Cisco Secure Endpoint Creates A Great ROI
April 01, 2024

Cisco Secure Endpoint Creates A Great ROI

Jeremy Miller | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Cisco Secure Endpoint

Our organization uses Cisco Secure Endpoint to track activity on all of the desktops and laptops in our organization. Cisco Secure Endpoint helps identify potential problems to malicious activity. It sends alerts when malicious files or malicious activity is found. It also will act to contain any known issues so that the problem does not spread onto our network.
  • Identifies malicious files on an endpoint
  • Contains malicious files to prevent spreading of harmful issues
  • Sends out alerts to notify administrators of the network and keep them informed
  • Frequent name changes are not helpful
  • Some of the reports that get sent are very high-end reports with lots of information. It would be nice if there was a simplified report that could be sent automatically when an issue is identified on a computer
  • Risk detection is key. We save a lot of money by cleaning up a problem early because we have been notified about it.
  • Endpoint has the ability to track a file that it doesn’t know is “good” or “bad”. If it later identifies a file as being malicious, it will go and grab that file in in order to quarantine it. It is able to do this because it has tracked that file.
There are lots of high-end features with Cisco Secure Endpoint. Those are wonderful features and the information provided through the reports is wonderful. It would be nice if things were put into as simple of terms as possible so that the people wanting to know what is happening who aren’t as technology savvy can understand easily.
We rarely use support. However, on the occasion that we have had to call in for help, the support team has been quick to respond.
Our technology framework is all based upon Cisco products. Lots of these products integrate with one another, which makes management and cohesion smooth.

Do you think Cisco Secure Endpoint delivers good value for the price?

Yes

Are you happy with Cisco Secure Endpoint's feature set?

Yes

Did Cisco Secure Endpoint live up to sales and marketing promises?

Yes

Did implementation of Cisco Secure Endpoint go as expected?

Yes

Would you buy Cisco Secure Endpoint again?

Yes

Cisco Secure Endpoint is well suited for keeping track of the many different and points that we have in our organization. All of these devices can easily be monitored with Cisco Secure Endpoint. It can monitor our servers and our desktops and laptops in our environment. It isn’t as appropriate for our student devices. However, those aren’t as critical since they are just Chromebooks.

Cisco Secure Endpoint Feature Ratings

Anti-Exploit Technology
5
Endpoint Detection and Response (EDR)
9
Centralized Management
1
Infection Remediation
7
Vulnerability Management
6
Malware Detection
9

Cisco Security

Security plays a large role in our goals. We have to make sure that our network is a secure as possible and that our end-users are trained to identify emails, website, links, etc. that are malicious. Without network security and training our entire organization is at risk.
Our entire network runs on Cisco products. We have Cisco switches, access points, phone systems, and firewalls. We also use Cisco software to protect our network. We use Cisco because of their reputation in the industry and for the fact that their products integrate with one another. The more that products integrate the easier it is to manage the network.
Cisco Secure Endpoint was chosen because it integrates with Cisco Umbrella. It was also recommended to us by a trusted security advisor who acts as a SOC for our corporation. We trust Cisco products, which made the decision to choose Cisco Secure Endpoint easy.
AI will impact cybersecurity on the bad actor end and the protection end. The bad actor is already using AI to phish people in incredibly realistic ways. AI will also help organizations to identify if something was created using AI and can then notify the organization that it is malicious.