Try our new research platform with insights from 80,000+ expert users

Cisco Secure Endpoint vs ESET Endpoint Encryption comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Endpoint
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
49
Ranking in other categories
Endpoint Protection Platform (EPP) (35th), Endpoint Detection and Response (EDR) (27th), Cisco Security Portfolio (6th)
ESET Endpoint Encryption
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
15
Ranking in other categories
Endpoint Encryption (4th)
 

Mindshare comparison

While both are Endpoint Security solutions, they serve different purposes. Cisco Secure Endpoint is designed for Endpoint Protection Platform (EPP) and holds a mindshare of 1.3%, down 1.5% compared to last year.
ESET Endpoint Encryption, on the other hand, focuses on Endpoint Encryption, holds 10.5% mindshare, down 19.4% since last year.
Endpoint Protection Platform (EPP) Market Share Distribution
ProductMarket Share (%)
Cisco Secure Endpoint1.3%
Microsoft Defender for Endpoint7.8%
CrowdStrike Falcon6.7%
Other84.2%
Endpoint Protection Platform (EPP)
Endpoint Encryption Market Share Distribution
ProductMarket Share (%)
ESET Endpoint Encryption10.5%
Microsoft BitLocker21.6%
Symantec Endpoint Encryption8.3%
Other59.599999999999994%
Endpoint Encryption
 

Featured Reviews

JavedHashmi - PeerSpot reviewer
Chief Technology Officer at Future Point Technologies
Reliable threat protection is achieved while integration and analysis capabilities need refinement
Cisco Secure Endpoint is very good in machine learning, which allows it to secure offline contents even if not connected to the internet. We haven't encountered a single breach after it's deployed. It controls USB devices and has a separate antivirus solution called Tetra, providing security even for real-time, day-zero attacks through its strong Talos threat intelligence platform.
reviewer2674917 - PeerSpot reviewer
Manager, Information Technology at a healthcare company with 201-500 employees
encryption works well but needs a fix for compatibility with the latest Windows version
I have used it in the past because it works quite well for encryption. It's better than trying to just use BitLocker, which is a pain from a management standpoint. It works up to this point. My issue is that I need to roll it out on new machines, and I can't get the application to work correctly. It's encrypted at rest, so I can't use the data if I'm not logged in correctly into the laptop with the correct user credentials.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst. I can track everything that happens on our server from my PC or device. Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us."
"The console feature gives a centralized management of what's going on, and if something happens, it gives you an alert. So, that's the most important feature for me."
"The most valuable features of this solution are the IPS and the integration with ISE."
"It provides real-time visibility and control over endpoints, allowing its users to promptly respond to any security incidents and remediate any vulnerabilities."
"The visibility and insight this solution gives you into threats is pretty granular. It has constant monitoring. You can get onto the device trajectory to look at a threat, but you can also see what happened prior to the threat. You can see what happened after the threat. You can see what other applications were incorporated into the execution of the threat. For example, you have the event, but you see that the event was launched by Google Chrome, which was launched by something else. Then, after the event, something else was launched by whatever the threat was. Therefore, it gives you great detail, a timeline, and continuity of events leading up to whatever the incident is, and then, after. This helps you understand and nail down what the threat is and how to fix it."
"The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
"It's quite simple, and the advantage I see is that I get the trajectory of what happened inside the network, how a file has been transmitted to the workstation, and which files have got corrupted."
"The most valuable feature is signature-based malware detection."
"ESET Endpoint Encryption works as an antivirus system."
"The most valuable feature of ESET Endpoint Encryption is its rate of capturing viruses and malware."
"The solution's UI is user-friendly. Even a non-technical person can use it."
"The product is easy to implement and configure."
"The most valuable feature of ESET Endpoint Encryption is the high level of encryption protection."
"This solution can be centrally managed."
"The initial setup is easy."
"The setup is getting easier."
 

Cons

"In the next version of this solution, I would like to see the addition of local authentication."
"...the greatest value of all, would be to make the security into a single pane of glass. Whilst these products are largely integrated from a Talos perspective, they're not integrated from a portal perspective. For example, we have to look at an Umbrella portal and a separate AMP portal. We also have to look at a separate portal for the firewalls. If I could wave a magic wand and have one thing, I would put all the Cisco products into one, simple management portal."
"It cannot currently block URLs over websites."
"The initial setup of Cisco Secure Endpoint is complex."
"Cisco is good in terms of threat intelligence plus machine learning-based solutions, but we feel Cisco is lagging behind in using artificial intelligence in its systems."
"On the firewall level, they were lagging a little bit behind, but they are running up again. I have full trust in the new 3000 series of firewalls where we would also be able to look more into the traffic that we're monitoring and get more security layers in our services. That would definitely be a big step."
"The room for improvement would be on event notifications. I have mine tuned fairly well. I do feel that if you subscribe to all the event notification types out-of-the-box, or don't really go through and take the time to filter out events, the notifications can become overwhelming with information. Sometimes, when you're overwhelmed with information, you just say, "I'm not going to look at anything because I'm receiving so much." I recommend the vendor come up with a white paper on the best practices for event notifications."
"They could improve the main dashboard to more clearly show me the things that I want to see. When I open the dashboard right now, I see a million things and they are not always the things that I need."
"If you have issues with your network, you can't get updates, which is a problem."
"The initial setup could be made easier."
"There should be more frequent updates."
"My problem is that there's a technical glitch and they don't have a fix for it. It's not working with the latest version of Windows, which is a problem."
"The overall compatibility of the device is an area where the solution lacks."
"From an admin perspective, the solution's UI could be more user-friendly."
"I would like to see better compatibility with mobile devices."
"Integration with central management needs improvement."
 

Pricing and Cost Advice

"I rate the pricing a five or six on a scale of one to ten, where one is expensive, and ten is cheap."
"The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost."
"The solution's price is about the same as that of Palo Alto solutions."
"There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization."
"Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection."
"It is a subscription-based product."
"We can know if something bad is potentially happening instantaneously and prevent it from happening. We can go to a device and isolate it before it infects other devices. In our environment, that's millions of dollars saved in a matter of seconds."
"Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc."
"The pricing is mid-ranged and could be more cost-effective."
"On a scale of one to ten, where one is the lowest and ten is the highest, I rate its pricing a two."
"There are some inexpensive products compared to ESET Endpoint Encryption, but they lack the essential features."
"Instead of installing ESET on each machine at each location, we just do it remotely. This has been a time saver for us."
"Licensing costs are on a yearly basis."
"We paid for an annual subscription, and it was reasonable."
"It is neither very expensive, nor cheap. Overall it is affordable and there is a long term arrangement between our company and the solution providers for license."
"ESET Endpoint Encryption is moderately priced."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
881,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Manufacturing Company
10%
Government
8%
Healthcare Company
6%
Computer Software Company
14%
Comms Service Provider
13%
Government
8%
University
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business21
Midsize Enterprise14
Large Enterprise21
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise5
 

Questions from the Community

What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdStrike, Microsoft Defender, or SentinelOne.
What needs improvement with Cisco Secure Endpoint?
Cisco Secure Endpoint lacks features like DLP which other vendors offer. XDR is new, so integration capabilities with third-party tools need improvement. The forensic capabilities need enhancement,...
What needs improvement with ESET Endpoint Encryption?
My problem is that there's a technical glitch and they don't have a fix for it. It's not working with the latest version of Windows, which is a problem. My hands are kind of tied.
 

Also Known As

Cisco AMP for Endpoints
No data available
 

Overview

 

Sample Customers

Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
CCS Media Limited, Mercury Engineering, Unigarant, Pinewood Healthcare
Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP). Updated: January 2026.
881,384 professionals have used our research since 2012.