Try our new research platform with insights from 80,000+ expert users

Cisco Secure Endpoint vs Huntress Managed ITDR comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 15, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Endpoint
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
49
Ranking in other categories
Endpoint Protection Platform (EPP) (25th), Endpoint Detection and Response (EDR) (19th), Cisco Security Portfolio (7th)
Huntress Managed ITDR
Average Rating
10.0
Reviews Sentiment
8.8
Number of Reviews
3
Ranking in other categories
Identity Threat Detection and Response (ITDR) (11th)
 

Featured Reviews

Ahmed-Dawood - PeerSpot reviewer
A tool that offers good performance and technical support along with great protection to endpoint devices
The vendor from Cisco takes care of the maintenance. We need three people to take care of the tool in case of crashes. From the dashboard, we come to know about everything related to the endpoint. You can take action unless it is not the physical hardware to which something wrong has happened, especially if something wrong happens to the operating system. I would definitely recommend the solution to those planning to use it. To provide endpoint protection, I feel the product should be speedy enough to detect malicious programs and trojans. There are a lot of tools that are not acting as signature-based but as behavior-based antivirus. Cisco Secure Endpoint is required, especially if the customers don't have a sandbox. Overall, I rate the product an eight out of ten.
Kevin - PeerSpot reviewer
Peace of mind in identifying compromises in your M365 tenants
Huntress Managed ITDR examines various signals from the M365 tenants. If anything suspicious is identified, their SOC analysts can take a closer look and subsequently take action. It's a comprehensive solution covering endpoints and cloud tenants, offering peace of mind. I recognized its benefits immediately, as it provides protection against M365 identity compromises, like admin account breaches.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The product itself is pretty reliable. The security features that it has make it reliable."
"The entirety of our network infrastructure is Cisco and the most valuable feature is the integration."
"The most valuable feature at this moment is that Cisco AMP or Cisco Secure Endpoint solution is delivering a lot of things, and I always say to a lot of customers that if we didn't have Cisco AMP, we probably would have had ransomware somewhere. So, it's protecting us very well from a lot of hackers, malware, and especially ransomware."
"The most valuable features of this solution are the IPS and the integration with ISE."
"One of the best features of AMP is its cloud feature. It doesn't matter where the device is in regards to whether it's inside or outside of your network environment, especially right now when everybody's remote and taken their laptops home. You don't have to be VPNed into the environment for AMP to work. AMP will work anywhere in the world, as long as it has an Internet connection. You get protection and reporting with it. No matter where the device is, AMP has still got coverage on it and is protecting it. You still have the ability to manage and remediate things. The cloud feature is the magic bullet. This is what makes the solution a valuable tool as far as I'm concerned."
"The visibility and insight this solution gives you into threats is pretty granular. It has constant monitoring. You can get onto the device trajectory to look at a threat, but you can also see what happened prior to the threat. You can see what happened after the threat. You can see what other applications were incorporated into the execution of the threat. For example, you have the event, but you see that the event was launched by Google Chrome, which was launched by something else. Then, after the event, something else was launched by whatever the threat was. Therefore, it gives you great detail, a timeline, and continuity of events leading up to whatever the incident is, and then, after. This helps you understand and nail down what the threat is and how to fix it."
"Real-time threat prevention using sandboxing, file trajectory, and retrospective security."
"The product's initial setup phase was very simple."
"I rate the overall solution as a ten out of ten."
"The initial setup was very easy."
"Huntress Managed ITDR examines various nulls from the M365 tenants. If anything suspicious is identified, their SOC analysts can take a closer look and subsequently take action."
"Implementing Huntress Managed ITDR has improved our business by allowing us to be more proactive with our security posture."
"The centralized management with the EDR and ITDR is beneficial."
 

Cons

"The solution needs more in-depth analytics."
"We had a lot of noise at the beginning, and we had to turn it down based on exclusions, application whitelisting, and excluding unknown benign applications. Cisco should understand the need for continuous updates on the custom Cisco exclusions and the custom applications that come out-of-the-box with the AMP for Endpoints."
"The reporting and analytics areas of the solution need to be improved."
"The initial setup is a bit complex because you need to execute existing antiviruses or security software that you have on your device."
"The one challenge that I see is the use of multiple endpoint protection platforms. For instance, we have AMP, but we also have Microsoft Windows Defender, System Center Endpoint Protection, and Microsoft Malware Protection Engine deployed. So, we have a bunch of different things that do the same thing. What winds up happening is, e.g., if I get an alert for a potential incident or malware and want to pull the file, I'll go to fetch the file to analyze it. But, one of these other programs has already gotten it, so the file has already been quarantined by another endpoint protection system. AMP doesn't realize that and the file fetch fails, then you're left wondering what's going on."
"Previously, there were options to uninstall the agent without a password if you had admin access, and this could be improved."
"The connector updates are very easily done now, and that's improving. Previously, the connector had an issue, where almost every time it needed to be updated, it required a machine reboot. This was always a bit of an inconvenience and a bug. Because with a lot of software now, you don't need to do that and shouldn't need to be rebooting all the time."
"The room for improvement would be on event notifications. I have mine tuned fairly well. I do feel that if you subscribe to all the event notification types out-of-the-box, or don't really go through and take the time to filter out events, the notifications can become overwhelming with information. Sometimes, when you're overwhelmed with information, you just say, "I'm not going to look at anything because I'm receiving so much." I recommend the vendor come up with a white paper on the best practices for event notifications."
"If anything, it's created more work, but that's because we're now seeing things that we weren't seeing before."
"The product needs further maturity, with some improvements in the user interface."
"The product needs further maturity, with some improvements in the user interface."
"More in-depth reporting could be beneficial for the solution."
"More in-depth reporting could be beneficial for the solution."
 

Pricing and Cost Advice

"Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc."
"​Pricing can be more expensive than similar software that does less functionality, but not recognized by customers.​"
"...the licensing needs to be improved. All the product features we need are there. It's just a matter of the complexity and the different offerings and trying to figure things out."
"The Enterprise Agreement is like an all-you-can-eat buffet of Cisco products. In that vein, it was very affordable."
"The costs of 50 licenses of AMP for three years is around $9,360."
"The price is very fair to the customer."
"I rate the pricing a five or six on a scale of one to ten, where one is expensive, and ten is cheap."
"There is also the Cisco annual subscription plus my management time in terms of what I do with the Cisco product. I spend a minimal amount of time on it though, just rolling out updates as they need them and monitoring the console a couple of times a day to ensure nothing is out of control. Cost-wise, we are quite happy with it."
Information not available
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
862,514 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
22%
Manufacturing Company
8%
Financial Services Firm
7%
Government
7%
Computer Software Company
19%
Insurance Company
14%
University
9%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdStrike, Microsoft Defender, or SentinelOne.
What needs improvement with Cisco Secure Endpoint?
Cisco Secure Endpoint lacks features like DLP which other vendors offer. XDR is new, so integration capabilities with third-party tools need improvement. The forensic capabilities need enhancement,...
What is your experience regarding pricing and costs for Huntress Managed ITDR?
In terms of pricing, it seemed pretty cheap for us. I think it was two or three dollars a user a month. Given that it wasn't a product we were expecting to buy, it was a somewhat unanticipated cost...
What needs improvement with Huntress Managed ITDR?
In my opinion, Huntress Managed ITDR has room for improvement in the speed of some screen refreshing, as it isn't as fast as it perhaps could be. The fact that it caches results is a bit odd for a ...
What is your primary use case for Huntress Managed ITDR?
My use case is really just for threat detection and response to observe and get more awareness of where our sign-ins are coming from, so we can better protect our login environment.
 

Also Known As

Cisco AMP for Endpoints
No data available
 

Overview

 

Sample Customers

Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Information Not Available
Find out what your peers are saying about Microsoft, CrowdStrike, SentinelOne and others in Endpoint Protection Platform (EPP). Updated: July 2025.
862,514 professionals have used our research since 2012.