Try our new research platform with insights from 80,000+ expert users

Cisco Secure Endpoint vs ESET Endpoint Encryption comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
106
Ranking in other categories
Endpoint Protection Platform (EPP) (5th), Endpoint Detection and Response (EDR) (7th), Extended Detection and Response (XDR) (6th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (2nd)
Cisco Secure Endpoint
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
49
Ranking in other categories
Endpoint Protection Platform (EPP) (34th), Endpoint Detection and Response (EDR) (25th), Cisco Security Portfolio (7th)
ESET Endpoint Encryption
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
15
Ranking in other categories
Endpoint Encryption (4th)
 

Mindshare comparison

Endpoint Protection Platform (EPP) Mindshare Distribution
ProductMindshare (%)
Cisco Secure Endpoint1.3%
Microsoft Defender for Endpoint7.8%
CrowdStrike Falcon6.6%
Other84.3%
Endpoint Protection Platform (EPP)
Endpoint Encryption Mindshare Distribution
ProductMindshare (%)
ESET Endpoint Encryption9.8%
Microsoft BitLocker20.1%
Symantec Endpoint Encryption8.3%
Other61.8%
Endpoint Encryption
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
JavedHashmi - PeerSpot reviewer
Chief Technology Officer at Future Point Technologies
Reliable threat protection is achieved while integration and analysis capabilities need refinement
Cisco Secure Endpoint is very good in machine learning, which allows it to secure offline contents even if not connected to the internet. We haven't encountered a single breach after it's deployed. It controls USB devices and has a separate antivirus solution called Tetra, providing security even for real-time, day-zero attacks through its strong Talos threat intelligence platform.
reviewer2674917 - PeerSpot reviewer
Manager, Information Technology at a healthcare company with 201-500 employees
encryption works well but needs a fix for compatibility with the latest Windows version
I have used it in the past because it works quite well for encryption. It's better than trying to just use BitLocker, which is a pain from a management standpoint. It works up to this point. My issue is that I need to roll it out on new machines, and I can't get the application to work correctly. It's encrypted at rest, so I can't use the data if I'm not logged in correctly into the laptop with the correct user credentials.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cortex XDR features advanced threat detection capabilities."
"The solution allows control over the user and his machine through Cortex XDR security policies."
"Cortex XDR by Palo Alto Networks has helped lighten the load of our security analysts because it was the major tool that we were using and the one we utilized most."
"The solution's most valuable feature is its ability to rapidly detect certain hardware files."
"If the user leaves our premises or network, Palo Alto Traps will still be on that endpoint and will still apply our policies."
"Cortex XDR is a very capable solution for protecting large networks and a lot of endpoints. It's very useful because the automation is very high, and if you combine it with the features on Palo Alto firewalls, it provides very strong protection."
"Traps is quite a stable product. Once it was properly deployed and configured, you have nothing to be worried about."
"The solution doesn't need a high level of technical training."
"Integration is a key selling factor for Cisco security products. We have a Cisco Enterprise Agreement with access to Cisco Email Security, Cisco Firepower, Cisco Stealthwatch, Cisco Talos, Cisco Threat Grid, Cisco Umbrella, and also third-party solutions. This is key to our security and maximizing operations. Because we do have the Email Security appliance and it is integrated with Threat Response, we have everything tied together. Additionally, we are using the Cisco SecureX platform, as we were a beta test for that new solution. With SecureX, we are able to pull all those applications into one pane for visibility and maintenance. This greatly maximizes our security operations."
"Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP."
"The entirety of our network infrastructure is Cisco and the most valuable feature is the integration."
"Its most valuable features are its scalability and advanced threat protection for customers."
"The integration with other Cisco products seemed to be really effective. We had Umbrella in place and we were using AnyConnect as well as Firepower. Once a threat was detected, being able to do the threat lookups and the live tracking was really useful."
"There are no issues or drops in the solution's performance...The solution's technical support was helpful."
"The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great."
"The stability of the solution is perfect. I believe it's the most stable solution on the market right now."
"The tool does not slow down the computer."
"The most valuable feature of ESET Endpoint Encryption is the high level of encryption protection."
"It is very secure and we have finally decided to use this after a thorough check. The interface is easy to navigate."
"The solution's UI is user-friendly. Even a non-technical person can use it."
"I have used it in the past because it works quite well for encryption."
"The most valuable feature of ESET Endpoint Encryption is its rate of capturing viruses and malware."
"ESET Endpoint Encryption works as an antivirus system."
"This solution can be centrally managed."
 

Cons

"Cortex XDR by Palo Alto Networks could improve by adding a sandbox feature to better compete with their competitors which have it."
"I would like to see better protection, specifically to protect email applications."
"The solution should force customers to integrate with network traffic to see the full benefits of XDR."
"They've been having some issues with updating their endpoint agents, and it has been quite frustrating."
"It should support more mobile operating systems. That is one of the cons of their infrastructure right now."
"Although I would say this product is highly-rated, it could probably do more because nothing does everything that you want."
"Dashboards do not allow everyone to see what's happening."
"For Cortex XDR by Palo Alto Networks, if I had to point out improvements, I would say the UI is still somewhat difficult for beginners."
"It's pretty good as it is, but its cost could be improved."
"...the greatest value of all, would be to make the security into a single pane of glass. Whilst these products are largely integrated from a Talos perspective, they're not integrated from a portal perspective. For example, we have to look at an Umbrella portal and a separate AMP portal. We also have to look at a separate portal for the firewalls. If I could wave a magic wand and have one thing, I would put all the Cisco products into one, simple management portal."
"We don't have issues. We think that Cisco covers all of the security aspects on the market. They continue to innovate in the right way."
"This product has issues with the number of false positives that it reports."
"Due to the complexity of the technology that is used and its advanced threat detection capabilities, it is possible to encounter many delays in operation."
"In terms of the user experience, if the UX design could be much simpler [that would improve things]... if they could make it more intuitive for someone who is not an engineer so that they still can read what's going on in their webpage and understand, that would be something."
"The one challenge that I see is the use of multiple endpoint protection platforms. For instance, we have AMP, but we also have Microsoft Windows Defender, System Center Endpoint Protection, and Microsoft Malware Protection Engine deployed. So, we have a bunch of different things that do the same thing. What winds up happening is, e.g., if I get an alert for a potential incident or malware and want to pull the file, I'll go to fetch the file to analyze it. But, one of these other programs has already gotten it, so the file has already been quarantined by another endpoint protection system. AMP doesn't realize that and the file fetch fails, then you're left wondering what's going on."
"I would like them to add whatever makes filtering more advanced in scanning and blocking for malware in emails."
"The product should be more responsive regarding feedback if it detects something in our infrastructure. I believe there's a backend that their engineers use to detect viruses in our system. We would appreciate it if they could promptly provide feedback and give us recommendations on how to better protect our infrastructure beyond their system. Additionally, we hope for improved integration with the other systems we currently use. It would be beneficial if they could collaborate to create something that facilitates integration between these systems."
"I would like to see better compatibility with mobile devices."
"If you have issues with your network, you can't get updates, which is a problem."
"The initial setup could be made easier."
"I would like more robust reporting as part of the Remote Administrator."
"There should be more frequent updates."
"ESET Endpoint Encryption needs to improve pricing and security."
"The solution should have better synchronization with active directory users and passwords for use in the encryption."
 

Pricing and Cost Advice

"Compared to CrowdStrike, Cortex XDR is an expensive solution."
"The price of the solution is high for the license and in general."
"It is "expensive" and flexible."
"The pricing is a little high. It is per user per year."
"This is an expensive solution."
"It's about $55 per license on a yearly basis."
"The tool's price is moderate."
"Our customers have expressed that the price is high."
"It can always be cheaper."
"You must make monthly payments towards the licensing charges attached to the product. There are no extra charges apart from the standard licensing fees associated with the product."
"We can know if something bad is potentially happening instantaneously and prevent it from happening. We can go to a device and isolate it before it infects other devices. In our environment, that's millions of dollars saved in a matter of seconds."
"I rate the pricing a five or six on a scale of one to ten, where one is expensive, and ten is cheap."
"Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc."
"The price is very good."
"The price is very fair to the customer."
"The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost."
"There are some inexpensive products compared to ESET Endpoint Encryption, but they lack the essential features."
"The National University System dedicates 500 of their 5000 licenses to us, which is $14/yr per device. Most companies are paying $99 or $120 per device a year."
"We paid for an annual subscription, and it was reasonable."
"The pricing is mid-ranged and could be more cost-effective."
"It is neither very expensive, nor cheap. Overall it is affordable and there is a long term arrangement between our company and the solution providers for license."
"Instead of installing ESET on each machine at each location, we just do it remotely. This has been a time saver for us."
"ESET Endpoint Encryption is moderately priced."
"On a scale of one to ten, where one is the lowest and ten is the highest, I rate its pricing a two."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
883,760 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
10%
Financial Services Firm
9%
Manufacturing Company
9%
Comms Service Provider
7%
Manufacturing Company
11%
Computer Software Company
10%
Government
8%
Comms Service Provider
6%
Computer Software Company
12%
Comms Service Provider
12%
Manufacturing Company
9%
University
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business44
Midsize Enterprise20
Large Enterprise47
By reviewers
Company SizeCount
Small Business21
Midsize Enterprise14
Large Enterprise21
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise5
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdS...
What needs improvement with Cisco Secure Endpoint?
Cisco Secure Endpoint lacks features like DLP which other vendors offer. XDR is new, so integration capabilities with...
What needs improvement with ESET Endpoint Encryption?
My problem is that there's a technical glitch and they don't have a fix for it. It's not working with the latest vers...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Cisco AMP for Endpoints
No data available
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
CCS Media Limited, Mercury Engineering, Unigarant, Pinewood Healthcare
Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP). Updated: February 2026.
883,760 professionals have used our research since 2012.