Likelihood to Recommend Cisco Secure Endpoint is well suited for keeping track of the many different and points that we have in our organization. All of these devices can easily be monitored with Cisco Secure Endpoint. It can monitor our servers and our desktops and laptops in our environment. It isn’t as appropriate for our student devices. However, those aren’t as critical since they are just Chromebooks.
Read full review With around 80 users and 150 devices (including 6 server instances), this solution served us very well, with instant admin notifications and scheduled overall reports. Detection appears extremely reliable, and the memory and CPU footprint of the service seemed less intrusive than Panda, which we had issues running on Terminal Services instances, as it seems to hog excessive memory allocation. Rollout was smooth and we never had an instance of a corrupt installation.
Read full review Pros Once we, I guess one turned out that path because we have a small IT team, one of the big factors that came into play is how easy it was to deploy and the kind of security it provides for your endpoint devices. For us, it's got all those AI capabilities that really help. So traditionally when there was an incident on Alert on an antivirus program, you'd have a couple of guys run across the office to try to pull a plug. One of the awesome features with Secure Endpoint is its isolation mode that clamps down endpoint devices and then just isolate it. It's connected to, I think Cisco's tell us the threat intel environment. So they've got up-to-date metrics and fixes on threats out in the wild. And once they detect that, they apply it across your whole brand. So yeah, really effective for us. One of the things that really stands out is the retrospective detections. So say something's detected two weeks later of a product that you had on your system. Initially it scanned it past, but then they discover vulnerability. The product has the ability to come back and retrospectively apply restrictions on specific applications you have on your environment. So I think that's one key winner. Read full review Hybrid deployment, can be on-prem or cloud specific, we are using cloud based Central Control Manager capabilities to have control about what happens in the environment No need to have internal infrastructure to host further than your workstations or terminals No need to have dedicated team for security or endpoint protection Maintenance and updates are available just as released, no need to take actions on that side Great capabilities as a connected threat defense platform Endpoint protection features and quality for SMBs Cloud and collaboration platforms compatible including Office 365, Google Mail and On-Cloud Storage Read full review Cons The interface has many views that all look the same, except that functionalities are different. This makes it incredibly difficult to find the action you want to take. Built-in exclusion sets are missing a number of notable Anti-Malware products and must be manually implemented. High learning curve due to complexity of the solution and the range of features it contains. Provided documentation is hidden in a small icon at the top of the page which is often off-screen when needed. Color choices lead to panic situations during deployment. 1 questionable file could lead to the main display showing a large, bright red alert which makes customers think their whole environment is compromised. Read full review It would be better if there were an unload password for each policy instead of one for the whole organization. We have one app that gets blocked with no log of any reason why, there should be a better way to troubleshoot that other than just closing the AV every time. Allow listing has not worked in this case. When something is blocked it should specify exactly which setting or feature blocked it to make it easier to use the allow list or adjust. Read full review Likelihood to Renew the renewal must be studied with different factors
Read full review Usability AMP is very difficult to use compared to other products we've seen. It's hard to understand why there are so many different logins for the various products that supposedly integrate with AMP. We had weekly phone calls for months to implement the product yet none of the IT department really enjoys using this product or feels comfortable with the accuracy of detections. The number of false positives is high.
Read full review Installation and administration tools are fantastic. I found the endpoint policies to be not intuitive and clunky. The endpoint client was difficult to disable when trying to troubleshoot Apple issues and I often had to uninstall and then reinstall which was very time-consuming. Reporting is very useful and I was impressed with the reports I received.
Read full review Reliability and Availability no complain and no issue with availability
Read full review Support Rating In terms of technical support for Cisco Secure Endpoint, the support has been pretty good. All the cases I submitted were solved in a reasonable time frame, and it was a good experience. However, I find that not as many vendors have the expertise I would expect.
Read full review The few times I needed to contact support I was fully satisfied. They worked all the way through the issue, no matter how long it took, and made sure I had a permanent solution. I was pleased with the professionalism, courteousness, and knowledge of the product they were supporting.
Read full review Implementation Rating no participation in implementation
Read full review Alternatives Considered Cisco Secure Endpoint is an advanced EDR solution that is highly effective and scalable. Our experience previously with MalwareBytes and Microsoft Defender was not horrible, but these products were not as effective and did not integrate well with our other security products to allow us to monitor and react quickly to address threats that were within our network. Key to any security effort is mitigation and the ability to quickly identify and respond so any damage can be avoided or limited.
Read full review Avast was clunky, difficult to roll out, missed loads of malware on machines, and required that we purchase a separate license to install AV on our servers. Trend Micro could not have been any different. You just contact their sales department and get a demo, or even ask for a trial of sorts to test policy creations and client installation. You'll be obsessed with the whole process and the admin dashboard you have access to.
Read full review Return on Investment AMP has been able to catch some serious infections and stop them from doing huge damage in our environment. The overall cost of AMP vs the cost of not having this protection and getting hit with malware, or other nefarious damage to your environment is well worth the money. Read full review It has stopped several malicious items from getting into our system. It's also saved money over our previous Anti-Virus solution (Kaspersky) Ease of Setup/Use Read full review ScreenShots