Try our new research platform with insights from 80,000+ expert users

Cisco Secure Endpoint vs ESET Endpoint Encryption comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
108
Ranking in other categories
Endpoint Protection Platform (EPP) (5th), Endpoint Detection and Response (EDR) (7th), Extended Detection and Response (XDR) (6th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (2nd)
Cisco Secure Endpoint
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
49
Ranking in other categories
Endpoint Protection Platform (EPP) (34th), Endpoint Detection and Response (EDR) (25th), Cisco Security Portfolio (7th)
ESET Endpoint Encryption
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
15
Ranking in other categories
Endpoint Encryption (4th)
 

Mindshare comparison

Endpoint Protection Platform (EPP) Mindshare Distribution
ProductMindshare (%)
Cisco Secure Endpoint1.3%
Microsoft Defender for Endpoint7.8%
CrowdStrike Falcon6.6%
Other84.3%
Endpoint Protection Platform (EPP)
Endpoint Encryption Mindshare Distribution
ProductMindshare (%)
ESET Endpoint Encryption9.8%
Microsoft BitLocker20.1%
Symantec Endpoint Encryption8.3%
Other61.8%
Endpoint Encryption
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
JavedHashmi - PeerSpot reviewer
Chief Technology Officer at Future Point Technologies
Reliable threat protection is achieved while integration and analysis capabilities need refinement
Cisco Secure Endpoint is very good in machine learning, which allows it to secure offline contents even if not connected to the internet. We haven't encountered a single breach after it's deployed. It controls USB devices and has a separate antivirus solution called Tetra, providing security even for real-time, day-zero attacks through its strong Talos threat intelligence platform.
reviewer2674917 - PeerSpot reviewer
Manager, Information Technology at a healthcare company with 201-500 employees
encryption works well but needs a fix for compatibility with the latest Windows version
I have used it in the past because it works quite well for encryption. It's better than trying to just use BitLocker, which is a pain from a management standpoint. It works up to this point. My issue is that I need to roll it out on new machines, and I can't get the application to work correctly. It's encrypted at rest, so I can't use the data if I'm not logged in correctly into the laptop with the correct user credentials.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution allows control over the user and his machine through Cortex XDR security policies."
"The positive impacts I see from Cortex XDR by Palo Alto Networks include a complete 360-degree view of our security posture altogether, being a uniform platform where we are ingesting logs from multiple resources."
"Palo Alto Networks Traps improves our security posture and lowers risk by providing next-gen methods to combat against modern threats on all the major platforms."
"Traps pays for itself within the first 16 months of a three-year subscription."
"Cortex is the best tool for endpoint detection, with playbooks that automate and gather endpoint logs, block malicious processes, and update incident tickets, showcasing end-to-end processes with automation in investigation and reducing the analysis workflow."
"Technical support is the best in class, in my opinion, because they have invested heavily in research and development."
"They have a new GUI which is just fantastic."
"The solution helps find bugs, and it is safe to use to prevent attacks by hackers."
"I am told that we get over 100 million emails a month. This filters them down and allows only somewhere about three million emails, which is a great help."
"Integration is a key selling factor for Cisco security products. We have a Cisco Enterprise Agreement with access to Cisco Email Security, Cisco Firepower, Cisco Stealthwatch, Cisco Talos, Cisco Threat Grid, Cisco Umbrella, and also third-party solutions. This is key to our security and maximizing operations. Because we do have the Email Security appliance and it is integrated with Threat Response, we have everything tied together. Additionally, we are using the Cisco SecureX platform, as we were a beta test for that new solution. With SecureX, we are able to pull all those applications into one pane for visibility and maintenance. This greatly maximizes our security operations."
"We have seen a measurable decrease in the mean time to detect or respond to threats by 90 percent, blocking a vast majority of threats."
"We have been very happy with it."
"Real-time threat prevention using sandboxing, file trajectory, and retrospective security."
"The best feature that we found most valuable, is actually the security product for the endpoint, formerly known as AMP. It has behavioral analytics, so you can be more proactive toward zero-day threats. I found that quite good."
"The product itself is pretty reliable. The security features that it has make it reliable."
"The solution is easy to deploy and applies multi-factor authentication."
"The initial setup is easy."
"ESET is a product that I recommend people switch to for encrypting their documents."
"ESET Endpoint Encryption works as an antivirus system."
"The most valuable feature of ESET Endpoint Encryption is the high level of encryption protection."
"It is very secure and we have finally decided to use this after a thorough check. The interface is easy to navigate."
"The scalability is good, it's perfect, I am satisfied."
"The usability is the most valuable feature."
"I have used it in the past because it works quite well for encryption."
 

Cons

"In an upcoming release, the solution could improve by proving hard disk encryption. If it could support this it would be a complete solution."
"We would also like to have advanced tech protection and email scanning."
"It would be good to have a better way to search for a file within the UI."
"The GUI could be improved."
"It is an enterprise-level solution. Its price could be less expensive."
"There are some limitations on the Traps agents."
"The installation should be easier and the Palo Alto pre-sales and sales teams should have more information on the product because they don't know what they are selling."
"Product might have some bugs."
"I would recommend that the solution offer more availability in terms of the product portfolio and integration with third-party products."
"On the firewall level, they were lagging a little bit behind, but they are running up again. I have full trust in the new 3000 series of firewalls where we would also be able to look more into the traffic that we're monitoring and get more security layers in our services. That would definitely be a big step."
"The connector updates are very easily done now, and that's improving. Previously, the connector had an issue, where almost every time it needed to be updated, it required a machine reboot. This was always a bit of an inconvenience and a bug. Because with a lot of software now, you don't need to do that and shouldn't need to be rebooting all the time."
"In the next release, I would for it to have back up abilities. I would like the ability to go back to a point in time to when my PC was uninfected and to the moment of when the infection happened."
"I would like to see integration with Cisco Analytics."
"In the next version of this solution, I would like to see the addition of local authentication."
"The room for improvement would be on event notifications. I do feel that if you subscribe to all the event notification types out-of-the-box, or don't really go through and take the time to filter out events, the notifications can become overwhelming with information."
"The thing I hate the most, which they have not fixed, is when it creates duplicate entries within a console. If you have a computer and you upgrade from Windows 7 to Windows 10, or you upgrade your agent from version 6 to 7, it creates a new instance in there instead of updating the information. Instead of paying a license for one computer, I have to license two computers until I manually go in, search for all the duplicate entries, and clean them out myself."
"Integration with central management needs improvement."
"If you have issues with your network, you can't get updates, which is a problem."
"Sometimes the server console is very slow, so the performance could be improved."
"There could be an option for users to restart the system without a password."
"The overall compatibility of the device is an area where the solution lacks."
"The product should be more responsive regarding feedback if it detects something in our infrastructure. I believe there's a backend that their engineers use to detect viruses in our system. We would appreciate it if they could promptly provide feedback and give us recommendations on how to better protect our infrastructure beyond their system. Additionally, we hope for improved integration with the other systems we currently use. It would be beneficial if they could collaborate to create something that facilitates integration between these systems."
"ESET Endpoint Encryption needs to improve pricing and security."
"The solution should have better synchronization with active directory users and passwords for use in the encryption."
 

Pricing and Cost Advice

"Its pricing is kind of in line with its competitors and everybody else out there."
"It has a yearly renewal."
"The solution has one subscription for endpoint protection and one subscription for detection and response. The two licenses combined give you the BRO version."
"It is cost-effective compared to similar solutions. It fits for the small businesses through to the big businesses."
"Cortex XDR is a costly solution."
"The tool's price is moderate."
"The solution is expensive. It's pricing is on a yearly-basis."
"We didn't have to pay any additional fee for the cloud instance. It just came with the renewal, which was nice."
"Cisco Secure Endpoint is not too expensive and it's not cheap. It's quite fair."
"The price is very fair to the customer."
"Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection."
"Licensing fees are on a yearly basis and I am happy with the pricing."
"The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost."
"The pricing and licensing fees are okay."
"Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc."
"I rate the pricing a five or six on a scale of one to ten, where one is expensive, and ten is cheap."
"There are some inexpensive products compared to ESET Endpoint Encryption, but they lack the essential features."
"Licensing costs are on a yearly basis."
"ESET Endpoint Encryption is moderately priced."
"We paid for an annual subscription, and it was reasonable."
"On a scale of one to ten, where one is the lowest and ten is the highest, I rate its pricing a two."
"The National University System dedicates 500 of their 5000 licenses to us, which is $14/yr per device. Most companies are paying $99 or $120 per device a year."
"The pricing is mid-ranged and could be more cost-effective."
"Instead of installing ESET on each machine at each location, we just do it remotely. This has been a time saver for us."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
885,264 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
8%
Computer Software Company
8%
Financial Services Firm
8%
Comms Service Provider
7%
Manufacturing Company
10%
Computer Software Company
9%
Government
8%
Healthcare Company
6%
Comms Service Provider
12%
Computer Software Company
12%
Manufacturing Company
10%
University
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business44
Midsize Enterprise20
Large Enterprise47
By reviewers
Company SizeCount
Small Business21
Midsize Enterprise14
Large Enterprise21
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise5
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdS...
What needs improvement with Cisco Secure Endpoint?
Cisco Secure Endpoint lacks features like DLP which other vendors offer. XDR is new, so integration capabilities with...
What needs improvement with ESET Endpoint Encryption?
My problem is that there's a technical glitch and they don't have a fix for it. It's not working with the latest vers...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Cisco AMP for Endpoints
No data available
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
CCS Media Limited, Mercury Engineering, Unigarant, Pinewood Healthcare
Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP). Updated: February 2026.
885,264 professionals have used our research since 2012.