TrustRadius: an HG Insights company

Cisco Secure Endpoint

Score8.8 out of 10

117 Reviews and Ratings

What is Cisco Secure Endpoint?

Cisco Secure Endpoint is a comprehensive, cloud-managed endpoint security solution designed to protect devices from advanced malware and cyber threats throughout the entire attack lifecycle—before, during, and after an attack. It offers powerful prevention capabilities to identify and stop threats before they compromise your systems, using multifaceted techniques including risk-based vulnerability management and posture assessments. The solution provides deep visibility and advanced detection through Endpoint Detection and Response (EDR) and integrated Extended Detection and Response (XDR) capabilities, enabling rapid threat hunting, investigation, and response with enriched global threat intelligence from Cisco Talos.

Cisco Secure Endpoint supports a wide range of devices including laptops, desktops, servers, mobile devices, and virtual workloads. It is a core component of Cisco’s broader security architecture, including the Breach Protection Suite and User Protection Suite, and is designed to simplify security operations while improving efficacy and resilience against evolving threats.


This solution is suitable for organizations seeking a unified, scalable endpoint security platform that combines prevention, detection, response, and expert-managed services to protect their endpoints and reduce risk effectively.


For customers evaluating endpoint security solutions, Cisco Secure Endpoint offers flexible licensing tiers (Essentials, Advantage, Premier) to fit different needs and budgets, with options to add advanced threat hunting and managed services.

Categories & Use Cases

Top Performing Features

  • Anti-Exploit Technology

    In-memory and application layer attack blocking (e.g. ransomeware)

    Category average: 8.9

  • Endpoint Detection and Response (EDR)

    Continuous monitoring and response to advanced internet threats by endpoint agents.

    Category average: 9.2

  • Malware Detection

    Detection and blocking of zero-day file and fileless malware.

    Category average: 9.1

Areas for Improvement

  • Infection Remediation

    Capability to quarantine infected endpoint and terminate malicious processes.

    Category average: 8.6

  • Vulnerability Management

    Vulnerability prioritization for fixes.

    Category average: 8.6

  • Hybrid Deployment Support

    Administrators should be able to choose endpoint security on-premise, cloud, or hybrid.

    Category average: 8.1

Effective Endpoint Protection With Cisco Secure Endpoint.

Use Cases and Deployment Scope

We're using this product to secure our business against sophisticated threats, including fileless malware, ransomware, and Cisco Secure Endpoint, which helps reduce breach incidents. With smooth, continuous monitoring, AI automated detection, and deep visibility across all our devices, Cisco Secure Endpoint effortlessly stops attacks before they happen and cause issues.

Pros

  • It comes with proactive threat detection and prevention.
  • Rapid remediation -EDR is very helpful and handles threats cyber threats causing harm.
  • It reduces cyber risks while ensuring compliance.
  • Comprehensive visibility is critical and works well.
  • It simplifies security management.

Cons

  • High system usages - it can sometimes cause sluggish in other applications.
  • High volume alerts - some which are unnecessary.

Return on Investment

  • By protecting our business from advanced cyber threats, we no longer worry about data loss or compromise, and therefore save money that would have been spent on data recovery.
  • It is a proactive threat protection solution and EDR capable, and it therefore detects and blocks threats before getting into our system, which is amazing - it gives us peace of mind, and we focus on other productive activities.
  • By ensuring our business is secure, we get to maintain our business reputation, which is critical to the success of any business - otherwise customers don't easily trust businesses that often suffer cyber data breaches.

Usability

Other Software Used

Google Workspace, Asana

A Reliable Endpoint Protection Tool.

Use Cases and Deployment Scope

We use Cisco Secure Endpoint company-wide to protect our devices against advanced threats, including malware and ransomware. What makes it effective is that it not only detects but also prevents and effectively responds to threats. It enables us to hunt threats, analyze threat patterns, and remediate threat incidents across all our business endpoints.

Pros

  • Comes with advanced malware and ransomware prevention.
  • It works well when it comes to endpoint detection and response.
  • Comes with great vulnerability management features.
  • Automated incidence response works well and enhances security of our endpoints.
  • It protects our remote workforce which is a plus.

Cons

  • It is a high resource consuming security solution.
  • System slowdowns.
  • Not the most affordable option.

Return on Investment

  • Cisco Secure Endpoint increases visibility into threats on our endpoints, thereby reducing the risk of threat infestation.
  • By automatically responding to threats, the tool protects our data and workforce in a timely manner.
  • It includes reporting features that help our teams investigate threats more thoroughly and take appropriate action.

Usability

Other Software Used

Google Cloud AI, Google Gemini, Microsoft SharePoint

Strong Endpoint Protection for Semiconductor Manufacturing with Room for Usability Improvement.

Use Cases and Deployment Scope

We use Cisco Secure Endpoint to protect engineering workstations and production systems. It prevents malware and ransomware, secures intellectual property, and enables fast threat response, ensuring uninterrupted operations across factory floors, labs, and remote teams.

Pros

  • Tracks file movement across endpoints.
  • Shows full attack path on a machine.
  • Flags threats after initial clearance.
  • Detects suspicious activity patterns.

Cons

  • Cluttered UI/UX.
  • Limited visibility when endpoints are offline.

Return on Investment

  • Reduce downtime from ransomware attacks.
  • Protection of high-value semiconductor IP and design data.
  • Improved SOC efficiency through centralized endpoint visibility.

Usability

Other Software Used

Cisco Secure Firewall, Wrike

Keeps the Employees Device Secure 24/7

Use Cases and Deployment Scope

In our organization we use Cisco Secure Endpoint to secure and protect employee devices from malware, ransomware and zero day threat. As a sales person am able to focus on clients without interruptions. Its real-time alerts, automated protection and ease of reporting gives me confidence with my data and our deals.

Pros

  • Offers reliable threat protection.
  • Real-time threat and system visibility.
  • User friendly interface.
  • Automated threat remediation.

Cons

  • False positives
  • Initial learning curve.

Return on Investment

  • Enhances business continuity plan.
  • Reduce operational downtime.
  • Enhances regulatory compliance.
  • Supports productivity.

Usability

Other Software Used

Webex Events (formerly Socio), Wrike

Protects Your Endpoint Security and Prevent Data Loss.

Use Cases and Deployment Scope

Cisco Secure Endpoint acts as our endpoint security solution. Offers visibility into our systems, allowing us to know what is happening to remote or disconnected endpoints. It helps protect end-user devices, virtual workloads, servers, and systems from cyberattacks. We find it smooth as it supports different operating systems.

Pros

  • Threat response automation.
  • Threat detection and elimination.
  • Anti- exploit and behavior protection.
  • Malware detection.

Cons

  • High resource usage, CPU and Memory.

Return on Investment

  • Enhance visibility.
  • Risk reduction.
  • Improvement on security efficacy.
  • Reduced system downtime.

Usability

Other Software Used

Webex Events (formerly Socio), Threatspy, FortiSOAR, Splunk SOAR