Protecting Devices and Systems With Cisco Secure Endpoint
October 10, 2025

Protecting Devices and Systems With Cisco Secure Endpoint

Laurent Morvan | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Cisco Secure Endpoint

With its multilayered protection, this tool protects all our devices from all manner of endpoint threats. We have deployed Cisco Secure Endpoint company-wide and it helps keep cyberattacks at bay. From ransomware, malware, data breaches, among other threats, this tool detects, responds, block and reports all manner of threats thereby keeping of devices and systems optimal. It ensures proper visibility and its proactive threat hunting makes it a better tool.

Pros

  • Proactive threat hunting.
  • Detects, responds, and block threats.
  • Works on all devices.
  • Offers advanced threat protection.

Cons

  • It is not the most affordable.
  • Keeps our devices protected and performing optimally.
  • It's multilayered protection and proactive threat monitoring both ensures no cyber threat goes unnoticed.
  • It reduces our security costs thanks to its effectiveness in dealing with endpoint threats.
I would rate usability at 9. The tool is smooth and the UI is great. No major issues regarding usability and functionality.
I work in the IT department and I have contacted support multiple times and they are swift in responding to issues.

Do you think Cisco Secure Endpoint delivers good value for the price?

Yes

Are you happy with Cisco Secure Endpoint's feature set?

Yes

Did Cisco Secure Endpoint live up to sales and marketing promises?

Yes

Did implementation of Cisco Secure Endpoint go as expected?

Yes

Would you buy Cisco Secure Endpoint again?

Yes

For business endpoint protection, I definitely recommend Cisco Secure Endpoint. It well equipped and is able to detect and respond to endpoint threats on time. In addition, it ensures deep visibility of threats and the proactive threat hunting ensures no cyberattack goes unnoticed.

Cisco Secure Endpoint Feature Ratings

Anti-Exploit Technology
10
Endpoint Detection and Response (EDR)
9
Centralized Management
9
Infection Remediation
10
Vulnerability Management
9
Malware Detection
9

Comments