Cisco Vulnerability Management vs. Microsoft Defender for Cloud

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Cisco Vulnerability Management
Score 8.4 out of 10
N/A
Cisco Vulnerability Management (formerly Kenna.VM by Kenna Security, which was acquired by Cisco in June of 2021), is a vulnerability management platform featuring real-time cyber-risk analysis and predictive modeling based on intelligence feeds and global attack telemetries to provide accurate, reliable risk prioritization and protection.N/A
Microsoft Defender for Cloud
Score 8.5 out of 10
N/A
Microsoft Defender for Cloud is a Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP) for Azure, on-premises, and multicloud (Amazon AWS and Google GCP) resources.N/A
Pricing
Cisco Vulnerability ManagementMicrosoft Defender for Cloud
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Cisco Vulnerability ManagementMicrosoft Defender for Cloud
Free Trial
NoYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Features
Cisco Vulnerability ManagementMicrosoft Defender for Cloud
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
Cisco Vulnerability Management
8.7
2 Ratings
8% above category average
Microsoft Defender for Cloud
-
Ratings
Network Analytics7.31 Ratings00 Ratings
Threat Recognition10.01 Ratings00 Ratings
Vulnerability Classification9.32 Ratings00 Ratings
Automated Alerts and Reporting7.22 Ratings00 Ratings
Threat Analysis7.22 Ratings00 Ratings
Threat Intelligence Reporting10.01 Ratings00 Ratings
Automated Threat Identification10.01 Ratings00 Ratings
Vulnerability Management Tools
Comparison of Vulnerability Management Tools features of Product A and Product B
Cisco Vulnerability Management
9.3
2 Ratings
11% above category average
Microsoft Defender for Cloud
-
Ratings
IT Asset Realization9.32 Ratings00 Ratings
Configuration Monitoring9.32 Ratings00 Ratings
Vulnerability Intelligence9.32 Ratings00 Ratings
Best Alternatives
Cisco Vulnerability ManagementMicrosoft Defender for Cloud
Small Businesses
Action1
Action1
Score 9.5 out of 10

No answers on this topic

Medium-sized Companies
Action1
Action1
Score 9.5 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Enterprises
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Cisco Vulnerability ManagementMicrosoft Defender for Cloud
Likelihood to Recommend
10.0
(1 ratings)
8.1
(56 ratings)
Likelihood to Renew
-
(0 ratings)
8.9
(4 ratings)
Usability
10.0
(1 ratings)
8.2
(2 ratings)
User Testimonials
Cisco Vulnerability ManagementMicrosoft Defender for Cloud
Likelihood to Recommend
Cisco
It works well when interfacing with Qualys VM QualysGuard to highlight server vulnerabilities, providing details on the affected packages and programs, along with solutions and links to the provider's websites, so our servers can be kept safe by quickly addressing issues. Because vulnerability scores are assigned, we can prioritize which servers to address first.
Read full review
Microsoft
Microsoft is well-suited with its definitive cloud, and I also like its Microsoft Intune ID. The conditional policies are great with that, and they're really good and well situated, so you can't beat them at that conditional policy level. Less appropriate, as I said, some of these low-hanging fruit features, like being good in phishing campaigns, and then I feel like maybe doing better at their seam products. So we'll see how that goes.
Read full review
Pros
Cisco
  • Vulnerability tracking
  • Risk Meter reporting to pinpoint specific systems or vulnerabilities
  • Provides vulnerability scores to see what is high / medium / low urgency
Read full review
Microsoft
  • I like that with Microsoft Defender for Cloud you can track your secure score to see how well you are doing with your security controls.
  • There are remediation steps for findings with the platform and some can be fix automatically with a few clicks.
  • There are recommendations for exactly what controls to put in place to ensure a more secure environment for Azure.
Read full review
Cons
Cisco
  • The layout of the information could use some improvement.
Read full review
Microsoft
  • Granular permissions and role-based access management could improve security. This would enable organizations to control who has access to and can set specific features.
  • While it offers integration with various Microsoft services, expanding support for third-party cloud platforms and applications would enhance its versatility. Many organizations use multiple cloud providers, and broader compatibility would be advantageous.
  • The cost structure could be more transparent, especially for larger organizations with extensive cloud resources. Clearer cost breakdowns and predictions would help organizations budget more effectively.
Read full review
Likelihood to Renew
Cisco
No answers on this topic
Microsoft
It is a great product that integrates nicely when running an Azure platform and even multi-cloud environment. Not looking for point-solutions but a suite that answers most requirements. It is very comfortable being able to use KQL, workbooks and automation that is native to the azure platform
Read full review
Usability
Cisco
CVM provides a very easy to understand and use interfaces. Dashboards and reporting are compiled nicely when risk meters are created. After initial setup of software cisco onboarding teams do an amazing job going over all areas of this software to provide best overall usability of the product. Against other tools setup and usability is at a higher standard
Read full review
Microsoft
My visibility is limited because I'm only doing very small pieces of what the overall org does. And also, we have limitations on what we're allowed to use. It's not like we get a new product as users or leadership level users, and everything is on, and we can just do whatever we want. We're very restricted in what we can use any tooling within the org because of the different levels of regulatory constraints we have, because of just the nature of who we are inherently. So that's why. I don't think it's necessarily the product. I think it's more or less of what we're able to do with the product.
Read full review
Alternatives Considered
Cisco
We run a flavor of multiple products and CVM enhances/complements those tools by pinpointing where the vulnerabilities are at on our network. Intune and Automox being products CVM works well with when its time to patch affected systems. Tenable we used prior to CVM and its product was too complex and clunky and always had issues with asset duplication. CVM simplified vulnerability scanning and made it a lot easier to manage compared to Tenable
Read full review
Microsoft
Microsoft Defender for Cloud is definitely the choice with the latest market trend and attacks that are currently happening. Microsoft has been able to safe guard a lot after the recent serious attacks happening globally in the digital world. There is a trust in this software and with the latest updates and machine learning capabilities, Microsoft Defender for Cloud should be the choice.
Read full review
Return on Investment
Cisco
  • Has kept our company safe from exploits.
Read full review
Microsoft
  • It simplifies security management and saves time. I'm not sure, but I'm very confident it saved me a couple of paychecks by centralizing the data I need to secure the cloud environment.
  • I also utilize the inventory overview to monitor my team's activities and verify they are following internal regulations, as well as cost overruns.
  • The recommendations can be utilized as a valuable instructional tool. I have the team explain why they are receiving them, why they are not following them, and what they are doing differently.
Read full review
ScreenShots

Microsoft Defender for Cloud Screenshots

Screenshot of Remediation of critical issues in codeScreenshot of Cloud security benchmark mapped to industry FramworksScreenshot of Prioritization of critical risks with contextual threat analysisScreenshot of Workload protectionScreenshot of Unified DevOps VisibilityScreenshot of Visualizations to improve security posture proactively