No more typing reviews! Try our Samantha, our new voice AI agent.

Cisco Secure Endpoint vs ESET Endpoint Encryption comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
110
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Endpoint Detection and Response (EDR) (7th), Extended Detection and Response (XDR) (6th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (1st)
Cisco Secure Endpoint
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
49
Ranking in other categories
Endpoint Protection Platform (EPP) (34th), Endpoint Detection and Response (EDR) (26th), Cisco Security Portfolio (8th)
ESET Endpoint Encryption
Average Rating
8.4
Reviews Sentiment
5.1
Number of Reviews
17
Ranking in other categories
Endpoint Encryption (4th)
 

Mindshare comparison

Endpoint Protection Platform (EPP) Mindshare Distribution
ProductMindshare (%)
Cisco Secure Endpoint1.3%
Microsoft Defender for Endpoint7.2%
CrowdStrike Falcon6.3%
Other85.2%
Endpoint Protection Platform (EPP)
Endpoint Encryption Mindshare Distribution
ProductMindshare (%)
ESET Endpoint Encryption8.0%
Microsoft BitLocker17.8%
Symantec Endpoint Encryption7.9%
Other66.3%
Endpoint Encryption
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
JavedHashmi - PeerSpot reviewer
Chief Technology Officer at Future Point Technologies
Reliable threat protection is achieved while integration and analysis capabilities need refinement
Cisco Secure Endpoint is very good in machine learning, which allows it to secure offline contents even if not connected to the internet. We haven't encountered a single breach after it's deployed. It controls USB devices and has a separate antivirus solution called Tetra, providing security even for real-time, day-zero attacks through its strong Talos threat intelligence platform.
AravindR - PeerSpot reviewer
Tech Lead at Exologic
Centralized encryption has secured all endpoints and has maintained compliance for remote devices
The best features of ESET Endpoint Encryption include full disk encryption, which is the most used one, ensuring all the endpoints are protected. I rely on this daily. Its main key focus on centralized management lets me monitor, enforce policies, and remediate issues from one console, and it allows for user-friendly deployment. Using ESET Endpoint Encryption has had a clear positive impact on my organization, especially in terms of security operational efficiency. From a security standpoint, I achieved 100% encryption coverage across all the endpoints, which significantly reduces the risk of data breaches due to lost or stolen devices. I also saw a noticeable drop in security incidents.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The information the dashboard provides is very clear."
"The stability of this product is very good."
"The most valuable features are incident creation, policy-based protection, IP whitelisting, and device encryption. These are beneficial for endpoint and server security."
"The most valuable feature of Cortex XDR by Palo Alto Networks is its machine-learning capabilities. Additionally, there is full integration with other solutions."
"The most valuable for us is the correlation feature."
"I generally believe that Cortex XDR by Palo Alto Networks is probably the best in the market right now."
"The user interface of the solution is sophisticated and straightforward."
"The product is very good, it has caught a lot of exploits that most products would not."
"The product itself is pretty reliable. The security features that it has make it reliable."
"The Cisco environment has been perfect."
"One of the best features of AMP is its cloud feature; it doesn't matter where the device is in regards to whether it's inside or outside of your network environment, especially right now when everybody's remote and taking their laptops home, because you don't have to be VPNed into the environment for AMP to work and AMP will work anywhere in the world as long as it has an Internet connection, giving you protection and reporting so no matter where the device is, AMP has still got coverage on it and is protecting it while you still have the ability to manage and remediate things, making the cloud feature the magic bullet and what makes the solution a valuable tool as far as I'm concerned."
"I did the initial setup myself and it was really easy and straightforward."
"appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst. I can track everything that happens on our server from my PC or device. Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us."
"One of the best features of AMP is its cloud feature. It doesn't matter where the device is in regards to whether it's inside or outside of your network environment, especially right now when everybody's remote and taken their laptops home. You don't have to be VPNed into the environment for AMP to work. AMP will work anywhere in the world, as long as it has an Internet connection. You get protection and reporting with it. No matter where the device is, AMP has still got coverage on it and is protecting it. You still have the ability to manage and remediate things. The cloud feature is the magic bullet. This is what makes the solution a valuable tool as far as I'm concerned."
"If somebody has been compromised, the question always is: How has it affected other devices in the network? Cisco AMP gives you a very neat view of that."
"Definitely, the best feature for Cisco Secure Endpoint is the integration with Talos. On the backend, Talos checks all the signatures, all the malware, and for any attacks going on around the world... Because Secure Endpoint has a connection to it, we get protected by it right then and there."
"ESET Endpoint Encryption works as an antivirus system."
"The initial setup is easy."
"The best features that ESET Endpoint Encryption offers are full disk encryption and drive encryption, which are part of the solution and which I rely on the most."
"The setup is getting easier."
"Using ESET Endpoint Encryption has had a clear positive impact on my organization, especially in terms of security operational efficiency."
"The most valuable feature is that everything is done on the server."
"The usability is the most valuable feature."
"The product is easy to implement and configure."
 

Cons

"There's room for improvement with Mac device installations, which can be challenging."
"Although I would say this product is highly-rated, it could probably do more because nothing does everything that you want."
"They have the worst support, as a company, that I have ever worked with, as they are difficult to get a hold of and keep on the phone. They don't know what they are talking about when you get them on the phone. They don't like to respond to messages when you send them to them. They like to "research problems" for weeks on end, then pass you off to somebody else."
"When it comes to core analysis, and security analysis, Cortex needs to provide more information."
"I would like to see improvement in the tool's user interface, particularly in the area of managing alerts and providing more reporting capabilities."
"They've been having some issues with updating their endpoint agents, and it has been quite frustrating."
"Traps doesn't work with McAfee. You need to remove McAfee to install Traps. This is very common, and its nothing that should be an issue. Some antivirus engines recognize Traps as an threat component, so maybe they need to shake hands somewhere."
"Limited remote connection."
"On the firewall level, they were lagging a little bit behind, but they are running up again. I have full trust in the new 3000 series of firewalls where we would also be able to look more into the traffic that we're monitoring and get more security layers in our services. That would definitely be a big step."
"I would like to see integration with Cisco Analytics."
"The initial setup is a bit complex because you need to execute existing antiviruses or security software that you have on your device."
"They could improve the main dashboard to more clearly show me the things that I want to see. When I open the dashboard right now, I see a million things and they are not always the things that I need."
"The Linux agent is a simple offline classic agent, and it doesn't support Secure Boot, which is important to have on a Linux machine. The Linux agent has conflicts with other solutions, including the Exploit Prevention system found in Windows servers. We didn't find a fix during troubleshooting, and Cisco couldn't offer one either. Eventually, we had to shut down the Exploit Prevention system. We didn't like that as we always want a solution that can fit smoothly into the setup without causing problems, especially where security is concerned. The tool also caused CPU spikes on our production machine, and we were seriously considering moving to another product."
"Logging could be better in terms of sending more logs to Cisco Firepower or Cisco ASA. That's an area where it could be made better."
"I would recommend that the solution offer more availability in terms of the product portfolio and integration with third-party products."
"It cannot currently block URLs over websites."
"Sometimes the server console is very slow, so the performance could be improved."
"The solution should have better synchronization with active directory users and passwords for use in the encryption."
"My problem is that there's a technical glitch and they don't have a fix for it. It's not working with the latest version of Windows, which is a problem."
"The main reason I rated ESET Endpoint Encryption a nine out of ten is that their support is a lengthy process."
"Integration with central management needs improvement."
"From an admin perspective, the solution's UI could be more user-friendly."
"There are a few areas where ESET Endpoint Encryption could be better. The UX/UI could be more modern, and the management console feels a bit outdated and not very intuitive at times."
"The overall compatibility of the device is an area where the solution lacks."
 

Pricing and Cost Advice

"The price is on the higher side, but it's okay."
"The cost depends on your chosen license type, like Pro or other licenses."
"Our customers have expressed that the price is high."
"It has a higher cost than other solutions, like CrowdStrike or Microsoft’s EDR tools, but it reduces the cost of our operations because it’s a new generation antivirus tool."
"The tool's price is moderate."
"This is an expensive solution."
"We pay about $50,000 USD per year for a bundle that includes Cortex XDR."
"The price of the product is not very economical."
"It is an expensive solution."
"Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection."
"The price is very fair to the customer."
"The Enterprise Agreement is like an all-you-can-eat buffet of Cisco products. In that vein, it was very affordable."
"The price is very good."
"In our case, it is a straightforward annual payment through our Enterprise Agreement."
"You must make monthly payments towards the licensing charges attached to the product. There are no extra charges apart from the standard licensing fees associated with the product."
"It can always be cheaper."
"The pricing is mid-ranged and could be more cost-effective."
"On a scale of one to ten, where one is the lowest and ten is the highest, I rate its pricing a two."
"It is neither very expensive, nor cheap. Overall it is affordable and there is a long term arrangement between our company and the solution providers for license."
"There are some inexpensive products compared to ESET Endpoint Encryption, but they lack the essential features."
"Licensing costs are on a yearly basis."
"Instead of installing ESET on each machine at each location, we just do it remotely. This has been a time saver for us."
"ESET Endpoint Encryption is moderately priced."
"The National University System dedicates 500 of their 5000 licenses to us, which is $14/yr per device. Most companies are paying $99 or $120 per device a year."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
890,124 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
13%
Financial Services Firm
12%
Comms Service Provider
8%
Manufacturing Company
7%
Manufacturing Company
10%
Computer Software Company
8%
Government
8%
Financial Services Firm
7%
Computer Software Company
12%
Comms Service Provider
11%
University
10%
Manufacturing Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business45
Midsize Enterprise20
Large Enterprise48
By reviewers
Company SizeCount
Small Business21
Midsize Enterprise14
Large Enterprise21
By reviewers
Company SizeCount
Small Business12
Midsize Enterprise6
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdS...
What needs improvement with Cisco Secure Endpoint?
Cisco Secure Endpoint lacks features like DLP which other vendors offer. XDR is new, so integration capabilities with...
What needs improvement with ESET Endpoint Encryption?
My problem is that there's a technical glitch and they don't have a fix for it. It's not working with the latest vers...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Cisco AMP for Endpoints
No data available
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
CCS Media Limited, Mercury Engineering, Unigarant, Pinewood Healthcare
Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP). Updated: April 2026.
890,124 professionals have used our research since 2012.