We performed a comparison between Cisco Secure Endpoint and Microsoft BitLocker based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, SentinelOne, CrowdStrike and others in EPP (Endpoint Protection for Business)."The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward."
"The console is easy to read. I also like the scanning part and the ability to move assets from one to the other."
"Ability to get forensics details and also memory exfiltration."
"Fortinet FortiEDR's firewalling, rule creation, monitoring, and inspection profiles are great."
"This is stable and scalable."
"The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration."
"The setup is pretty simple."
"Real-time threat prevention using sandboxing, file trajectory, and retrospective security."
"One of the best features of AMP is its cloud feature. It doesn't matter where the device is in regards to whether it's inside or outside of your network environment, especially right now when everybody's remote and taken their laptops home. You don't have to be VPNed into the environment for AMP to work. AMP will work anywhere in the world, as long as it has an Internet connection. You get protection and reporting with it. No matter where the device is, AMP has still got coverage on it and is protecting it. You still have the ability to manage and remediate things. The cloud feature is the magic bullet. This is what makes the solution a valuable tool as far as I'm concerned."
"The best feature that we found most valuable, is actually the security product for the endpoint, formerly known as AMP. It has behavioral analytics, so you can be more proactive toward zero-day threats. I found that quite good."
"There are several valuable features including strong prevention and exceptional reporting capabilities."
"The most valuable feature of the solution is its technical support."
"The console feature gives a centralized management of what's going on, and if something happens, it gives you an alert. So, that's the most important feature for me."
"For the initial first level of support, we provide it from our side. If there's escalation required, we use Cisco tech for the AMP. And again, they are perfect. I mean, one of the best, compared to any other vendors."
"It is extensive in terms of providing visibility and insights into threats. It allows for research into a threat, and you can chart your progress on how you're resolving it."
"It is easy to implement and has AD integration."
"It's my understanding that the initial setup is straightforward."
"It holds significant value as it reduces the need for extensive IT management to handle security across networks and environments"
"The tool is stable."
"The most valuable feature is the authentication process which is very fast."
"Integration with System Center Configuration Manager (C: and D: logical drives are encrypted before installing Windows via SCCM)."
"The most valuable feature of this solution is the protection and ease of use."
"It is an encryption tool and provides security."
"It takes about two business days for initial support, which is too slow in urgent situations."
"Once, we had an event that was locked and blocked, but information about it came to us two or three days later."
"The SIEM could be improved."
"ZTNA can improve latency."
"The dashboard isn't easy to access and manage."
"Cannot be used on mobile devices with a secure connection."
"The security should be strong for the cloud. Some applications are on-prem and some are on the cloud. Fortinet should also have strong security for the cloud. There should be more security for the cloud."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"The room for improvement would be on event notifications. I have mine tuned fairly well. I do feel that if you subscribe to all the event notification types out-of-the-box, or don't really go through and take the time to filter out events, the notifications can become overwhelming with information. Sometimes, when you're overwhelmed with information, you just say, "I'm not going to look at anything because I'm receiving so much." I recommend the vendor come up with a white paper on the best practices for event notifications."
"The thing I hate the most, which they have not fixed, is when it creates duplicate entries within a console. If you have a computer and you upgrade from Windows 7 to Windows 10, or you upgrade your agent from version 6 to 7, it creates a new instance in there instead of updating the information. Instead of paying a license for one computer, I have to license two computers until I manually go in, search for all the duplicate entries, and clean them out myself."
"One of the things that Cisco Secure Endpoint really needs is that it's not just Secure Endpoint, it's a point product, and I think we really need to move into solution-based selling, designing, and architecting. So that we're not worried about putting things on endpoints and selling 'x' amount of endpoints, but to provide a solution that covers all of the remote access and sell them as solutions that cover multiple things."
"The product does not provide options like tunnel creation or virtual appliances."
"I would like to see integration with Cisco Analytics."
"On the firewall level, they were lagging a little bit behind, but they are running up again. I have full trust in the new 3000 series of firewalls where we would also be able to look more into the traffic that we're monitoring and get more security layers in our services. That would definitely be a big step."
"The initial setup is a bit complex because you need to execute existing antiviruses or security software that you have on your device."
"It is not very stable because we have new versions four times a year, which fixes bugs. We had some problems with some deployments."
"The solution’s user interface could be improved."
"More customization options would have been nice, such as password selection, actions when the screen is locked, etc."
"The console GUI could be better."
"We recently found some stability issues with Microsoft BitLocker."
"The implementation of BitLocker is not simple. There are many prerequisites and hours of study and testing."
"The solution should offer encryption for other items such as shared folders, removable media, etc."
"The solution lacks the ability to allow its user to provide limited access to someone."
"The only thing that could be slightly improved is the occasional stability issue."
Cisco Secure Endpoint is ranked 10th in EPP (Endpoint Protection for Business) with 43 reviews while Microsoft BitLocker is ranked 1st in Endpoint Encryption with 58 reviews. Cisco Secure Endpoint is rated 8.6, while Microsoft BitLocker is rated 8.2. The top reviewer of Cisco Secure Endpoint writes "Single dashboard management, quick infrastructure threat detection, and high level support". On the other hand, the top reviewer of Microsoft BitLocker writes "User-friendly, easy to set up, and offers real-time machine status updates". Cisco Secure Endpoint is most compared with Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks, CrowdStrike Falcon, VMware Carbon Black Endpoint and Bitdefender GravityZone EDR, whereas Microsoft BitLocker is most compared with ESET Endpoint Encryption, McAfee Complete Data Protection, Symantec Endpoint Encryption, Trend Micro Endpoint Encryption and ZENworks Suite.
We monitor all EPP (Endpoint Protection for Business) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.