Try our new research platform with insights from 80,000+ expert users

Cisco Secure Endpoint vs OpenText Core Endpoint Protection​ comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 19, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Endpoint
Ranking in Endpoint Protection Platform (EPP)
25th
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
49
Ranking in other categories
Endpoint Detection and Response (EDR) (21st), Cisco Security Portfolio (6th)
OpenText Core Endpoint Prot...
Ranking in Endpoint Protection Platform (EPP)
49th
Average Rating
7.8
Reviews Sentiment
5.8
Number of Reviews
31
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of August 2025, in the Endpoint Protection Platform (EPP) category, the mindshare of Cisco Secure Endpoint is 1.5%, down from 1.7% compared to the previous year. The mindshare of OpenText Core Endpoint Protection​ is 0.8%, down from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Mark Broughton - PeerSpot reviewer
Tighter integration with Umbrella and Firepower gave us eye-opening information
We were using a third-party help desk. One of the ways that they were fixing problems was to delete the client and then add the client back if there was an issue where the client had stopped communicating. Any improvement in the client communicating back to the server would be good, particularly for machines that are offline for a couple of weeks. A lot of our guys were working on a rotation where the machine might be offline for that long. They were also terrible about rebooting their machines, so those network connections didn't necessarily get refreshed. So, anything that could improve that communication would be good. Also, an easier way to do deduplication of machines, or be alerted to the fact that there's more than one instance of a machine, would be useful. If you could say, "Okay, we've got these two machines. This one says it's not reporting and this one says it's been reporting. Obviously, somebody did a reinstall," it would help. That way you could get a more accurate device count, so you're not having an inflated number. Not that Cisco was going to come down on you and say, "Oh, you're using too many licenses," right away. But to have a much more accurate license usage count by being able to better dedupe the records would be good. I also sent over a couple of other ideas to our technical rep. A lot of that had to do with the reporting options. It would be really nice to be able to do a lot more in the reporting. You can't really drill down into the reports that are there. The reporting and the need for the documentation to be updated and current would be my two biggest areas of complaint. Also, there was one section when I was playing with the automation where it was asking for the endpoint type rather than the machine name. If I could have just put in the machine name, that would have been great. So there are some opportunities, when it comes to searching, to have more options. If I wanted to search, for example, by a Mac address because, for some reason, I thought there was a duplication and I didn't have the machine name, how could I pull it up with the Mac address? When you're getting to that level, you're really starting to get into the ticky tacky. I would definitely put the reporting and documentation way ahead of that.
Urs Schuerch - PeerSpot reviewer
A tool that offers good UI and documentation
Webroot Business Endpoint Protection had sent me a physical installation medium, which was very easy to obtain and deploy. It was also easy to configure, and it had a nice UI. I didn't have any problems with the product. I think that Webroot Business Endpoint Protection is very transparent about the pricing models offered to users. The tool also maintains transparency about the features and specifications. Previously, when I compared the two products with Webroot Business Endpoint Protection, I saw that with Trend Micro, it is very difficult to transparently find out what it offers and how much it charges for it.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The biggest lesson that I have learned from using this product is that there is a lot more malware slipping through my email filters than I expected."
"The entirety of our network infrastructure is Cisco and the most valuable feature is the integration."
"The visibility and insight this solution gives you into threats is pretty granular. It has constant monitoring. You can get onto the device trajectory to look at a threat, but you can also see what happened prior to the threat. You can see what happened after the threat. You can see what other applications were incorporated into the execution of the threat. For example, you have the event, but you see that the event was launched by Google Chrome, which was launched by something else. Then, after the event, something else was launched by whatever the threat was. Therefore, it gives you great detail, a timeline, and continuity of events leading up to whatever the incident is, and then, after. This helps you understand and nail down what the threat is and how to fix it."
"The best feature that we found most valuable, is actually the security product for the endpoint, formerly known as AMP. It has behavioral analytics, so you can be more proactive toward zero-day threats. I found that quite good."
"The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices."
"It's quite simple, and the advantage I see is that I get the trajectory of what happened inside the network, how a file has been transmitted to the workstation, and which files have got corrupted."
"The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
"The VPN is most valuable. It's the best thing in the market today. We can use two-factor authentication with another platform, and we can authenticate with two-factor."
"Doesn't consume resources or affect the computer performance at all."
"It is very light. It is the only solution that can be installed on a machine that already has an antivirus. It is a pretty complete solution."
"The initial setup was straightforward. It took five minutes. I installed the solution myself."
"I haven't observed any of the instabilities in the solution. It is a stable solution."
"The main reason we had Webroot is that it was cost-effective for our clients."
"The initial setup is not complex at all. It's very straightforward."
"I rate the initial setup phase a ten on a scale of one to ten, where one is difficult, and ten is easy."
"It is very lightweight on the workstations, not slowing them down while still doing its job very well."
 

Cons

"It is not very stable because we have new versions four times a year, which fixes bugs. We had some problems with some deployments."
"Maybe there is room for improvement in some of the automated remediation. We have other tools in place that AMP feeds into that allow for that to happen, so I look at it as one seamless solution. But if you're buying AMP all by itself, I don't know if it can remove malicious software after the fact or if it requires the other tools that we use to do some of that."
"The product does not provide options like tunnel creation or virtual appliances."
"The solution needs more in-depth analytics."
"We have had some problems with updates not playing nice with our environment. This is important, because if there is a new version, we need to test it thoroughly before it goes into production. We cannot just say, "There's a new version. It's not going to give us any problems." With the complexity of the solution using multiple engines for multiple tasks, it can sometimes cause performance issues on our endpoints. Therefore, we need to test it before we deploy. That takes one to three days before we can be certain that the new version plays nice with our environment."
"They could improve the main dashboard to more clearly show me the things that I want to see. When I open the dashboard right now, I see a million things and they are not always the things that I need."
"This product has issues with the number of false positives that it reports."
"Cisco is good in terms of threat intelligence plus machine learning-based solutions, but we feel Cisco is lagging behind in using artificial intelligence in its systems."
"It doesn't do anything proactive. The virus has to hit the machine before it detects it."
"The reporting is the weakest part of the Webroot console. Frequently, I export to Excel to massage something into it to pass on to others."
"Webroot Business Endpoint Protection needs to improve its ability to detect threats."
"Webroot Business Endpoint Protection needs to focus on how they can widen their area of scope by not just being an antivirus tool anymore. The shortcoming in the customization area of the tool needs improvement."
"It would be nice if it had a feature for automatically generating reports on the client end for device status, security status and backup information."
"We need more control over when upgrades to the app are rolled out."
"Its detection capability for certain attacks should be improved. It should have better and wider detection for certain malware attacks. It could also have some sort of RMN."
"An updated UI would be nice, but is not hardly used."
 

Pricing and Cost Advice

"It is an expensive solution."
"The pricing and licensing of the security solutions of Cisco are very good in comparison with the competitors, but sometimes, it's difficult to see all the discounts and other kinds of things. So, you have to be careful, but the pricing is good."
"The price is very good."
"In our case, it is a straightforward annual payment through our Enterprise Agreement."
"​Pricing can be more expensive than similar software that does less functionality, but not recognized by customers.​"
"We had faced some license issues, but it has been improved. At the beginning of the implementation, we faced a lot of licensing issues, but now, we have EA licensing, which gives us an opportunity to grow."
"The solution's price is about the same as that of Palo Alto solutions."
"The price is very fair to the customer."
"Our strategy was to overestimate the complexity and cost. It turned out that Webroot's assurance was justified."
"The solution doesn't cost too much. It's about 30 Euros a year for each endpoint. It's pretty affordable for us and for many other companies."
"Work on a price tier plan."
"I think the price is fairly reasonable. I was really prepared to pay more, but the price is fine."
"From a pricing standpoint, I would rate it a four out of five."
"The pricing is high."
"The solution is pretty cheap, actually. At our level, which is at 2,500 endpoints, we're paying 87 cents an agent per month."
"I rate the product's pricing a three on a scale of one to ten, where one is cheap, and ten is expensive. There are no costs in addition to the product's standard licensing fees."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
865,484 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
21%
Manufacturing Company
9%
Government
7%
Healthcare Company
6%
Real Estate/Law Firm
14%
Computer Software Company
14%
Comms Service Provider
9%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdStrike, Microsoft Defender, or SentinelOne.
What needs improvement with Cisco Secure Endpoint?
Cisco Secure Endpoint lacks features like DLP which other vendors offer. XDR is new, so integration capabilities with third-party tools need improvement. The forensic capabilities need enhancement,...
What do you like most about Webroot Business Endpoint Protection?
I haven't observed any of the instabilities in the solution. It is a stable solution.
What is your experience regarding pricing and costs for Webroot Business Endpoint Protection?
Webroot Business Endpoint Protection is probably on the cheaper side, so I would rate their pricing a one or a two out of ten.
What needs improvement with Webroot Business Endpoint Protection?
Webroot Business Endpoint Protection needs to improve its ability to detect threats. It does not do what it's advertised to do. Real-time threat detection also doesn't work as it should.
 

Also Known As

Cisco AMP for Endpoints
Webroot SecureAnywhere Business Endpoint Protection
 

Overview

 

Sample Customers

Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Mytech Partners
Find out what your peers are saying about Cisco Secure Endpoint vs. OpenText Core Endpoint Protection​ and other solutions. Updated: August 2025.
865,484 professionals have used our research since 2012.