"The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
"The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great."
"I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It should protect all kinds of things that might happen on the servers, things that I cannot see."
"Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
"If somebody has been compromised, the question always is: How has it affected other devices in the network? Cisco AMP gives you a very neat view of that."
"Among the most valuable features are the exclusions. And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source."
"The most valuable feature is signature-based malware detection."
"It is extensive in terms of providing visibility and insights into threats. It allows for research into a threat, and you can chart your progress on how you're resolving it."
"We are quite security-focused. Blackberry Protect as an endpoint solution for our service really delivers what we are expecting."
"It does a good job of protecting us."
"CylancePROTECT is very stable - we've had no issues with performance and no errors or bugs."
"Blackberry Protect offers endpoint protection. It's easy to deploy. It's scalable and stable."
"It provides good insight into the programs, applications, or websites that may need attention."
"The solution is very quick at easily changing the levels of protection for each computer and the server."
"A user can continue to add endpoints and the solution will continue to perform well."
"In most cases, the solution's ability to detect in the MITRE framework, and its ability to be able to detect attacks in any one of seven or eight different areas of the life cycle of an attack is very useful."
"The GUI needs improvement, it's not good."
"It could be improved in connection with artificial intelligence and IoT."
"In Orbital, there are tons of prebuilt queries, but there is not a lot of information in lay terms. There isn't enough information to help us with what we're looking for and why we are looking for it with this query. There are probably a dozen queries in there that really focus on what I need to focus on, but they are not always easy to find the first time through."
"They could improve the main dashboard to more clearly show me the things that I want to see. When I open the dashboard right now, I see a million things and they are not always the things that I need."
"The one challenge that I see is the use of multiple endpoint protection platforms. For instance, we have AMP, but we also have Microsoft Windows Defender, System Center Endpoint Protection, and Microsoft Malware Protection Engine deployed. So, we have a bunch of different things that do the same thing. What winds up happening is, e.g., if I get an alert for a potential incident or malware and want to pull the file, I'll go to fetch the file to analyze it. But, one of these other programs has already gotten it, so the file has already been quarantined by another endpoint protection system. AMP doesn't realize that and the file fetch fails, then you're left wondering what's going on."
"We had a lot of noise at the beginning, and we had to turn it down based on exclusions, application whitelisting, and excluding unknown benign applications. Cisco should understand the need for continuous updates on the custom Cisco exclusions and the custom applications that come out-of-the-box with the AMP for Endpoints."
"We don't have issues. We think that Cisco covers all of the security aspects on the market. They continue to innovate in the right way."
"I would like to see integration with Cisco Analytics."
"The company that sells us the licenses sometimes doesn't know how to do certain things."
"Having worked with SentinelOne, Cylance is good, however, it probably needs to add a feature similar to SentinelOne's rollback functionality. With this feature, if you get infected, with a click, you can go back to the pre-infection state. If Cylance could add this functionality to their offering as well, that would be ideal."
"The product needs to continue to offer better alerts. In particular, around false positives. It needs to reduce them from happening."
"The price for this EPP platform is expensive and could be improved."
"It could have integration with industrial base HMIS or Human Machine Interfaces Solutions. This is the industrial environment where you have a control center for all the automation that's happening, whether it is oil, gas, or chemical manufacturing. They often have to set up a computer at the back and watch the other stuff to get alerts. In these autonomous or on-premises environments, they often don't have access to email readily. Integration with other industrial solutions, such as HMIS, will allow them to communicate and get an alert that something has been found. This way, they can react to it sooner than having somebody watch the screen and keep checking the screen. Rockwell has its own suite. Similarly, Honeywell has its own suite. There's also an independent HMI/historian solution provider out there called VTSCADA. We actually get asked if we can get it to show up on a screen, which is difficult. Getting those alerts to work within an industrial environment would be a huge plus."
"The product does not do a lot of reporting on what it is taking care of. Enhanced reporting would be a welcome improvement."
"I'd like them to do software distribution too, but they said that that's architecturally not at the product line."
"We would like to see secure integration and multi-factor authentication to be able to access the administration dashboard."
Cisco Secure Endpoint is ranked 5th in Endpoint Protection for Business (EPP) with 13 reviews while CylancePROTECT is ranked 17th in Endpoint Protection for Business (EPP) with 14 reviews. Cisco Secure Endpoint is rated 8.8, while CylancePROTECT is rated 8.0. The top reviewer of Cisco Secure Endpoint writes "We have gained more visibility into what's going on because it detects a lot of threats". On the other hand, the top reviewer of CylancePROTECT writes "An outstanding product that is pretty spot on and easy to deploy and use". Cisco Secure Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Cortex XDR by Palo Alto Networks, SentinelOne and Malwarebytes, whereas CylancePROTECT is most compared with CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne, Cortex XDR by Palo Alto Networks and Trellix Endpoint Security. See our Cisco Secure Endpoint vs. CylancePROTECT report.
See our list of best Endpoint Protection for Business (EPP) vendors.
We monitor all Endpoint Protection for Business (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.