TrustRadius: an HG Insights company

Cisco Secure Endpoint

Score8.7 out of 10

113 Reviews and Ratings

What is Cisco Secure Endpoint?

Cisco Secure Endpoint is a comprehensive, cloud-managed endpoint security solution designed to protect devices from advanced malware and cyber threats throughout the entire attack lifecycle—before, during, and after an attack. It offers powerful prevention capabilities to identify and stop threats before they compromise your systems, using multifaceted techniques including risk-based vulnerability management and posture assessments. The solution provides deep visibility and advanced detection through Endpoint Detection and Response (EDR) and integrated Extended Detection and Response (XDR) capabilities, enabling rapid threat hunting, investigation, and response with enriched global threat intelligence from Cisco Talos.

Cisco Secure Endpoint supports a wide range of devices including laptops, desktops, servers, mobile devices, and virtual workloads. It is a core component of Cisco’s broader security architecture, including the Breach Protection Suite and User Protection Suite, and is designed to simplify security operations while improving efficacy and resilience against evolving threats.


This solution is suitable for organizations seeking a unified, scalable endpoint security platform that combines prevention, detection, response, and expert-managed services to protect their endpoints and reduce risk effectively.


For customers evaluating endpoint security solutions, Cisco Secure Endpoint offers flexible licensing tiers (Essentials, Advantage, Premier) to fit different needs and budgets, with options to add advanced threat hunting and managed services.

Categories & Use Cases

Top Performing Features

  • Malware Detection

    Detection and blocking of zero-day file and fileless malware.

    Category average: 9.1

  • Endpoint Detection and Response (EDR)

    Continuous monitoring and response to advanced internet threats by endpoint agents.

    Category average: 9.1

  • Anti-Exploit Technology

    In-memory and application layer attack blocking (e.g. ransomeware)

    Category average: 8.8

Areas for Improvement

  • Vulnerability Management

    Vulnerability prioritization for fixes.

    Category average: 8.6

  • Centralized Management

    Centralized management supporting multi-factor authentication, customized views, and role-based access control.

    Category average: 8.7

  • Hybrid Deployment Support

    Administrators should be able to choose endpoint security on-premise, cloud, or hybrid.

    Category average: 8.1

A Reliable Endpoint Protection Tool.

Use Cases and Deployment Scope

We use Cisco Secure Endpoint company-wide to protect our devices against advanced threats, including malware and ransomware. What makes it effective is that it not only detects but also prevents and effectively responds to threats. It enables us to hunt threats, analyze threat patterns, and remediate threat incidents across all our business endpoints.

Pros

  • Comes with advanced malware and ransomware prevention.
  • It works well when it comes to endpoint detection and response.
  • Comes with great vulnerability management features.
  • Automated incidence response works well and enhances security of our endpoints.
  • It protects our remote workforce which is a plus.

Cons

  • It is a high resource consuming security solution.
  • System slowdowns.
  • Not the most affordable option.

Return on Investment

  • Cisco Secure Endpoint increases visibility into threats on our endpoints, thereby reducing the risk of threat infestation.
  • By automatically responding to threats, the tool protects our data and workforce in a timely manner.
  • It includes reporting features that help our teams investigate threats more thoroughly and take appropriate action.

Usability

Other Software Used

Google Cloud AI, Google Gemini, Microsoft SharePoint

This is an Accurate Endpoint Protection Solution that Fastens Threat Containment

Use Cases and Deployment Scope

Cisco Secure Endpoint is an accurate, easy to implement and dependable endpoint protection solution that fastens the containment of threats in our company. It has powerful capabilities that give us a clear visibility into all our organization's endpoints. It has advanced ransomware and malware protection features that detect threats in real time. Furthermore, it is a reliable and accurate tool when it comes to investigating threats and monitoring endpoint behavior. I like Cisco Secure Endpoint's features due to their simplicity.

Pros

  • Cisco Secure Endpoint Fastens the Containment of Threats
  • Cisco Secure Endpoint Monitors Endpoint Behavior in Real Time and Offers Accurate Analytics
  • It Responds Faster and More Accurate to Incidents and Threats

Cons

  • The alert noise of Cisco Secure Endpoint may cause disruptions at the workplace.
  • Without proper integration, the cross-product visibility may be a challenge.

Return on Investment

  • It gives us an advanced visibility into our endpoints.
  • This is a friendly and accurate tool that accelerates threats containment and gives us a secure work environment.
  • It minimizes the risk of threats and phishing.

Usability

Other Software Used

Black Box Communications Outsourcing, Smartsheet, Forward Enterprise

Better Threat Prevention and Detection With Cisco Secure Endpoint

Use Cases and Deployment Scope

We use Cisco Secure Endpoint to secure our devices and endpoints from advanced cybersecurity threats. This comprehensive security platform is deployed company-wide and is very effective when it comes to preventing, detecting, and responding to threats. It is very accurate, fast, and it also makes threat hunting and management easy. With Cisco Secure Endpoint, we no longer worry about endpoint threats thanks to continuous monitoring and the fast that the tool enhances our visibility and control.

Pros

  • It makes prevention, detection and response to cyberattacks easy.
  • It offers great protection to all devices.
  • Offers better visibility and control.
  • It greatly reduces risk of cyberattacks.
  • Comes with great analytics and intelligence capabilities.

Cons

  • False positives when it comes to malware detection.
  • The User Interface could be improved.

Return on Investment

  • It gives us complete visibility and control of our endpoints.
  • It handles the difficult task of protecting our endpoints while we focus on other important issues.
  • It has greatly reduces our endpoint threats.

Usability

Other Software Used

Sophos Email, Citrix DaaS

A Superlative Efficacious and Stellar Endpoint Security Tool.

Use Cases and Deployment Scope

I'm delighted that Cisco Secure Endpoint offers end-to-end security visibility across our organization's endpoints. It's simple to detect, investigate, and respond to security threats across our endpoints with Cisco Secure Endpoint. It's easier to identify and remediate security vulnerabilities across our endpoints with this tool. Finally, Cisco Secure Endpoint enhances proactive threat hunting.

Pros

  • Automated threat detection and response.
  • Endpoint protection.
  • Real-time threat hunting.
  • Vulnerability management.
  • Anti-malware and anti-virus protection.

Cons

  • No aspect of Cisco Secure Endpoint fails to meet our endpoint security needs.

Return on Investment

  • Cisco Secure Endpoint reduce risks associated with endpoints.
  • Cisco Secure Endpoint improves our overall security posture.
  • Cisco Secure Endpoint reduces Mean Time To Detect (MTTD) and Mean Time To Respond (MTTR) security threats.

Usability

Other Software Used

Safetica Intelligent Data Security, Zoom Workplace, Microsoft Windows

Great Endpoint Security Capabilities With Cisco Secure Endpoint

Use Cases and Deployment Scope

Cisco Secure Endpoint has been our security solution against cyberattacks for over 5 years. The platform combines XDR, EDR, and EPP to keep our business endpoints secure. It seamless detects, prevents, and remediate cyber threats on time thereby keeping our systems, networks, and devices performing optimally. With its advanced threat intelligence, ability to deal with known/unknown threats and the fact that it works across all devices makes a great endpoint security solution.

Pros

  • Enforces Zero Trust policy.
  • Reliable threat prevention, detection, and remediation.
  • Works across all devices and operating systems.
  • Automated containment - it is able to isolate infected devices from main network to avoid spread of cyber threats.
  • XDR threat hunting works perfectly.

Cons

  • Support is slow.
  • Outdated user interface.

Return on Investment

  • It ensures minimal spread of cyber threats in case of infiltration thanks to containment response capabilities.
  • By keeping our endpoints threat-proof, our systems and devices run efficiently hence better productivity.
  • It frees IT staff thanks to its automation and ability to keep threats away with minimal intervention.

Usability

Other Software Used

AWS Backup, AWS Chatbot