Check Point Pointsec [EOL] vs Cisco Secure Endpoint vs Symantec Endpoint Encryption comparison

Cancel
You must select at least 2 products to compare!
Check Point Software Technologies Logo
views| comparisons
100% willing to recommend
Cisco Logo
10,519 views|5,961 comparisons
95% willing to recommend
Broadcom Logo
2,620 views|2,001 comparisons
78% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point Pointsec [EOL], Cisco Secure Endpoint, and Symantec Endpoint Encryption based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, Sophos, Check Point Software Technologies and others in Endpoint Encryption.
To learn more, read our detailed Endpoint Encryption Report (Updated: April 2024).
769,662 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Full disk encryption helps us ensure that data stored on a device is encrypted.""At the time when this tool was launched on the market, it had new technologies integrated within.""One of the characteristics that give us the most value is that it offers the ability to perform HTTPS inspections.""Check Point GAiA is easy to use."

More Check Point Pointsec [EOL] Pros →

"The product's initial setup phase was very simple.""It's quite simple, and the advantage I see is that I get the trajectory of what happened inside the network, how a file has been transmitted to the workstation, and which files have got corrupted.""The VPN is most valuable. It's the best thing in the market today. We can use two-factor authentication with another platform, and we can authenticate with two-factor.""The entirety of our network infrastructure is Cisco and the most valuable feature is the integration.""Definitely, the best feature for Cisco Secure Endpoint is the integration with Talos. On the backend, Talos checks all the signatures, all the malware, and for any attacks going on around the world... Because Secure Endpoint has a connection to it, we get protected by it right then and there.""appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst. I can track everything that happens on our server from my PC or device. Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us.""Among the most valuable features are the exclusions. And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source.""The most valuable features of this solution are the IPS and the integration with ISE."

More Cisco Secure Endpoint Pros →

"In general terms, it is working properly and according to our expectations. The comfort of feeling secure is the most valuable. Some customers had certain fears about changing the product because no one wants to lose any kind of information or to have some problems or inconsistencies while migrating from one product to another.""It helps us put antivirus solutions in place and prevent malware from getting to our machines.""We can extend it to all of the critical endpoints and the servers, and we can ensure the confidentiality of the data.""I like the management aspect of this solution. You don't want to have end-users tweak or set it themselves, so the fact that you could do it from a central point helped us a lot.""It is fairly stable.""The installation process is pretty straightforward.""It is stable.""Disk encryption and file and folder encryption are the most valuable and used features. It is also very well integrated with Symantec Messaging Gateway and Symantec DLP, which is helpful in protecting any kind of information that goes outside. Symantec DLP catches an email and sends it to the encryption server. The encryption server encrypts the email and intimates to the user that confidential information is being sent out. The administrator can then take appropriate action."

More Symantec Endpoint Encryption Pros →

Cons
"The UI was one of the most difficult points to get used to. Due to the UI, even though it was used every day, the administration was complicated.""In the next release of this solution, I would like to see application identity support.""We would maybe want (in the future) advanced security in the filtering of access to the metaverse by augmented reality cameras.""The installation was quite complex."

More Check Point Pointsec [EOL] Cons →

"It could be improved in connection with artificial intelligence and IoT.""The thing I hate the most, which they have not fixed, is when it creates duplicate entries within a console. If you have a computer and you upgrade from Windows 7 to Windows 10, or you upgrade your agent from version 6 to 7, it creates a new instance in there instead of updating the information. Instead of paying a license for one computer, I have to license two computers until I manually go in, search for all the duplicate entries, and clean them out myself.""The connector updates are very easily done now, and that's improving. Previously, the connector had an issue, where almost every time it needed to be updated, it required a machine reboot. This was always a bit of an inconvenience and a bug. Because with a lot of software now, you don't need to do that and shouldn't need to be rebooting all the time.""In the next release, I would for it to have back up abilities. I would like the ability to go back to a point in time to when my PC was uninfected and to the moment of when the infection happened.""The solution needs more in-depth analytics.""The GUI needs improvement, it's not good.""The technical support is very slow.""The product does not provide options like tunnel creation or virtual appliances."

More Cisco Secure Endpoint Cons →

"We would like some advanced security protection features.""Symantec Endpoint Encryption can improve by being more secure.""The initial setup is a bit complex.""The UI could be improved.""There are some issues with the single sign-on with the active directory. We had a few problems related to the synchronization between the active directory and the login features of the Symantec products because the users made many password changes during the day. The time for synchronization with the solutions can be improved. I would like to see mobile encryption. There should be a possibility to include all the mobiles of a company in the console. Many customers are asking about encryptions for tablets or cell phones, but we don't have any product that we are comfortable with to recommend to our customers.""The GUI could use some enhancement, particularly in making option sets easier to locate on client machines.""I can only patch monthly. I don't know what the solution is there, besides being vulnerable for three weeks out of four. But there's got to be an option somehow.""The solution presently doesn't let network folder encryption be done on Macintosh."

More Symantec Endpoint Encryption Cons →

Pricing and Cost Advice
Information Not Available
  • "​Pricing can be more expensive than similar software that does less functionality, but not recognized by customers.​"
  • "The costs of 50 licenses of AMP for three years is around $9,360."
  • "The price is very good."
  • "The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost."
  • "Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc."
  • "In our case, it is a straightforward annual payment through our Enterprise Agreement."
  • "Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection."
  • "There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization."
  • More Cisco Secure Endpoint Pricing and Cost Advice →

  • "It can be expensive. However, if you plan to scale or are at a large enterprise company, this product could be what you need."
  • "The licensing costs yearly are $5000."
  • "They have two solutions for encryption including Symantec Endpoint Encryption and PGP Endpoint Encryption. With one PGP license, you can deploy the two solutions. The PGP license gives you two options."
  • "Depending on how many modules you will use (up to five) the licensing will be more expensive."
  • "The pricing is fair but there is variability in our area that needs to be addressed."
  • "The cost of this solution is a little on the higher side."
  • "The license is not very expensive."
  • "There is a license required for this solution."
  • More Symantec Endpoint Encryption Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
    769,662 professionals have used our research since 2012.
    Questions from the Community
    Ask a question

    Earn 20 points

    Top Answer:The product provides sandboxing options like file reputation and file analysis.
    Top Answer:Pricing is a big issue. Some customers find the price reasonable. Some customers do not agree with the price.
    Top Answer:We must install an agent on every laptop. We do not know how to do it for the network. We shouldn’t have to install… more »
    Top Answer:Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive… more »
    Top Answer:Antivirus, URL filtering, and firewall protection are the most effective features for data protection.
    Top Answer:We need to acquire a new license. Considering the fluctuation in exchange rates in our part of the world, we find it… more »
    Ranking
    Unranked
    In Endpoint Encryption
    Views
    10,519
    Comparisons
    5,961
    Reviews
    20
    Average Words per Review
    935
    Rating
    8.3
    7th
    out of 28 in Endpoint Encryption
    Views
    2,620
    Comparisons
    2,001
    Reviews
    10
    Average Words per Review
    374
    Rating
    7.0
    Comparisons
    Also Known As
    Pointsec
    Cisco AMP for Endpoints
    Symantec Drive Encryption
    Learn More
    Overview
    Information Not Available

    Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader.

    Cisco Secure Endpoint was formerly known as Cisco AMP for Endpoints.

    Reviews from Real Users

    Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.

    Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."

    Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."

    Symantec Drive Encryption, powered by PGP technology provides organizations with strong full-disk and removable media encryption and the ability to integrate with Symantec Data Loss Prevention. Intuitive management enables enterprise scale deployments and features compliance-based, out-of-the-box reporting plus customizable reports. Management capabilities include support for native OS encryption (FileVault2) and Opal compliant self-encrypting drives.
    Sample Customers
    Glatfelter
    Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
    Citrix Systems Inc., City of Lansing, Commercial & Industrial Property, France T_l_visions, Fujian Mobile Co. Ltd., Group Lotus plc, Hall Booth Smith & Slover, P.C. (HBSS), Portugal Telecom, PostFinance, Public Pension Agency
    Top Industries
    No Data Available
    REVIEWERS
    Computer Software Company16%
    Financial Services Firm13%
    Manufacturing Company9%
    Healthcare Company9%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Government9%
    Financial Services Firm8%
    Manufacturing Company7%
    REVIEWERS
    Financial Services Firm52%
    Computer Software Company10%
    Non Profit10%
    Aerospace/Defense Firm5%
    VISITORS READING REVIEWS
    Computer Software Company14%
    Financial Services Firm11%
    Manufacturing Company10%
    Healthcare Company7%
    Company Size
    No Data Available
    REVIEWERS
    Small Business35%
    Midsize Enterprise25%
    Large Enterprise40%
    VISITORS READING REVIEWS
    Small Business28%
    Midsize Enterprise18%
    Large Enterprise54%
    REVIEWERS
    Small Business37%
    Midsize Enterprise21%
    Large Enterprise42%
    VISITORS READING REVIEWS
    Small Business23%
    Midsize Enterprise16%
    Large Enterprise61%
    Buyer's Guide
    Endpoint Encryption
    April 2024
    Find out what your peers are saying about Microsoft, Sophos, Check Point Software Technologies and others in Endpoint Encryption. Updated: April 2024.
    769,662 professionals have used our research since 2012.