption?
Compared to other solutions, it's neither cheap nor expensive. It offers good value for what you're paying for.
What needs improvement with Trend Micro Endpoint Encryption?
There are issues like recovery that arise. We've managed to overcome them. In some instances where the system crashes, we attempt data recovery using the Microsoft version of Encryption, and it's e...
 

Also Known As

Cisco AMP for Endpoints
No data available
 

Learn More

Video not available
 

Overview

 

Sample Customers

Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
Find out what your peers are saying about Microsoft, SentinelOne, CrowdStrike and others in Endpoint Protection Platform (EPP). Updated: October 2024.
814,649 professionals have used our research since 2012.