"The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great."
"Definitely, the best feature for Cisco Secure Endpoint is the integration with Talos. On the backend, Talos checks all the signatures, all the malware, and for any attacks going on around the world... Because Secure Endpoint has a connection to it, we get protected by it right then and there."
"I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It should protect all kinds of things that might happen on the servers, things that I cannot see."
"Device Trajectory is one of the most valuable features. We're able to dig in and really understand how things came to be and where to focus our efforts."
"The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices."
"Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP."
"The entirety of our network infrastructure is Cisco and the most valuable feature is the integration."
"The most valuable feature is signature-based malware detection."
"The initial setup is very easy."
"It is very powerful tooling that can be tuned a lot."
"It's pretty complete for preventing threats to endpoints. Its capabilities are great."
"SandBlast Agent is always working in the background collecting sensitive data, forensics, and notifying users whenever there is a chance of a brute-force attack into our systems. Otherwise, it has been protecting our data at various geographies along with the endpoints that we set up on the cloud. They have been able to filter out or thwart any attacks from the very word, "Go," and make our work very safe and smooth."
"The best thing is that it fits into all environments, which gives any organization a chance to use it intuitively without worrying about the nature of their industry."
"It's great for securing our endpoints from any external attacks."
"The main advantage of the solution is the ability to implement complete security policies for the terminals in order to address how apps are installed on corporate devices."
"A unique feature with this product is that it will detect if the user is entering their password on a website, and then block it."
"DLP is a solid feature in the product. I like it very much. It is very useful in our environment. It is also a very stable solution. Their support is also very good."
"The initial setup was very straightforward."
"One of the better features, in my opinion, is that it also makes use of a web reputation. For example, if someone accidentally clicks on a link in an email that leads to a malicious website, they will block it."
"Trend Micro Apex One is good at detecting zero-day threats. When the solution was in operation I did not notice any system performance problems. Upgrades of the solution were simple to do and there are plenty of features."
"The initial setup is not that tough. It's easy."
"Offers great application control, vulnerability protection, and behavior monitoring."
"The most valuable feature is the antivirus."
"It has the ability to share, which is not available in other products."
"This product has issues with the number of false positives that it reports."
"I would like to see integration with Cisco Analytics."
"In Orbital, there are tons of prebuilt queries, but there is not a lot of information in lay terms. There isn't enough information to help us with what we're looking for and why we are looking for it with this query. There are probably a dozen queries in there that really focus on what I need to focus on, but they are not always easy to find the first time through."
"It could be improved in connection with artificial intelligence and IoT."
"In terms of the user experience, if the UX design could be much simpler [that would improve things]... if they could make it more intuitive for someone who is not an engineer so that they still can read what's going on in their webpage and understand, that would be something."
"We don't have issues. We think that Cisco covers all of the security aspects on the market. They continue to innovate in the right way."
"The thing I hate the most, which they have not fixed, is when it creates duplicate entries within a console. If you have a computer and you upgrade from Windows 7 to Windows 10, or you upgrade your agent from version 6 to 7, it creates a new instance in there instead of updating the information. Instead of paying a license for one computer, I have to license two computers until I manually go in, search for all the duplicate entries, and clean them out myself."
"The GUI needs improvement, it's not good."
"We use a couple of Check Point products, like SmartEvent, and SandBlast Agent is not really integrated into that. We haven't gotten the reports working yet. We are working with the account team and trying. As I said, it's still relatively new in terms of what we're trying to achieve."
"We cannot integrate this product with other solutions, which is something that should be improved."
"Some of the less tech-savvy users sometimes find it difficult in adjusting and learning how to use the platform."
"The product updates are a manual process for my administrator and can take several hours out of his day."
"Sometimes, with a lot of clients (1,000) the UI is a bit sluggish."
"As of now, product-wise, we haven't found any major concern that needs to improve, although it does not support full MDM and this is something that should be there."
"Sometimes, the Cloud Management Portal can become unresponsive or take a long time to process a query. This in turn will cause the browser to freeze, which will require closing and reopening of your browser."
"They could improve memory consumption."
"The integration capabilities of the solution could be improved."
"I don't give it a perfect 10 because of the Active Directory integration. It would make things easier if the Active Directory were integrated more seamlessly."
"I would like to see a sandboxing feature in the next release - which is currently something being supported by a third party - in addition to EDR capability on the cloud applications."
"No product can ever be rated a ten out of ten. They are always improving on one aspect or another."
"We had some problems with Trend Micro Apex One doing the updates and patches. Some of the other vendor's support has said that Trend Micro Apex One receives database signatures updates too late."
"This software could affect the performance of your device negatively, particularly causing slow performance after installation."
"I would like to see better reporting."
"In the next release, I would like to see IBS included in OfficeScan."
Check Point Harmony Endpoint is ranked 7th in EPP (Endpoint Protection for Business) with 46 reviews while Trend Micro Apex One is ranked 10th in EPP (Endpoint Protection for Business) with 51 reviews. Check Point Harmony Endpoint is rated 8.8, while Trend Micro Apex One is rated 8.2. The top reviewer of Check Point Harmony Endpoint writes "Resilient by design, provides redundancy, and offers ongoing constant improvements". On the other hand, the top reviewer of Trend Micro Apex One writes "Beneficial machine learning and good vendor support". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks, SentinelOne, CrowdStrike Falcon and Carbon Black CB Defense, whereas Trend Micro Apex One is most compared with Trend Micro Deep Security, Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks, Sophos Intercept X and SentinelOne. See our Check Point Harmony Endpoint vs. Trend Micro Apex One report.
See our list of best EPP (Endpoint Protection for Business) vendors.
We monitor all EPP (Endpoint Protection for Business) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.