Director of I.T. Services at a non-tech company with 201-500 employees
Real User
Top 20
Straightforward to set up and it provides good visibility into malware being downloaded
Pros and Cons
  • "The biggest lesson that I have learned from using this product is that there is a lot more malware slipping through my email filters than I expected."
  • "This product has issues with the number of false positives that it reports."

What is our primary use case?

Our primary use case is general antivirus protection.

This product was deployed to a number of Windows machines, and we also have a VMware environment.

How has it helped my organization?

The product gives greater visibility of malware being downloaded by my clientele. In a more general fashion, Cisco Secure Endpoint has helped to prioritize threats. It has allowed us to make more effective use of our security team members.

Another advantage is that it has improved the effectiveness of our security options. We now have better response times when dealing with outbreaks.

We have decreased our time to detection, although it is difficult to say by how much because we weren't detecting all of the malware in the past.

It is reasonably easy to remediate issues using Cisco Secure Endpoint. In part, this is because I don't have to visit the physical machines to remediate them. As such, the time it takes for remediation has been decreased. 

What is most valuable?

This solution accelerates threat hunting by automatically promoting endpoint incidents to the Cisco SecureX platform, which is something that is fairly important to us.

Our systems are monitored by this product, and if threats are detected then the systems are shut down before problems arise. This is something that is fairly important to our organization.

What needs improvement?

This product has issues with the number of false positives that it reports. Especially when updates are released for Chrome, many detections report a virus when it really wasn't.

Another problem that I notice is that Outlook 2016 creates cache files of attachments, and when this product detects them as malware, it can't delete them. I assume this is because Outlook still has the file open. This means that I get notices about the issue but I can't do anything about it until later, after Outlook has closed them. This may not be Cisco's fault as much as it is Microsoft's fault.

Buyer's Guide
Cisco Secure Endpoint
May 2023
Learn what your peers think about Cisco Secure Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2023.
706,775 professionals have used our research since 2012.

For how long have I used the solution?

I have been working with Cisco Secure Endpoint for less than a year.

What do I think about the stability of the solution?

In my experience, this product is very stable.

What do I think about the scalability of the solution?

This is a fairly scalable solution.

We deployed it to all of our Windows devices. A team consisting of fewer than 10 people receives alerts from the product when there is an issue. The team will follow up on the incidents and any remediation.

At this point, we have no plans to increase our usage.

How are customer service and support?

I have not needed to use Cisco technical support for this product. I am usually happy with their support, so I'm assuming that for this product it will be roughly the same.

Which solution did I use previously and why did I switch?

Prior to using this product, I did not have other agents in place to handle the same job. We had implemented Microsoft Defender for Endpoint but that doesn't really have any reporting tools.

We switched away from Defender because we needed better visibility. There really wasn't any.

How was the initial setup?

The initial setup was fairly straightforward. It might have been complex for somebody that hasn't been doing this type of thing for as long as I have. For example, not a lot of people understand deploying things via group policies. In my case, however, I have a lot of experience and it wasn't complicated.

What about the implementation team?

The deployment was done in-house, by me. I did not use any external help for the implementation.

We purchased the product through a reseller, CDW, and our experience with them was straightforward. There were fairly easy to deal with.

It does not require regular maintenance or monitoring. I receive alerts when they happen but I don't actively monitor it. When an alert happens, an email is sent to a small team of fewer than 10 people.

What's my experience with pricing, setup cost, and licensing?

The pricing and licensing fees are okay. As a school, we do not have quite as much funding as a private business might. I wish that there were more of a discount available for educational uses.

Which other solutions did I evaluate?

Before choosing Cisco Secure Endpoint, we didn't thoroughly investigate or evaluate other options. We are a Cisco shop and we generally lean toward using Cisco products.

What other advice do I have?

My advice for anybody who is considering this solution is that all of their security products should come from the same vendor. This way, your dashboard can be set up to monitor all of them. In my case, because we're a Cisco shop, this product makes sense for us.

The biggest lesson that I have learned from using this product is that there is a lot more malware slipping through my email filters than I expected.

I would rate this solution an eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Gassan Shalabi - PeerSpot reviewer
Manager at UCloud
Real User
Top 10
Catches and blocks harmful files, viruses, and trojans
Pros and Cons
  • "I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It should protect all kinds of things that might happen on the servers, things that I cannot see."
  • "They could improve the main dashboard to more clearly show me the things that I want to see. When I open the dashboard right now, I see a million things and they are not always the things that I need."

What is our primary use case?

I'm hoping that this is protecting me from all the harmful issues that are happening, because we know exactly what kind of world we are living in on the internet.

How has it helped my organization?

I rely on this system. I am hoping that everything is fine with the system and that it will catch any harmful file or virus or trojan. If any of those things happen on my network, it will hold it or stop them.

It has helped to simplify cybersecurity in my company. I see that there are files that have been blocked. I don't go deep into the reports that I get from the system, but I believe that it's doing its job. I haven't had any serious problems.

What is most valuable?

I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It should protect all kinds of things that might happen on the servers, things that I cannot see.

What needs improvement?

They could simplify the solution and make it a little bit easier to understand how things are happening or if something serious has happened. They could improve the main dashboard to more clearly show me the things that I want to see. When I open the dashboard right now, I see a million things and they are not always the things that I need.

I would also like it to update itself so that I don't need to click to make that happen. Of course, having to click is not a hard thing to do, but I would like to see things done automatically as much as possible.

For how long have I used the solution?

I have been using Cisco Secure Endpoint for a long time. I used it in the last company I worked for and, when I opened my own company, I also started using it. I have been using it for around five years at least.

What do I think about the stability of the solution?

It's very stable.

What do I think about the scalability of the solution?

I have it installed on about 40 clients. To increase the number of endpoints I just need to download the connector and install it.

How are customer service and support?

I have had some difficulties, but I received support from Cisco and, in the end, it was okay. I cannot complain.

It took me some time to understand how to send in a request. It would be very easy if there were a chat on their site or if it could be done via WhatsApp. But I had to look for an email address, where to send and what were the details that they asked from me at the beginning. It wasn't obvious how to reach out to support.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I did not have a previous solution.

How was the initial setup?

The deployment was straightforward. It's easy to understand the steps. I created a profile, downloaded the agent, and installed it on the clients that I wanted it on. The dashboard is in the cloud, hosted by Cisco.

It is good that you don't have to take care of the system all the time. Once it's installed and stable, you don't need to make adjustments.

What about the implementation team?

I used SecureIT and it was perfect. He's very professional and he knows the system. He gave me an introduction to the system and explained the things that I needed to know.

What was our ROI?

It's keeping things quiet, so that's a very good return.

What's my experience with pricing, setup cost, and licensing?

Cisco Secure Endpoint is not too expensive and it's not cheap. It's quite fair.

Which other solutions did I evaluate?

I looked into SentinelOne two months ago. The question is, is the system protecting me enough or not? Sometimes I ask myself, should I put more security on the servers? Doing so is going to make the system work more slowly. I checked SentinelOne because some of my colleagues who have Cisco AMP had an attack that Cisco AMP did not see.

What other advice do I have?

The fact that I've been using it for five years already means that I believe I can trust it. Others can also trust it.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Cisco Secure Endpoint
May 2023
Learn what your peers think about Cisco Secure Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2023.
706,775 professionals have used our research since 2012.
Manager information security at a consumer goods company with 1,001-5,000 employees
Real User
When there is a security event in the news, I can quickly check if we have indicators of compromise
Pros and Cons
  • "Device Trajectory is one of the most valuable features. We're able to dig in and really understand how things came to be and where to focus our efforts."

    How has it helped my organization?

    Cisco Secure Endpoint has improved our speed of response and the level of confidence we have that we are in good shape or are not in good shape.

    What is most valuable?

    Device Trajectory is one of the most valuable features. We're able to dig in and really understand how things came to be and where to focus our efforts.

    For how long have I used the solution?

    I've been using Cisco Secure Endpoint for three years.

    What do I think about the stability of the solution?

    It's very stable.

    What do I think about the scalability of the solution?

    We haven't had any issues at all with the scalability. We're a global enterprise with between 1,500 and 1,700 users and we use it on servers, Macs, and PCs.

    How are customer service and support?

    The technical support is good.

    We've already got SHI and Cisco reps on top of us, and that's a lot of the reason why everything is so good.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We were looking to replace Microsoft Defender, which really just wasn't cutting it. Before Defender, we used Kaspersky. We needed to go to an EDR solution and we were already a Cisco-centric company, so it made sense to go into a unified environment.

    How was the initial setup?

    It was straightforward. We just rolled out the agent to all the endpoints. It took just a couple of people, one security person and one person for the tool that pushed it out to Windows devices.

    What's my experience with pricing, setup cost, and licensing?

    If I didn't have someone else taking care of the licensing, I would say that the licensing needs to be improved. All the product features we need are there. It's just a matter of the complexity and the different offerings and trying to figure things out.

    There are a lot of pieces that roll into the pricing issue. For Cisco Secure Endpoint, with our Cisco EA, the pricing seems reasonable compared to the others. But when we get to solutions like Duo and we think that with our Microsoft agreement their MFA is "free," it's not exactly free. But without our EA, Duo would cost so much more. It feels a little bit like nickel and dime sometimes, but I get it.

    Which other solutions did I evaluate?

    We looked at CrowdStrike and Carbon Black. All the solutions had great value, but we went with Cisco because we were with Cisco for networking quite a bit. Also, our overall direction was to look at SASE, and with some of the other things, they all just started coming together. It made a lot of sense to stay in one environment for functionality.

    What other advice do I have?

    Traditionally you'll see the industry reviews talk about Cisco Secure Endpoint as typically in Cisco environments, but I'd tell the CrowdStrike users and other folks to take a look. It's an interesting solution and it provides a lot of value.

    Cyber security resilience has been extremely important for our organization. Cisco Secure Endpoint has stopped a few things. I don't know whether other avenues of defense in depth would have caught them or not, but the resilience of depth and the ability to keep moving, even after an event, keep the rest of our business productive.

    The Cisco environment has been perfect. When there is an event in the news that I know my leaders are going to be reading about, in 10 minutes I can check my environment to see if I have any indicators of compromise, and I'm done.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Christos Papadopoulos - PeerSpot reviewer
    Software Engineer at Thessaloniki Port Authority SA
    Real User
    Top 10
    A simple, fast, and reliable solution that provides good visibility and protection
    Pros and Cons
    • "It's quite simple, and the advantage I see is that I get the trajectory of what happened inside the network, how a file has been transmitted to the workstation, and which files have got corrupted."
    • "Its price is okay for us, but it can always be better. There's always room for improvement when it comes to pricing."

    What is our primary use case?

    We saw this product with a partner. We installed it and configured it properly along with our antivirus solution. We monitor it almost every day to see what's going on. Up till now, we are very happy with the performance.

    We check every day if there are any indicators of compromise, if there are any workstations that need particular attention, or if there are any peculiar or strange events.

    How has it helped my organization?

    The main benefit is that we have visibility on the network. With the combination of Cisco Secure Endpoint and our antivirus, we feel a little bit more secure. We have better monitoring of and overview of what's going on in the network.

    It's reliable. It's doing most of the jobs for us, so we don't have to worry. We check it for just 15 minutes per day to be sure that everything is fine.

    It doesn't save time, but we feel more confident that everything is okay on the network. It improves our security posture.

    What is most valuable?

    It's quite simple, and the advantage I see is that I get the trajectory of what happened inside the network, how a file has been transmitted to the workstation, and which files have got corrupted.

    It's able to detect and help remediate threats. So far, my experience is very good. I trust this product. It's quite simple, fast, and reliable. The dashboard and reporting are also quite good.

    What needs improvement?

    In terms of features, I don't have any areas for improvement. It has a good interface. Its reporting is also good, and the updates are very frequent. Its price is okay for us, but it can always be better. There's always room for improvement when it comes to pricing.

    For how long have I used the solution?

    We have been using this solution for more than a year and a half.

    What do I think about the stability of the solution?

    It's reliable. We haven't had any problems so far.

    What do I think about the scalability of the solution?

    It's easy to scale.

    How are customer service and support?

    It has been excellent so far. We don't have any problems. I'd rate them a nine out of ten.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    It's the first time we are using this kind of product. We didn't use any other product previously. 

    How was the initial setup?

    It was quite easy for us. It probably took us three days.

    What about the implementation team?

    We have a lot of partners, but Netbull is our partner in Greece for Cisco Secure Endpoint.

    What's my experience with pricing, setup cost, and licensing?

    Its price is fair for us.

    Which other solutions did I evaluate?

    We didn't evaluate other products. We had seen this product before. We discussed it with our partners, and we just went for it. Our main thought was to go with a product and brand that we can trust. All our core network is Cisco, so this was the product that came straight into our head.

    What other advice do I have?

    I'd rate Cisco Secure Endpoint a nine out of ten. It's excellent.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    PeerSpot user
    Technical Engineer at a healthcare company with 5,001-10,000 employees
    Real User
    Top 20
    Works well and helps with compliance, but logging could be better
    Pros and Cons
    • "The VPN is most valuable. It's the best thing in the market today. We can use two-factor authentication with another platform, and we can authenticate with two-factor."
    • "Logging could be better in terms of sending more logs to Cisco Firepower or Cisco ASA. That's an area where it could be made better."

    What is our primary use case?

    We are using it for remote users, and that's our main reason for using it. We have a lot of colleagues who work outside the organization, and they need to connect to the local, on-prem resources for file sharing and other things that we have in our data center. That's it.

    How has it helped my organization?

    It helped to free up our IT staff's time. We don't need to manually check everything in the compliance area. Everything is automated, so we don't need to check all the time. I don't know how much time it has saved, but it helped us a lot.

    What is most valuable?

    The VPN is most valuable. It's the best thing in the market today. We can use two-factor authentication with another platform, and we can authenticate with two-factor.

    What needs improvement?

    Logging could be better in terms of sending more logs to Cisco Firepower or Cisco ASA. That's an area where it could be made better.

    For how long have I used the solution?

    We've been using this solution for five or six years. 

    What do I think about the stability of the solution?

    We do not have any challenges, and we are fine with it. We are using it only for external endpoints, and we are very comfortable with it. 

    What do I think about the scalability of the solution?

    We don't see any difficulty there.

    How are customer service and support?

    It's very nice. You get feedback very easily. I'd rate them an eight out of ten.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We were using another solution before. We switched because we have Cisco everywhere, and the best way is to go for Cisco for everything. That's our strategic plan.

    How was the initial setup?

    Its initial setup is straightforward, but I have been working with Cisco products for about 10 years. I have knowledge of how to use it, and it's very easy for us to implement.

    The process of migration was easy. We have our own tools to migrate from the old one. In our environment, everything is on-prem, and we also have redundancy for the central equipment.

    What about the implementation team?

    We implement it ourselves. The number of people required depends on how big the organization is. We are not so big. We are a middle-sized organization, and for our use case, three or four people were involved in the planning and implementation.

    What was our ROI?

    We have not seen an ROI.

    What's my experience with pricing, setup cost, and licensing?

    We had faced some license issues, but it has been improved. At the beginning of the implementation, we faced a lot of licensing issues, but now, we have EA licensing, which gives us an opportunity to grow.

    What other advice do I have?

    If you have a Cisco environment inside, it's best to have a Cisco solution for the outside. You don't need to use multiple vendors because it can be difficult for them to communicate with each other. Sometimes, there can be difficulties when you have different vendors.

    Overall, I'd rate it a seven out of ten.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    PeerSpot user
    Senior IT System Administrator at ScanPlus GmbH
    Real User
    Top 10
    Great secure threat hunting and threat response with continuous product improvements happening
    Pros and Cons
    • "The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great."
    • "We don't have issues. We think that Cisco covers all of the security aspects on the market. They continue to innovate in the right way."

    What is our primary use case?

    AMP 4 Endpoints protect our workstation (ca 300), our VDI environment (ca 250), and our servers (ca 50).

    The old product was from Trend Micro and was just a simple antivirus solution. It was ok, but it was just an antivirus. We needed something more than just an antivirus that is used by every end-user. We were looking for a tool can we trust, and something that can schedule some things, implement scripts, analyze malware, perform advanced scans, etc. Our company, as an ISP for many customers, has to be protected from vulnerabilities.

    How has it helped my organization?

    First of all, we performed a PoV (Proof of Value) together with our Cisco partners, and we tested about a few months the efficacy and complexity of this product.

    After the evaluation of the cost and security that AMP 4 Endpoints could offer, we decided to replace the old solution with AMP 4 Endpoints. The implementation was performed, with support from Cisco partners, in a few hours. In the following days, AMP 4 Endpoints found many things that the old antivirus solution missed. That was a very huge advantage for us.

    What is most valuable?

    Since we booked the Premier License, the most valuable features, in my opinion, are

    • Secure Threat Hunting to have a specialized team to support in analyzing complex attacks. That could help us to learn about new technics
    • Threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files. Nobody wants to run a dangerous file in his network, for that Threat Grid is important for us.
    • Threat Response that offers the possibility of help on logs, IPs, domains, etc. to perform investigations into our and global infrastructure. Sometimes we want to see if a malicious file was run in our network, for that Threat Response take this job to search and save us alot of time.

    What needs improvement?

    Actually, we don't need others features or improvements of this product. It is a complex product and offers us exactly what we need - security and trust.

    We chose Cisco because we wanted security and trust. That is what we needed from Cisco, and what our customers expected from us.

    We are using many Cisco products, and, with every new product, every new feature, the trust in Cisco security is growing.

    We think that Cisco covers all of the security aspects on the market. They continue to innovate in the right way.

    For how long have I used the solution?

    We have been using the AMP 4 Endpoints in the Test Environment since November 2020 and implemented them in the production environment since March 2021.

    Which solution did I use previously and why did I switch?

    We used Trend Micro and when we tested AMP 4 Endpoints we saw its value immediately.

    What's my experience with pricing, setup cost, and licensing?

    I'd advise users to book the premier license and to have access to all the features that AMp 4 Endpoints has on offer.

    Which other solutions did I evaluate?

    There was no other option; we wanted the Cisco solution immediately.

    What other advice do I have?

    Everything is working fine.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Felipe Guimaraes - PeerSpot reviewer
    Sales Director at Samsung
    Vendor
    Top 10
    Helps protect data on user devices
    Pros and Cons
    • "The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices."
    • "It could be improved in connection with artificial intelligence and IoT."

    What is our primary use case?

    It is used especially to connect with MDM, covering security and monitoring services.

    It protects user devices, especially for field services.

    Customers need some infrastructure on the cloud, e.g., Amazon and Google. We also need some testing and stage environments to perform tests.

    How has it helped my organization?

    We need to follow many countries' laws about data privacy. This is a requirement that is key for users. Cybersecurity resiliency has been important for us because we need to protect against loss.

    What is most valuable?

    The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices.

    What needs improvement?

    It could be improved in connection with artificial intelligence and IoT.

    For how long have I used the solution?

    I have been using this solution for three years.

    What do I think about the stability of the solution?

    The stability is good.

    It doesn't require much maintenance, just in a few cases.

    What do I think about the scalability of the solution?

    It is good.

    How are customer service and support?

    The technical support is fair. I would rate them as nine out of 10.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We previously used IBM. We switched because customers made decisions to work natively with the Cisco features, especially on infrastructure and security environments.

    How was the initial setup?

    In many cases, we can deploy it in a week. In other cases, we have to connect and test with more complex architectures. However, this is not related to the security endpoint services. The testing around another product is important, so it can take two to four months.

    We use the agile method for our implementation strategy.

    What about the implementation team?

    We worked with IBM, Amazon, Google, Microsoft, and a few partners.

    It takes three to 10 people to do the deployment, including pre-sales and technical guys, testing guys, and some software architecture.

    What was our ROI?

    We get more value out of our portfolio. We have pretty much seen ROI. When the endpoint service is well connected devices, it covers many important key features,

    What's my experience with pricing, setup cost, and licensing?

    The price is very fair to the customer.

    Which other solutions did I evaluate?

    We need to be open as an integrator to figure out other situations and features, especially from Microsoft and IBM. Everything is related to the customer's architecture, which is why we have to be open-minded. 

    What other advice do I have?

    I really recommend to test and connect it with different devices, especially mobile, tablets, notebooks, and servers. Then, the potential customer can understand the value of naturally integrating all these devices together.

    When it comes to data security, it is important to protect the data.

    I would rate the solution as nine out of 10.

    Which deployment model are you using for this solution?

    Public Cloud
    Disclosure: My company has a business relationship with this vendor other than being a customer: Real user
    PeerSpot user
    Buyer's Guide
    Download our free Cisco Secure Endpoint Report and get advice and tips from experienced pros sharing their opinions.
    Updated: May 2023
    Buyer's Guide
    Download our free Cisco Secure Endpoint Report and get advice and tips from experienced pros sharing their opinions.