No more typing reviews! Try our Samantha, our new voice AI agent.

Cisco Secure Endpoint vs ESET Endpoint Encryption comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
110
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Endpoint Detection and Response (EDR) (6th), Extended Detection and Response (XDR) (5th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (1st)
Cisco Secure Endpoint
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
49
Ranking in other categories
Endpoint Protection Platform (EPP) (32nd), Endpoint Detection and Response (EDR) (26th), Cisco Security Portfolio (8th)
ESET Endpoint Encryption
Average Rating
8.4
Reviews Sentiment
5.1
Number of Reviews
17
Ranking in other categories
Endpoint Encryption (3rd)
 

Mindshare comparison

Endpoint Protection Platform (EPP) Mindshare Distribution
ProductMindshare (%)
Cisco Secure Endpoint1.3%
Microsoft Defender for Endpoint7.0%
CrowdStrike Falcon6.2%
Other85.5%
Endpoint Protection Platform (EPP)
Endpoint Encryption Mindshare Distribution
ProductMindshare (%)
ESET Endpoint Encryption6.6%
Microsoft BitLocker16.5%
Symantec Endpoint Encryption8.1%
Other68.8%
Endpoint Encryption
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
JavedHashmi - PeerSpot reviewer
Chief Technology Officer at Future Point Technologies
Reliable threat protection is achieved while integration and analysis capabilities need refinement
Cisco Secure Endpoint is very good in machine learning, which allows it to secure offline contents even if not connected to the internet. We haven't encountered a single breach after it's deployed. It controls USB devices and has a separate antivirus solution called Tetra, providing security even for real-time, day-zero attacks through its strong Talos threat intelligence platform.
AravindR - PeerSpot reviewer
Technical Team Lead at Exalogic Consulting
Centralized encryption has secured all endpoints and has maintained compliance for remote devices
The best features of ESET Endpoint Encryption include full disk encryption, which is the most used one, ensuring all the endpoints are protected. I rely on this daily. Its main key focus on centralized management lets me monitor, enforce policies, and remediate issues from one console, and it allows for user-friendly deployment. Using ESET Endpoint Encryption has had a clear positive impact on my organization, especially in terms of security operational efficiency. From a security standpoint, I achieved 100% encryption coverage across all the endpoints, which significantly reduces the risk of data breaches due to lost or stolen devices. I also saw a noticeable drop in security incidents.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"There has been a significant reduction of approximately 70% to 80% in our internal MTTR and MTTD metrics, now around five to eight minutes whereas previously it was hours, which has helped tremendously."
"Technical support is the best in class, in my opinion, because they have invested heavily in research and development."
"The solution allows control over the user and his machine through Cortex XDR security policies."
"I don't have to do much monitoring with it; I don't have to have anybody manually looking at this, it gives us reports, and it lets us know if something needs to be addressed, and we can easily address it."
"Cortex XDR by Palo Alto Networks has helped lighten the load of our security analysts because it was the major tool that we were using and the one we utilized most."
"Cortex XDR is a very capable solution for protecting large networks and a lot of endpoints. It's very useful because the automation is very high, and if you combine it with the features on Palo Alto firewalls, it provides very strong protection."
"Cortex XDR by Palo Alto Networks saves time in various ways, although the user interface is fairly standard."
"The solution allows us to make investigations. Other XDR solutions also provide similar capabilities but for investigation, Cortex XDR is better."
"Cisco Secure Endpoint enables us to stop a threat before it spreads across our system, which is a massive improvement for us as we couldn't follow threats and respond to them as rapidly when we used other solutions."
"I am told that we get over 100 million emails a month. This filters them down and allows only somewhere about three million emails, which is a great help."
"appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst. I can track everything that happens on our server from my PC or device. Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us."
"I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It should protect all kinds of things that might happen on the servers, things that I cannot see."
"Secure Endpoint has decreased our time to remediate by providing the tools and the integrations we need so we can quickly look across our entire network, look for those threats, and actually make good decisions."
"I can't think of a case where a computer was infected and AMP did not let us know or missed it."
"The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices."
"The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices."
"ESET Endpoint Encryption works as an antivirus system."
"The most valuable feature of ESET Endpoint Encryption is the high level of encryption protection."
"The tech support is awesome."
"The most valuable feature is that everything is done on the server."
"The solution allows me to easily monitor the encryption and password management of multiple computers in my network and gives me visibility into user use."
"The tool does not slow down the computer."
"From the last update, it's easier for me to use."
"The setup is getting easier."
 

Cons

"It is not easy to sell Cortex XDR, not because it isn't a good tool. Its marketing needs to be improved."
"We had a problem with getting our older endpoints up to date, but their newest updates have been really good. I've been pleased with it in terms of what our needs are. It's doing what we want it to do."
"The dashboard is the area that needs to improve so that we can have the ability to drill down without having to go elsewhere to verify results."
"I don't like that they have different types of licenses. For example, if users select a license, they think they will have all the platforms they need to improve their network or security. But after some time, Palo Alto Networks changed their licensing, and some of the features that, for example, were free at the beginning now have a cost. I think the integration can be improved. For example, a lot of tools are just integrated through APIs."
"Cortex XDR is trickier to configure than other Palo Alto products. This is one area where we are not so satisfied."
"There's an overall lack of features."
"We had a problem with getting our older endpoints up to date, but their newest updates have been really good."
"The connection to the internet has not performed as expected."
"They could improve the main dashboard to more clearly show me the things that I want to see. When I open the dashboard right now, I see a million things and they are not always the things that I need."
"I would like more seamless integration, because I have a security solution based on Cisco and I'm looking at integration for the old solution."
"In the next version of this solution, I would like to see the addition of local authentication."
"We don't have issues. We think that Cisco covers all of the security aspects on the market. They continue to innovate in the right way."
"The one challenge that I see is the use of multiple endpoint protection platforms. What winds up happening is, e.g., if I get an alert for a potential incident or malware and want to pull the file, I'll go to fetch the file to analyze it, but one of these other programs has already gotten it, so the file has already been quarantined by another endpoint protection system."
"Maybe there is room for improvement in some of the automated remediation. We have other tools in place that AMP feeds into that allow for that to happen, so I look at it as one seamless solution. But if you're buying AMP all by itself, I don't know if it can remove malicious software after the fact or if it requires the other tools that we use to do some of that."
"The thing I hate the most, which they have not fixed, is when it creates duplicate entries within a console. If you have a computer and you upgrade from Windows 7 to Windows 10, or you upgrade your agent from version 6 to 7, it creates a new instance in there instead of updating the information. Instead of paying a license for one computer, I have to license two computers until I manually go in, search for all the duplicate entries, and clean them out myself."
"The one challenge that I see is the use of multiple endpoint protection platforms. For instance, we have AMP, but we also have Microsoft Windows Defender, System Center Endpoint Protection, and Microsoft Malware Protection Engine deployed. So, we have a bunch of different things that do the same thing. What winds up happening is, e.g., if I get an alert for a potential incident or malware and want to pull the file, I'll go to fetch the file to analyze it. But, one of these other programs has already gotten it, so the file has already been quarantined by another endpoint protection system. AMP doesn't realize that and the file fetch fails, then you're left wondering what's going on."
"The overall compatibility of the device is an area where the solution lacks."
"The product should be more responsive regarding feedback if it detects something in our infrastructure. I believe there's a backend that their engineers use to detect viruses in our system. We would appreciate it if they could promptly provide feedback and give us recommendations on how to better protect our infrastructure beyond their system. Additionally, we hope for improved integration with the other systems we currently use. It would be beneficial if they could collaborate to create something that facilitates integration between these systems."
"There could be an option for users to restart the system without a password."
"Sometimes the server console is very slow, so the performance could be improved."
"The solution should have better synchronization with active directory users and passwords for use in the encryption."
"The solution should have better synchronization with active directory users and passwords for use in the encryption."
"I would like to see better compatibility with mobile devices. Most of the time, people are connecting to our server using their mobile device."
"For me, it is unstable."
 

Pricing and Cost Advice

"The price of the solution is high for the license and in general."
"The cost of Cortex XDR by Palo Alto Networks is $55 to $90 USD per endpoint per month."
"It is present, but when compared to other competitive products, I would say it is not less expensive; however, when all of the other added values are considered, the price is reasonable."
"I don't like that they have different types of licenses."
"I did PoCs on products called Cylance and CrowdStrike. Although, I consider these products and they were also good, when it come to cost and budgetary factors, Traps has been proven to be better than the other two products. It is quite cost-effective and delivers all the entire solution which we require."
"It has reasonable pricing for the use cases it provides to the company."
"I don't have any issues with the pricing. We are satisfied with the price."
"It's way too expensive, but security is expensive. You pay for your licensing, and then you pay for someone to monitor the stuff."
"You must make monthly payments towards the licensing charges attached to the product. There are no extra charges apart from the standard licensing fees associated with the product."
"We have a license for 3,000 users and if we get up to 3,100 users, it doesn't stop working, but on the next renewal date you're supposed to go in there and add that extra 100 licenses. It's really good that they let you grow and expand and then pay for it. Sometimes, with other products, you overuse a license and they just don't work."
"The solution is highly affordable; I believe we pay $2 or $3 per endpoint. It's significantly cheaper than the competitors on the market."
"The price is very fair to the customer."
"Licensing fees are on a yearly basis and I am happy with the pricing."
"I rate the pricing a five or six on a scale of one to ten, where one is expensive, and ten is cheap."
"It is quite cost-effective. I would rate it ten out of ten."
"Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc."
"It is neither very expensive, nor cheap. Overall it is affordable and there is a long term arrangement between our company and the solution providers for license."
"The pricing is mid-ranged and could be more cost-effective."
"ESET Endpoint Encryption is moderately priced."
"Licensing costs are on a yearly basis."
"We paid for an annual subscription, and it was reasonable."
"Instead of installing ESET on each machine at each location, we just do it remotely. This has been a time saver for us."
"There are some inexpensive products compared to ESET Endpoint Encryption, but they lack the essential features."
"On a scale of one to ten, where one is the lowest and ten is the highest, I rate its pricing a two."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
894,738 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Construction Company
12%
Comms Service Provider
9%
Manufacturing Company
8%
Manufacturing Company
10%
Comms Service Provider
8%
Government
7%
Financial Services Firm
7%
Comms Service Provider
13%
Computer Software Company
11%
University
9%
Manufacturing Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business46
Midsize Enterprise20
Large Enterprise49
By reviewers
Company SizeCount
Small Business21
Midsize Enterprise15
Large Enterprise21
By reviewers
Company SizeCount
Small Business12
Midsize Enterprise6
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdS...
What needs improvement with Cisco Secure Endpoint?
Cisco Secure Endpoint lacks features like DLP which other vendors offer. XDR is new, so integration capabilities with...
What needs improvement with ESET Endpoint Encryption?
ESET Endpoint Encryption could be better as I have experience with Trend Micro encryption, but there are multiple get...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Cisco AMP for Endpoints
No data available
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
CCS Media Limited, Mercury Engineering, Unigarant, Pinewood Healthcare
Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP). Updated: May 2026.
894,738 professionals have used our research since 2012.