Cisco Vulnerability Management vs. Microsoft Defender for Endpoint

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Cisco Vulnerability Management
Score 8.4 out of 10
N/A
Cisco Vulnerability Management (formerly Kenna.VM by Kenna Security, which was acquired by Cisco in June of 2021), is a vulnerability management platform featuring real-time cyber-risk analysis and predictive modeling based on intelligence feeds and global attack telemetries to provide accurate, reliable risk prioritization and protection.N/A
Microsoft Defender for Endpoint
Score 8.8 out of 10
N/A
Microsoft Defender for Endpoint (formerly Microsoft Defender ATP) is a holistic, cloud delivered endpoint security solution that includes risk-based vulnerability management and assessment, attack surface reduction, behavioral based and cloud-powered next generation protection, endpoint detection and response (EDR), automatic investigation and remediation, managed hunting services, rich APIs, and unified security management.
$2.50
per user/per month
Pricing
Cisco Vulnerability ManagementMicrosoft Defender for Endpoint
Editions & Modules
No answers on this topic
Academic
$2.50
per user/per month
Standalone
$5.20
per user/per month
Offerings
Pricing Offerings
Cisco Vulnerability ManagementMicrosoft Defender for Endpoint
Free Trial
NoYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Cisco Vulnerability ManagementMicrosoft Defender for Endpoint
Features
Cisco Vulnerability ManagementMicrosoft Defender for Endpoint
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
Cisco Vulnerability Management
8.7
2 Ratings
8% above category average
Microsoft Defender for Endpoint
-
Ratings
Network Analytics7.31 Ratings00 Ratings
Threat Recognition10.01 Ratings00 Ratings
Vulnerability Classification9.32 Ratings00 Ratings
Automated Alerts and Reporting7.32 Ratings00 Ratings
Threat Analysis7.32 Ratings00 Ratings
Threat Intelligence Reporting10.01 Ratings00 Ratings
Automated Threat Identification10.01 Ratings00 Ratings
Vulnerability Management Tools
Comparison of Vulnerability Management Tools features of Product A and Product B
Cisco Vulnerability Management
9.3
2 Ratings
11% above category average
Microsoft Defender for Endpoint
-
Ratings
IT Asset Realization9.32 Ratings00 Ratings
Configuration Monitoring9.32 Ratings00 Ratings
Vulnerability Intelligence9.32 Ratings00 Ratings
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
Cisco Vulnerability Management
-
Ratings
Microsoft Defender for Endpoint
8.7
78 Ratings
2% above category average
Anti-Exploit Technology00 Ratings8.975 Ratings
Endpoint Detection and Response (EDR)00 Ratings9.177 Ratings
Centralized Management00 Ratings8.777 Ratings
Hybrid Deployment Support00 Ratings7.210 Ratings
Infection Remediation00 Ratings9.075 Ratings
Vulnerability Management00 Ratings8.672 Ratings
Malware Detection00 Ratings9.276 Ratings
Best Alternatives
Cisco Vulnerability ManagementMicrosoft Defender for Endpoint
Small Businesses
Action1
Action1
Score 9.5 out of 10
ThreatLocker
ThreatLocker
Score 9.2 out of 10
Medium-sized Companies
Action1
Action1
Score 9.5 out of 10
BlackBerry Protect (CylancePROTECT)
BlackBerry Protect (CylancePROTECT)
Score 9.1 out of 10
Enterprises
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 10.0 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Cisco Vulnerability ManagementMicrosoft Defender for Endpoint
Likelihood to Recommend
10.0
(1 ratings)
9.0
(133 ratings)
Likelihood to Renew
-
(0 ratings)
8.4
(10 ratings)
Usability
10.0
(1 ratings)
8.6
(10 ratings)
Availability
-
(0 ratings)
9.1
(1 ratings)
Performance
-
(0 ratings)
9.1
(1 ratings)
Support Rating
-
(0 ratings)
9.0
(7 ratings)
Implementation Rating
-
(0 ratings)
7.3
(1 ratings)
Configurability
-
(0 ratings)
8.2
(1 ratings)
Product Scalability
-
(0 ratings)
9.1
(1 ratings)
User Testimonials
Cisco Vulnerability ManagementMicrosoft Defender for Endpoint
Likelihood to Recommend
Cisco
It works well when interfacing with Qualys VM QualysGuard to highlight server vulnerabilities, providing details on the affected packages and programs, along with solutions and links to the provider's websites, so our servers can be kept safe by quickly addressing issues. Because vulnerability scores are assigned, we can prioritize which servers to address first.
Read full review
Microsoft
I can definitely tell you where it’s more suited, because we haven’t come across any less appropriate scenarios. But definitely in regard to how we centrally manage our user space and our endpoints, it’s been beneficial from an API perspective and is really transferable, with strong collaboration with our Azure stack. It works very well.
Read full review
Pros
Cisco
  • Vulnerability tracking
  • Risk Meter reporting to pinpoint specific systems or vulnerabilities
  • Provides vulnerability scores to see what is high / medium / low urgency
Read full review
Microsoft
  • Definitely on the threat action and response. We didn't have a stress-response option before, but the dependent brand point provided it instantly. Also, it's doing UVA and machine learning, which we didn't have before. So it's definitely providing more sophisticated threat-detection capabilities than we had before.
Read full review
Cons
Cisco
  • The layout of the information could use some improvement.
Read full review
Microsoft
  • The only thing is sometimes, because Microsoft has so many platforms, it gets a little confusing, like am I in the security platform? Am I in Purview? Where am I at right now? Because there's so many sites that are kind of doing a lot of the same thing, and so that does get a little confusing from time to time, but outside of that, it's a pretty good product.
Read full review
Likelihood to Renew
Cisco
No answers on this topic
Microsoft
Cost add-ons for Security features is nickel and diming the process to keep pace with cybercrime. Limited Education budgets require us to be more pro-active in finding cost-effective measures to protect our devices, staff and students. Defender is a strong, well-featured product that is pricing itself out of the education market
Read full review
Usability
Cisco
CVM provides a very easy to understand and use interfaces. Dashboards and reporting are compiled nicely when risk meters are created. After initial setup of software cisco onboarding teams do an amazing job going over all areas of this software to provide best overall usability of the product. Against other tools setup and usability is at a higher standard
Read full review
Microsoft
Microsoft Defender for Endpoint is a great EDR to have that works quickly and silently in the background and it integrates well with other Microsoft services. As an IT manager, I can appreciate that I do not get bombarded by alerts for every small detail. On the flipside, the management site can use some work in being more clear and should be more streamlined so I'm not clicking through multiple pages to figure out what happened
Read full review
Reliability and Availability
Cisco
No answers on this topic
Microsoft
Microsoft Defender for Endpoint chugs along just fine no matter what we throw at it and what systems it's running on. It doesn't take up a lot of resources either, so that's welcomed.
Read full review
Performance
Cisco
No answers on this topic
Microsoft
Microsoft Defender for Endpoint is easy on memory and resources on clients.
Read full review
Support Rating
Cisco
No answers on this topic
Microsoft
The first time I tried to onboard my macOS endpoints to MDE I struggled for quite a bit. I had to reach out to Microsoft's MDE support team. The tech was very helpful in walking me through the steps during a screen share session
Read full review
Implementation Rating
Cisco
No answers on this topic
Microsoft
Deployment was handled by our team here and everything went pretty smoothly. We did have a few hiccups in our test group, but that only took a bit to get ironed out.
Read full review
Alternatives Considered
Cisco
We run a flavor of multiple products and CVM enhances/complements those tools by pinpointing where the vulnerabilities are at on our network. Intune and Automox being products CVM works well with when its time to patch affected systems. Tenable we used prior to CVM and its product was too complex and clunky and always had issues with asset duplication. CVM simplified vulnerability scanning and made it a lot easier to manage compared to Tenable
Read full review
Microsoft
Previously, we've used Sophos. We've used, way back when, McAfee, Norton, Symantec, all those. And we finally settled on Microsoft Defender for Endpoint. We're a Microsoft technology stack shop. So obviously it was natural. It's built into Windows, so we're not adding additional agents. Some of the other vendors and their agents, for a while, would compete with CPU usage. And so it actually slowed down the machines. Because Microsoft Defender for Endpoint is built into the Windows product, Microsoft is going to ensure that it does not affect the other productivity tools that a user may use.
Read full review
Scalability
Cisco
No answers on this topic
Microsoft
Microsoft Defender for Endpoint is easily scaled from small orgs to giant enterprises.
Read full review
Return on Investment
Cisco
  • Has kept our company safe from exploits.
Read full review
Microsoft
  • Reduced incidents of security breaches lead to lower remediation costs and avoid potential financial losses and reputational damage.
  • Reduces the need for additional third-party security solutions and training, thereby lowering overall security management costs.
  • Increased efficiency and productivity of IT staff lead to better allocation of resources and cost savings.
  • Reduces the risk of fines and sanctions associated with non-compliance, ensuring business continuity and protecting revenue.
Read full review
ScreenShots

Microsoft Defender for Endpoint Screenshots

Screenshot of blocked activitiesScreenshot of Detects & respondsScreenshot of discovers vulnerabilityScreenshot of Eliminates blind spotsScreenshot of Risk management