Try our new research platform with insights from 80,000+ expert users

Cisco SecureX [EOL] vs Pentera comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Cisco SecureX [EOL]
Average Rating
9.0
Number of Reviews
13
Ranking in other categories
No ranking in other categories
Pentera
Average Rating
8.0
Number of Reviews
8
Ranking in other categories
Vulnerability Management (12th), Penetration Testing Services (1st), Breach and Attack Simulation (BAS) (1st)
 

Featured Reviews

Alon K - PeerSpot reviewer
Aug 5, 2022
Gives our customers visibility and they don't have to go multiple management consoles anymore
One of the examples is related to forensics. The forensics are amazing because when you have enrichment, and the solutions talk with each other, when you need it, you have the ability to know everything in the organization: when, why, whatever. With just one click you have information from email, from the endpoint, from the web. Let's say that tomorrow morning, you have a ransom[ware] attack in your organization and you would like to know from which email it came, or where the customer saved the file, even though the incident didn't occur at the same moment. With SecureX, you have Cisco Threat Response inside. [With] one click, you get all of the flow. That's amazing value. That also releases resources for our customers. The customers don't have to connect many systems and try to register the event on each system, or to go to the SIEM and do a correlation. That's the one-stop shop for the customers, and that's amazing.
Richard Marlow - PeerSpot reviewer
Jun 18, 2024
Provides good features and helps monitor the status of ransomware protection in an organization
We used the solution for password strength assessments, ransomware testing, and automated penetration testing The tool helped us discover that we were using an outdated network protocol, NTLM. The password strength assessments feature was valuable. The testing features are fantastic. The tool…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The forensics are amazing because when you have enrichment, and the solutions talk with each other, when you need it, you have the ability to know everything in the organization: when, why, whatever."
"It has evolved a lot, just that monitoring piece to the current Orchestrator piece. The additional analytics are there. They now have something called Insight, which can basically take data from Microsoft Azure AD and Intune to give us information about our endpoints. This is detailed information about the endpoints, from Secure Endpoint and all these different products. So, it is just constantly evolving. Every time that it evolves, we have more information with more visibility. There are more features that we have that just make everything so much easier, and it is in one place. I don't have to keep going back and forth. I don't have to go to Secure Endpoint and ISE to get the data. I don't have to go to Intune on Microsoft to get the information. It is all in one place."
"Our customers find the product's third-party integrations valuable. Our customers are also impressed with the tool's capability to pick up third-party threat feeds and use that as part of the decision-making process."
"Using SecureX, a tool provided by Cisco, we can easily integrate it with many of our other Cisco products such as Cisco ISE and many networking devices."
"One of the most valuable features is the simplicity of deploying SecureX. It's very easy to do that and then you gain very detailed visibility into everything that's going on in your network and, obviously, at the device level. There's just a wealth of information that you can pull from all of these products that are part of SecureX. You know exactly if you have an issue or not."
"The automation and orchestration tools are the most valuable features."
"I like that I don't have to jump around to five different products and log into five different places to view the data that it returns."
"The most valuable feature is its ability to manage all the applications and visibility. For example, if there is malware, spam, or another component that wants to attack the company in my servers, network, or applications, then SecureX will react to the problem."
"The most valuable feature of Pentera is that you can do continuous vulnerability assessment, which is automated."
"Maybe there are some remediation steps on the website, we can mask sensitive information on the website better."
"The solution is SaaS-based. From a cloud perspective, it has Pentera Surface and Pentera Core. The Core is the on-prem deployed solution, while the Surface is the cloud-hosted solution that scans your public infrastructure. From the Surface perspective, the most valuable feature so far has been the attack surface mapping."
"The platform's most valuable features are credential management and vulnerability management."
"What I like the most about Pentera is its solution-oriented approach."
"The product is easy to use."
"The vulnerability scanner, exploit achievements, and remediation actions are all great."
"The tool showed us that our ransomware protection wasn’t working on some machines."
 

Cons

"what's missing right now is the multi-tenant capability."
"For us, the biggest sticking point is that the product is not being designed for multi-tenancy use at present, from an MSP perspective."
"I would like it to integrate with another solution, e.g., DNA. I would like it to connect to that solution, but not the security aspect."
"The front-end work controls the new algorithm and the firewall rules. The search feature of these rules could be improved."
"The documentation can be improved and the on-prem integration. The set of applications that it was integrated with wasn't comprehensive."
"They could expand into more areas. The more third-parties that we have tied into it, the better. The capabilities are there. As they just continue to involve the product, the more things that you can look into, then the more analytics that you can get. Also, the more data that we can get, then the better off we will be."
"The automation and orchestration could be simpler. It could be that all the other parts are that easy to use so that these stick out as a negative, but that's the trickiest part for us. The workflows within the orchestration are just a bit more difficult."
"The playbooks provided with the product are great, although I would appreciate having more playbooks available. Threats are constantly evolving, so having access to updated playbooks is crucial."
"The vulnerability scanner, exploit achievements, and remediation actions are all great."
"There is room for improvement in virtualization compatibility."
"Pentera's general dashboards could be improved and made more specific in terms of vulnerabilities that I'm discovering."
"The price could be improved."
"The automated penetration testing features must be improved."
"One of the big issues we have is that the tool has an additional license for compromised credentials. Suppose compromised credentials for any of your domains appear in leaks, dumps, or are being sold. In that case, they try to aggregate that data and highlight that, for example, ten users appeared in recent dumps as compromised credentials. However, they don't provide much information about where those compromises came from or their source information, probably to protect their sources."
"One area for product improvement could be the inclusion of a dashboard to cover multiple branches and subsidiaries, allowing for centralized monitoring."
"Maybe scalability. I know that the Pentera right now is high level in order to scan big deals over 500 IPs and not less, and not less. That can be more granular. This will be useful."
 

Pricing and Cost Advice

"The pricing is the best part of this solution. It is free if you buy Umbrella or Duo Security. It is also a good solution."
"Cisco SecureX is more expensive than Trend Micro. However, considering the integration capabilities with other solutions and the quality of technical support, I believe there's justification for the price difference."
"For the value you get, the pricing of the solution is excellent."
"It would be nice if they had a different pricing model. Most of our budget for projects goes towards Cisco."
"The product is absolutely free to any customer. As such, the only thing one must keep in mind is that as long as he already has one Cisco security product, irregardless of what that product is, SecureX is available for free."
"It is free. It can't get any better than that."
"You can spend less money for another solution, but if you really want to have a good solution you have to pay. We are happy that we are getting such a good solution for what we are spending."
"The pricing is competitive, especially for education institutions. Licensing can be a little bit difficult to navigate, especially with resellers with Cisco, but for us it has been pretty easy."
"We have to pay a yearly licensing cost for Pentera."
"The tool is relatively cheap."
"It's not that expensive, but it could be more cost-effective."
"The product's cost is reasonable. I rate the pricing a three out of ten."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
815,854 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
40%
Financial Services Firm
7%
Manufacturing Company
6%
Government
5%
Financial Services Firm
14%
Computer Software Company
14%
Manufacturing Company
8%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Ask a question
Earn 20 points
What do you like most about Pentera?
What I like the most about Pentera is its solution-oriented approach.
What needs improvement with Pentera?
One area for product improvement could be the inclusion of a dashboard to cover multiple branches and subsidiaries, allowing for centralized monitoring.
What is your primary use case for Pentera?
Our customers use the product to validate their security environment, ensuring that vulnerabilities within the network are identified and addressed.
 

Also Known As

Kenna.AppSec, Kenna.VI
No data available
 

Learn More

 

Overview

 

Sample Customers

NHS, Rackspace, UNC Pembroke, University of North Carolina at Charlotte, Missing Piece
Blackstone Group Caterpillar Apria Healthcare Taylor Vinters Sandler Capital Management Drawbridge BNP Paribas British Red Cross
Find out what your peers are saying about Tenable, Qualys, Wiz and others in Vulnerability Management. Updated: October 2024.
815,854 professionals have used our research since 2012.