Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader.
Product | Market Share (%) |
---|---|
Cisco Secure Endpoint | 1.5% |
CrowdStrike Falcon | 10.5% |
Microsoft Defender for Endpoint | 10.2% |
Other | 77.8% |
Type | Title | Date | |
---|---|---|---|
Category | Endpoint Protection Platform (EPP) | Aug 25, 2025 | Download |
Product | Reviews, tips, and advice from real users | Aug 25, 2025 | Download |
Comparison | Cisco Secure Endpoint vs Microsoft Defender for Endpoint | Aug 25, 2025 | Download |
Comparison | Cisco Secure Endpoint vs CrowdStrike Falcon | Aug 25, 2025 | Download |
Comparison | Cisco Secure Endpoint vs SentinelOne Singularity Complete | Aug 25, 2025 | Download |
Title | Rating | Mindshare | Recommending | |
---|---|---|---|---|
CrowdStrike Falcon | 4.3 | 10.5% | 96% | 132 interviewsAdd to research |
Microsoft Defender for Endpoint | 4.1 | 10.2% | 94% | 198 interviewsAdd to research |
Company Size | Count |
---|---|
Small Business | 20 |
Midsize Enterprise | 14 |
Large Enterprise | 19 |
Company Size | Count |
---|---|
Small Business | 206 |
Midsize Enterprise | 159 |
Large Enterprise | 478 |
Cisco Secure Endpoint was formerly known as Cisco AMP for Endpoints.
Reviews from Real Users
Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.
Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
Cisco Secure Endpoint was previously known as Cisco AMP for Endpoints.
Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Author info | Rating | Review Summary |
---|---|---|
Chief Technology Officer at Future Point Technologies | 3.5 | We deployed Cisco Secure Endpoint for clients to secure endpoints and servers. The solution excels in machine learning and threat intelligence, preventing breaches. However, it lacks DLP features, and integration with third-party tools and forensic capabilities require improvement. |
Presales Manager at Digitaltrack | 4.5 | We use Cisco Secure Endpoint for internal endpoint protection, appreciating its threat detection visibility and analytics. While it improved our visibility significantly, the uninstall process could benefit from requiring a password. We hadn't used endpoint visibility solutions prior. |
Security Manager at a wholesaler/distributor with 10,001+ employees | 4.0 | I work in a wholesale industry and use Cisco Secure Endpoint for about 6,000 endpoints. Cisco's ecosystem provides significant ROI and threat protection, though I feel improvements in artificial intelligence are necessary for future needs. |
Level 2 tech at a tech services company with 11-50 employees | 4.5 | No summary available |
Consulting & Support Region Senior Executive at Redington (India) Ltd | 4.5 | We recommend Cisco Secure Endpoint for identifying malicious content in networks through file reputation and analysis. However, the need to install agents individually on each laptop is challenging, especially with large networks and limited administrative resources. |
Infrastructure Engineer at TeamSystem | 4.0 | No summary available |
Cyber Security Presales Engineer at Orixcom | 4.5 | I use Cisco Secure Endpoint to protect our company's Windows and Mac devices due to its ease of use and constant updates. It surpasses ESET and Symantec but needs better URL blocking and integration. Our ROI is satisfactory, focusing on security. |
System Administrator at bluegr Hotels & Resorts | 4.0 | Cisco Secure Endpoint offers robust prevention and comprehensive security with exceptional reporting, but its pricing could be more competitive. The transition to SecureX simplifies access yet presents challenges with login and admin rights during migration, affecting system functionality. |