No more typing reviews! Try our Samantha, our new voice AI agent.

Cisco Secure Endpoint vs ESET Endpoint Encryption comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
112
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Endpoint Detection and Response (EDR) (6th), Extended Detection and Response (XDR) (5th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (1st)
Cisco Secure Endpoint
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
49
Ranking in other categories
Endpoint Protection Platform (EPP) (32nd), Endpoint Detection and Response (EDR) (26th), Cisco Security Portfolio (8th)
ESET Endpoint Encryption
Average Rating
8.4
Reviews Sentiment
5.1
Number of Reviews
17
Ranking in other categories
Endpoint Encryption (3rd)
 

Mindshare comparison

Endpoint Protection Platform (EPP) Mindshare Distribution
ProductMindshare (%)
Cisco Secure Endpoint1.3%
Microsoft Defender for Endpoint7.0%
CrowdStrike Falcon6.2%
Other85.5%
Endpoint Protection Platform (EPP)
Endpoint Encryption Mindshare Distribution
ProductMindshare (%)
ESET Endpoint Encryption6.6%
Microsoft BitLocker16.5%
Symantec Endpoint Encryption8.1%
Other68.8%
Endpoint Encryption
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
JavedHashmi - PeerSpot reviewer
Chief Technology Officer at Future Point Technologies
Reliable threat protection is achieved while integration and analysis capabilities need refinement
Cisco Secure Endpoint is very good in machine learning, which allows it to secure offline contents even if not connected to the internet. We haven't encountered a single breach after it's deployed. It controls USB devices and has a separate antivirus solution called Tetra, providing security even for real-time, day-zero attacks through its strong Talos threat intelligence platform.
AravindR - PeerSpot reviewer
Technical Team Lead at Exalogic Consulting
Centralized encryption has secured all endpoints and has maintained compliance for remote devices
The best features of ESET Endpoint Encryption include full disk encryption, which is the most used one, ensuring all the endpoints are protected. I rely on this daily. Its main key focus on centralized management lets me monitor, enforce policies, and remediate issues from one console, and it allows for user-friendly deployment. Using ESET Endpoint Encryption has had a clear positive impact on my organization, especially in terms of security operational efficiency. From a security standpoint, I achieved 100% encryption coverage across all the endpoints, which significantly reduces the risk of data breaches due to lost or stolen devices. I also saw a noticeable drop in security incidents.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Their XDR agent and their behavioral indicators of compromise (BIOC) are pretty nice. Their managed threat hunting is also pretty nice. They also have WildFire, which is a service for actively looking for malware. It's quite useful."
"The dashboard is customizable."
"Cortex XDR lets us manage several clients from the same console, and its endpoint defense is more advanced than traditional antivirus."
"Stability is a primary factor, and then there's the ease of distribution and policy management; Cortex XDR by Palo Alto Networks is very easy to work with, and we're quite happy with them."
"Cortex XDR lets us manage several clients from the same console, and its endpoint defense is more advanced than traditional antivirus."
"After deploying Traps, we saw the performance of the network improve by 65 to 70 percent."
"Cortex XDR's most valuable feature is its intelligence-based dashboards."
"The product is very good, it has caught a lot of exploits that most products would not."
"The solution’s most valuable feature is malware protection."
"One of the best features of AMP is its cloud feature. It doesn't matter where the device is in regards to whether it's inside or outside of your network environment, especially right now when everybody's remote and taken their laptops home. You don't have to be VPNed into the environment for AMP to work. AMP will work anywhere in the world, as long as it has an Internet connection. You get protection and reporting with it. No matter where the device is, AMP has still got coverage on it and is protecting it. You still have the ability to manage and remediate things. The cloud feature is the magic bullet. This is what makes the solution a valuable tool as far as I'm concerned."
"The integration with other Cisco products seemed to be really effective. We had Umbrella in place and we were using AnyConnect as well as Firepower. Once a threat was detected, being able to do the threat lookups and the live tracking was really useful."
"With Cisco AMP, Threat Response, and Orbital, we are 100 percent certain that we got every trace of malicious software."
"The most valuable features of this solution are the IPS and the integration with ISE."
"I can't think of a case where a computer was infected and AMP did not let us know or missed it."
"The visibility and insight this solution gives you into threats is pretty granular. It has constant monitoring. You can get onto the device trajectory to look at a threat, but you can also see what happened prior to the threat. You can see what happened after the threat. You can see what other applications were incorporated into the execution of the threat. For example, you have the event, but you see that the event was launched by Google Chrome, which was launched by something else. Then, after the event, something else was launched by whatever the threat was. Therefore, it gives you great detail, a timeline, and continuity of events leading up to whatever the incident is, and then, after. This helps you understand and nail down what the threat is and how to fix it."
"One of the best features of AMP is its cloud feature; it doesn't matter where the device is in regards to whether it's inside or outside of your network environment, especially right now when everybody's remote and taking their laptops home, because you don't have to be VPNed into the environment for AMP to work and AMP will work anywhere in the world as long as it has an Internet connection, giving you protection and reporting so no matter where the device is, AMP has still got coverage on it and is protecting it while you still have the ability to manage and remediate things, making the cloud feature the magic bullet and what makes the solution a valuable tool as far as I'm concerned."
"This solution can be centrally managed."
"The usability is the most valuable feature."
"The most valuable feature of ESET Endpoint Encryption is the high level of encryption protection."
"The most valuable feature of ESET Endpoint Encryption is its rate of capturing viruses and malware."
"Using ESET Endpoint Encryption has had a clear positive impact on my organization, especially in terms of security operational efficiency."
"The scalability is good, it's perfect, I am satisfied."
"It is very secure and we have finally decided to use this after a thorough check. The interface is easy to navigate."
"It is a very stable solution. Stability-wise, I rate the solution a ten out of ten."
 

Cons

"The main issue I could point out is the offline agents and the way that it is missing."
"If Palo Alto reduces the pricing slightly for their products, it would make them more scalable in markets such as India and globally for cybersecurity."
"The solution could improve by providing better integration with their own products and others."
"The solution can never really be an on-premises solution based simply on the way it is set up. It needs metadata to run and improve. Having an on-premises solution would cut it off from making improvements."
"While using Cortex, I noticed some aspects that could be improved, such as increasing the synchronization speed between XDR and Xnor."
"It automatically detects security issues. It should be able to protect our network devices while operating autonomously."
"This product has not improved my organization - in fact, we are in the process of moving back to another product as a result of Cortex's horrible impact on system performance."
"There are some false positives. What our guys would have liked is that it would have been easier to manipulate as soon as they found a false positive that they knew was a false positive. How to do so was not obvious. Some people complained about it. The interface, the ESM, is not user-friendly."
"The thing I hate the most, which they have not fixed, is when it creates duplicate entries within a console."
"In the next release, I would for it to have back up abilities. I would like the ability to go back to a point in time to when my PC was uninfected and to the moment of when the infection happened."
"I would recommend that the solution offer more availability in terms of the product portfolio and integration with third-party products."
"Cisco Secure Endpoint is an expensive solution."
"The thing I hate the most, which they have not fixed, is when it creates duplicate entries within a console. If you have a computer and you upgrade from Windows 7 to Windows 10, or you upgrade your agent from version 6 to 7, it creates a new instance in there instead of updating the information. Instead of paying a license for one computer, I have to license two computers until I manually go in, search for all the duplicate entries, and clean them out myself."
"They could improve the main dashboard to more clearly show me the things that I want to see. When I open the dashboard right now, I see a million things and they are not always the things that I need."
"In terms of the user experience, if the UX design could be much simpler [that would improve things]... if they could make it more intuitive for someone who is not an engineer so that they still can read what's going on in their webpage and understand, that would be something."
"I would like to see integration with Cisco Analytics."
"The solution should have better synchronization with active directory users and passwords for use in the encryption."
"Sometimes the server console is very slow, so the performance could be improved."
"ESET Endpoint Encryption needs to improve pricing and security."
"The product should be more responsive regarding feedback if it detects something in our infrastructure. I believe there's a backend that their engineers use to detect viruses in our system. We would appreciate it if they could promptly provide feedback and give us recommendations on how to better protect our infrastructure beyond their system. Additionally, we hope for improved integration with the other systems we currently use. It would be beneficial if they could collaborate to create something that facilitates integration between these systems."
"From an admin perspective, the solution's UI could be more user-friendly."
"The initial setup could be made easier."
"If you have issues with your network, you can't get updates, which is a problem."
"The overall compatibility of the device is an area where the solution lacks."
 

Pricing and Cost Advice

"It is cost-effective compared to similar solutions. It fits for the small businesses through to the big businesses."
"The pricing is a little bit on the expensive side."
"This is an expensive solution."
"Licensing for Palo Alto Networks Cortex XDR can be costly, especially when it comes to a hundred users. A license is required for each user, and the subscription must be renewed on a yearly basis."
"Cortex XDR by Palo Alto Networks is quite an expensive solution."
"It has reasonable pricing for the use cases it provides to the company."
"The price of the solution could be reduced. I have customers that have voiced that the solution is good for the value but if I want to sell more of the solution the price reduction would help."
"I don't like that they have different types of licenses."
"There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization."
"My company does make annual payments towards the licensing costs of the solution. Cisco Secure Endpoint is a little bit expensive."
"We can know if something bad is potentially happening instantaneously and prevent it from happening. We can go to a device and isolate it before it infects other devices. In our environment, that's millions of dollars saved in a matter of seconds."
"The solution is highly affordable; I believe we pay $2 or $3 per endpoint. It's significantly cheaper than the competitors on the market."
"...the licensing needs to be improved. All the product features we need are there. It's just a matter of the complexity and the different offerings and trying to figure things out."
"It is quite cost-effective. I would rate it ten out of ten."
"Cisco's pricing is reasonable. We also do not need to opt for niche players, which would have charged us significantly more than Cisco for ecosystem solutions. We are highly satisfied with the pricing structure of Cisco's solutions they are reasonable."
"Its price is fair for us."
"ESET Endpoint Encryption is moderately priced."
"On a scale of one to ten, where one is the lowest and ten is the highest, I rate its pricing a two."
"The pricing is mid-ranged and could be more cost-effective."
"It is neither very expensive, nor cheap. Overall it is affordable and there is a long term arrangement between our company and the solution providers for license."
"We paid for an annual subscription, and it was reasonable."
"There are some inexpensive products compared to ESET Endpoint Encryption, but they lack the essential features."
"Instead of installing ESET on each machine at each location, we just do it remotely. This has been a time saver for us."
"The National University System dedicates 500 of their 5000 licenses to us, which is $14/yr per device. Most companies are paying $99 or $120 per device a year."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
895,399 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Construction Company
12%
Comms Service Provider
9%
Manufacturing Company
8%
Manufacturing Company
10%
Comms Service Provider
8%
Government
7%
Financial Services Firm
7%
Comms Service Provider
13%
Computer Software Company
11%
University
9%
Manufacturing Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business47
Midsize Enterprise20
Large Enterprise51
By reviewers
Company SizeCount
Small Business21
Midsize Enterprise15
Large Enterprise21
By reviewers
Company SizeCount
Small Business12
Midsize Enterprise6
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdS...
What needs improvement with Cisco Secure Endpoint?
Cisco Secure Endpoint lacks features like DLP which other vendors offer. XDR is new, so integration capabilities with...
What is your primary use case for Cisco Secure Endpoint?
We deployed Cisco Secure Endpoint for our customers two to three years back. The use case was to secure their endpoin...
What needs improvement with ESET Endpoint Encryption?
ESET Endpoint Encryption could be better as I have experience with Trend Micro encryption, but there are multiple get...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Cisco AMP for Endpoints
No data available
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
CCS Media Limited, Mercury Engineering, Unigarant, Pinewood Healthcare
Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP). Updated: May 2026.
895,399 professionals have used our research since 2012.