Cisco Secure Endpoint and CompassOne by Blackpoint Cyber compete in the cybersecurity sector, focusing on improving organizational security. Cisco Secure Endpoint has an advantage due to its comprehensive features and cost-effectiveness, while CompassOne stands out for advanced capabilities that justify its premium pricing.
Features: Cisco Secure Endpoint offers robust threat detection, advanced analytics, and seamless integration with existing systems. It excels in comprehensive endpoint protection with a user-friendly interface. CompassOne by Blackpoint Cyber features proactive threat hunting, streamlined integration, and sophisticated threat management tools, emphasizing targeted cybersecurity operations.
Room for Improvement: Cisco Secure Endpoint could enhance its complex deployment process and reduce learning curves associated with its sophisticated toolset. Further clarity in user notifications and increasing compatibility with non-Cisco products would be beneficial. CompassOne needs to simplify its user interface, enhance customer accessibility to support, and reduce the high initial learning curve to streamline onboarding for new users.
Ease of Deployment and Customer Service: Cisco Secure Endpoint offers a seamless deployment model with extensive guidance and strong customer service. Its integration into Cisco environments makes it easier for existing Cisco users. CompassOne by Blackpoint Cyber, although a bit harder to implement due to advanced capabilities, ensures dedicated support to customers during the setup phase, aiding in streamlining the integration process.
Pricing and ROI: Cisco Secure Endpoint is often seen as cost-effective, offering a substantial ROI with its comprehensive security package that is affordable for a wide range of customers. CompassOne by Blackpoint Cyber, although potentially costlier initially, provides significant ROI primarily through its advanced threat detection and unique capabilities, appealing to businesses with stringent security needs.
Product | Market Share (%) |
---|---|
Cisco Secure Endpoint | 1.6% |
CompassOne by Blackpoint Cyber | 0.4% |
Other | 98.0% |
Company Size | Count |
---|---|
Small Business | 21 |
Midsize Enterprise | 14 |
Large Enterprise | 21 |
Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader.
Cisco Secure Endpoint was formerly known as Cisco AMP for Endpoints.
Reviews from Real Users
Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.
Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
CompassOne by Blackpoint Cyber delivers comprehensive MDR capabilities, offering SLA-driven alert notifications, in-depth network discovery, and Microsoft 365 log preservation. Its SOC team efficiently manages monitoring tasks, ensuring genuine threats are prioritized and distractions minimized.
CompassOne enhances cybersecurity by offering email monitoring, app control, and effective threat identification, preventing incidents like a compromised device affecting corporate networks. While prompt in threat reporting, a need exists for detailed analysis and vulnerability scanning. Users seek integration with platforms such as CyberArk and CrowdStrike and support for Linux systems. The platform strengthens security through alert monitoring, virus prevention, account takeover prevention, and establishing a security baseline for both organizational and lab environments, with up to half of an organization's staff utilizing it and expansion plans in progress.
What are the key features of CompassOne?In sectors where security monitoring is crucial, CompassOne is implemented to observe computers, servers, and Office 365 environments, mitigating risks thoughtfully and efficiently. Companies engage its robust MDR functionalities to fend off viruses and account breaches while leveraging its security implementation services for a foundational security setup.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.