Try our new research platform with insights from 80,000+ expert users

Cisco Secure Endpoint vs Panda Adaptive Defense 360 comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Endpoint
Ranking in Endpoint Protection Platform (EPP)
12th
Ranking in Endpoint Detection and Response (EDR)
15th
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
49
Ranking in other categories
Cisco Security Portfolio (6th)
Panda Adaptive Defense 360
Ranking in Endpoint Protection Platform (EPP)
28th
Ranking in Endpoint Detection and Response (EDR)
21st
Average Rating
8.2
Reviews Sentiment
7.4
Number of Reviews
28
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of June 2025, in the Endpoint Protection Platform (EPP) category, the mindshare of Cisco Secure Endpoint is 1.5%, down from 1.9% compared to the previous year. The mindshare of Panda Adaptive Defense 360 is 1.7%, up from 1.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Ahmed-Dawood - PeerSpot reviewer
A tool that offers good performance and technical support along with great protection to endpoint devices
The vendor from Cisco takes care of the maintenance. We need three people to take care of the tool in case of crashes. From the dashboard, we come to know about everything related to the endpoint. You can take action unless it is not the physical hardware to which something wrong has happened, especially if something wrong happens to the operating system. I would definitely recommend the solution to those planning to use it. To provide endpoint protection, I feel the product should be speedy enough to detect malicious programs and trojans. There are a lot of tools that are not acting as signature-based but as behavior-based antivirus. Cisco Secure Endpoint is required, especially if the customers don't have a sandbox. Overall, I rate the product an eight out of ten.
PaolaLamura - PeerSpot reviewer
While being easy to manage and create reports, the tool also offers a good UI
I rate the ease of use and management of Panda Adaptive Defense 360 an eight on a scale of one to ten. The tool's ability to provide information about the vulnerability is the most impactful feature of the product that has an impact on our company's security posture. Speaking about scenarios where the solution effectively prevented the security breach, I would say that our company sees how the tool blocks when our customers accidentally click on some malware, after which it quarantines that file. My company makes a playbook with the SOAR tool that Panda Adaptive Defense 360 uses to block and isolate attacks. In our company's system, if there is a big event that occurs, then to block the endpoint, we use SOAR with Panda Adaptive Defense 360 to block and isolate attacks or threats. The solution's real-time monitoring has improved our company's ability to detect threats if we use it in our company with Panda SIEMFeeder. Only if in my company there is a need to do some research, prepare a report, or if we want to change the policy, so it is not very often that we use the visualization part of the tool in our company. The reporting and analytics part of the tool has helped with the decision-making in our company since we combine different kinds of logs and situations from different ingestion logs, and we can configure a specific alert. In my company, we use the tool's data search functionality if required to check the information we need. Presently, our company uses the configuration alert and SIEMFeeder in our system. I rate the tool a nine out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The visibility and insight this solution gives you into threats is pretty granular. It has constant monitoring. You can get onto the device trajectory to look at a threat, but you can also see what happened prior to the threat. You can see what happened after the threat. You can see what other applications were incorporated into the execution of the threat. For example, you have the event, but you see that the event was launched by Google Chrome, which was launched by something else. Then, after the event, something else was launched by whatever the threat was. Therefore, it gives you great detail, a timeline, and continuity of events leading up to whatever the incident is, and then, after. This helps you understand and nail down what the threat is and how to fix it."
"The most valuable feature of the solution is its technical support."
"The most valuable feature is signature-based malware detection."
"The product itself is pretty reliable. The security features that it has make it reliable."
"The product provides sandboxing options like file reputation and file analysis."
"It is extensive in terms of providing visibility and insights into threats. It allows for research into a threat, and you can chart your progress on how you're resolving it."
"The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great."
"The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
"The most valuable features of the solution stem from the fact that I like the tool's UI, ease of management, ease of making reports, and the ability to export information easily."
"I've found it's got excellent web protection."
"The patch management module is very important."
"It is easy to manage."
"I like the Panda Security Adaptive Defense cloud usages. Everything is on a single plane of glass like the dashboards. I also like the information I can get about the computers itself."
"It offers an easy initial setup."
"Adaptive Defense is pretty easy to use, and Panda support is excellent."
"Their remote management (RMM) is very good."
 

Cons

"Logging could be better in terms of sending more logs to Cisco Firepower or Cisco ASA. That's an area where it could be made better."
"It could be improved in connection with artificial intelligence and IoT."
"The connector updates are very easily done now, and that's improving. Previously, the connector had an issue, where almost every time it needed to be updated, it required a machine reboot. This was always a bit of an inconvenience and a bug. Because with a lot of software now, you don't need to do that and shouldn't need to be rebooting all the time."
"The integration of the Cisco products for security could be better in the sense that not everything is integrated, and they aren't working together. In addition, not all products are multi-tenant, so you can't separate different customer environments from each other, which makes it a little bit hard for a managed service provider to deliver services to the customers."
"One of the things that Cisco Secure Endpoint really needs is that it's not just Secure Endpoint, it's a point product, and I think we really need to move into solution-based selling, designing, and architecting. So that we're not worried about putting things on endpoints and selling 'x' amount of endpoints, but to provide a solution that covers all of the remote access and sell them as solutions that cover multiple things."
"In the next version of this solution, I would like to see the addition of local authentication."
"Maybe there is room for improvement in some of the automated remediation. We have other tools in place that AMP feeds into that allow for that to happen, so I look at it as one seamless solution. But if you're buying AMP all by itself, I don't know if it can remove malicious software after the fact or if it requires the other tools that we use to do some of that."
"The solution needs more in-depth analytics."
"The gap between the two final conclusions is a problem, whether or not a file is known to be malware or is known to be safe."
"Panda Security Adaptive Defense is stable. However, when updates are being done on the computers we can experience some troubles because the computers need to be restarted. When we start the computers they are not functioning correctly and we have not received proper feedback regarding this random issue."
"Improvements could be made in terms of how the reporting is structured."
"Panda Security Adaptive Defense can improve by including the intrusion and prevention system not only on their most expensive platform. Additionally, it blocks software that is legitimate from users. They complain and then we have to manually unblock the software, by hash, or we receive a message. Some of the prevention features are not available and this might cause us to need a separate firewall or something to protect the company."
"Panda Adaptive Defense 360 is not compatible with certain network devices like access points, switches, or routers, which would be an area for improvement."
"The only part I really don't use as much is their firewall. It's a bit superfluous. Most people have their own firewall in place, so they don't really need that part portion of the solution."
"t would help if it would monitor the network better."
"Occasionally, we suffer from little bugs that give us the wrong message."
 

Pricing and Cost Advice

"Its price is fair for us."
"Cisco's pricing is reasonable. We also do not need to opt for niche players, which would have charged us significantly more than Cisco for ecosystem solutions. We are highly satisfied with the pricing structure of Cisco's solutions they are reasonable."
"The pricing and licensing of the security solutions of Cisco are very good in comparison with the competitors, but sometimes, it's difficult to see all the discounts and other kinds of things. So, you have to be careful, but the pricing is good."
"In our case, it is a straightforward annual payment through our Enterprise Agreement."
"There is also the Cisco annual subscription plus my management time in terms of what I do with the Cisco product. I spend a minimal amount of time on it though, just rolling out updates as they need them and monitoring the console a couple of times a day to ensure nothing is out of control. Cost-wise, we are quite happy with it."
"It is quite cost-effective. I would rate it ten out of ten."
"The pricing and licensing fees are okay."
"Because we do see the value of what it's bringing, I think they have priced it well."
"Our licensing fee is 1M Euro per month, so it is about 80 Euro's per user."
"Panda is cloud-only and comes at a reasonable cost. It is a set price per seat."
"The licensing costs are not too high. We pay about 20 Euros a year. It's a reasonable amount to pay."
"The licensing is subscription-based and priced well compared to other endpoint security solutions."
"The solution is priced well for what features it provides."
"There is a license needed to use this solution and it is approximately $30 annually."
"Customers need to pay monthly licensing costs for Panda Security Adaptive Defense, which is not expensive."
"I don't think Panda's license is too expensive, but they're charging more than it's worth. It's a yearly license. For 1,000 endpoints, it's around $18,000."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
856,873 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
21%
Manufacturing Company
8%
Government
8%
Financial Services Firm
8%
Computer Software Company
16%
Comms Service Provider
12%
Hospitality Company
8%
Financial Services Firm
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdStrike, Microsoft Defender, or SentinelOne.
What needs improvement with Cisco Secure Endpoint?
Cisco Secure Endpoint lacks features like DLP which other vendors offer. XDR is new, so integration capabilities with third-party tools need improvement. The forensic capabilities need enhancement,...
What do you like most about Panda Security Adaptive Defense?
The most valuable features of the solution stem from the fact that I like the tool's UI, ease of management, ease of making reports, and the ability to export information easily.
What is your experience regarding pricing and costs for Panda Security Adaptive Defense?
Although it is not a cheap solution, it is satisfying and functional. It is worth the money and provides good return on investment.
What needs improvement with Panda Security Adaptive Defense?
The software has performance issues due to its requirements on the processor, however, these issues are common with other vendors, not just WatchGuard.
 

Also Known As

Cisco AMP for Endpoints
Panda Security Endpoint Protection, Panda Security for Desktops
 

Overview

 

Sample Customers

Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Indra, Valea AB, Fineit, Aemcom, Data Solutions INC., Gloucestershire NHS, Golden Star Resources Ltd, Hispania Racing Team, Instituto Dos Museus e da ConserÊo, Escuelas Pias Provincia Emaus, Axiom Housing Association, Municipality of Bjuv, Lesedi Nuclear, Mullsj_ municipality, Eng. skolan Norr AB, Dalakraft AB, Peter Green Haulage Ltd
Find out what your peers are saying about Cisco Secure Endpoint vs. Panda Adaptive Defense 360 and other solutions. Updated: May 2025.
856,873 professionals have used our research since 2012.