Try our new research platform with insights from 80,000+ expert users

Cisco Secure Endpoint vs Trend Micro Endpoint Encryption comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Endpoint
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
49
Ranking in other categories
Endpoint Protection Platform (EPP) (34th), Endpoint Detection and Response (EDR) (26th), Cisco Security Portfolio (8th)
Trend Micro Endpoint Encryp...
Average Rating
8.0
Reviews Sentiment
7.2
Number of Reviews
21
Ranking in other categories
Endpoint Encryption (6th)
 

Mindshare comparison

While both are Endpoint Security solutions, they serve different purposes. Cisco Secure Endpoint is designed for Endpoint Protection Platform (EPP) and holds a mindshare of 1.3%, down 1.5% compared to last year.
Trend Micro Endpoint Encryption, on the other hand, focuses on Endpoint Encryption, holds 3.5% mindshare, down 3.8% since last year.
Endpoint Protection Platform (EPP) Market Share Distribution
ProductMarket Share (%)
Cisco Secure Endpoint1.3%
Microsoft Defender for Endpoint8.2%
CrowdStrike Falcon7.0%
Other83.5%
Endpoint Protection Platform (EPP)
Endpoint Encryption Market Share Distribution
ProductMarket Share (%)
Trend Micro Endpoint Encryption3.5%
Microsoft BitLocker23.6%
ESET Endpoint Encryption11.7%
Other61.2%
Endpoint Encryption
 

Featured Reviews

JavedHashmi - PeerSpot reviewer
Chief Technology Officer at Future Point Technologies
Reliable threat protection is achieved while integration and analysis capabilities need refinement
Cisco Secure Endpoint is very good in machine learning, which allows it to secure offline contents even if not connected to the internet. We haven't encountered a single breach after it's deployed. It controls USB devices and has a separate antivirus solution called Tetra, providing security even for real-time, day-zero attacks through its strong Talos threat intelligence platform.
Sampath Acharya - PeerSpot reviewer
Technical Associate at Valuepoint Systems
Full disk encryption safeguards data effectively and customer service provides excellent support
There weren't too many challenges with the setup. The initial setup is a little bit difficult as it requires skill. A person without the necessary experience or skill cannot handle it. Overall, I'd rate the implementation process seven out of ten. Deployment times vary depending on customer enrollment. If there are more than 100 machines, it might take 45 to 60 days.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great."
"Real-time threat prevention using sandboxing, file trajectory, and retrospective security."
"The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices."
"The simplicity of use is its most valuable feature. You can very clearly see things."
"It is extensive in terms of providing visibility and insights into threats. It allows for research into a threat, and you can chart your progress on how you're resolving it."
"The most valuable feature is signature-based malware detection."
"For the initial first level of support, we provide it from our side. If there's escalation required, we use Cisco tech for the AMP. And again, they are perfect. I mean, one of the best, compared to any other vendors."
"With Cisco Secure Endpoint, we now have visibility over what is happening on the endpoint side."
"If a laptop is stolen, no one can steal the data since it is fully protected."
"The most valuable feature of the solution is the antivirus part it offers."
"We use the solution for data encryption."
"It's a secure and quick solution."
"Very good interface."
"The disk encryption is great."
"Offers very good endpoint security solutions."
"The solution enables all the development and technical team members to work from home while, at the same time, ensuring the security of the work environment."
 

Cons

"The initial setup of Cisco Secure Endpoint is complex."
"Cisco Secure Endpoint is an expensive solution."
"The integration of the Cisco products for security could be better in the sense that not everything is integrated, and they aren't working together. In addition, not all products are multi-tenant, so you can't separate different customer environments from each other, which makes it a little bit hard for a managed service provider to deliver services to the customers."
"In Orbital, there are tons of prebuilt queries, but there is not a lot of information in lay terms. There isn't enough information to help us with what we're looking for and why we are looking for it with this query. There are probably a dozen queries in there that really focus on what I need to focus on, but they are not always easy to find the first time through."
"Previously, there were options to uninstall the agent without a password if you had admin access, and this could be improved."
"The pricing policy could be more competitive, similar to Cisco's offerings."
"Integration and dashboard are areas with certain shortcomings in Cisco Secure Endpoint."
"In terms of the user experience, if the UX design could be much simpler [that would improve things]... if they could make it more intuitive for someone who is not an engineer so that they still can read what's going on in their webpage and understand, that would be something."
"Should have more features of Deep Scanning"
"Compared to Bitlocker or McAfee Disk Encryption, it's not quite as robust."
"There are recovery issues that arise."
"In the next release, it would be better if it was more user-friendly. It is a little complicated for the average technical person. If they can make it more user-friendly, it would be much easier and more helpful."
"They need to come up with cloud solutions."
"To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically."
"There are scalability limitations. I'd rate scalability five out of ten."
"In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support."
 

Pricing and Cost Advice

"It is a subscription-based product."
"I rate the pricing a five or six on a scale of one to ten, where one is expensive, and ten is cheap."
"The solution's price is about the same as that of Palo Alto solutions."
"We can know if something bad is potentially happening instantaneously and prevent it from happening. We can go to a device and isolate it before it infects other devices. In our environment, that's millions of dollars saved in a matter of seconds."
"It can always be cheaper."
"We had faced some license issues, but it has been improved. At the beginning of the implementation, we faced a lot of licensing issues, but now, we have EA licensing, which gives us an opportunity to grow."
"Cisco's pricing is reasonable. We also do not need to opt for niche players, which would have charged us significantly more than Cisco for ecosystem solutions. We are highly satisfied with the pricing structure of Cisco's solutions they are reasonable."
"It is quite cost-effective. I would rate it ten out of ten."
"We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable."
"The solution's licensing costs are yearly."
"The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems."
"One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
"You have to pay for the license annually."
"I rate the product price a six on a scale of one to ten, where one is high price, and ten is low price."
"I rate the product price a seven on a scale of one to ten, where one is cheap, and ten is expensive."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
879,672 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Manufacturing Company
10%
Government
8%
Healthcare Company
6%
Performing Arts
18%
Government
10%
Manufacturing Company
9%
Insurance Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business21
Midsize Enterprise14
Large Enterprise21
By reviewers
Company SizeCount
Small Business14
Midsize Enterprise4
Large Enterprise4
 

Questions from the Community

What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdStrike, Microsoft Defender, or SentinelOne.
What needs improvement with Cisco Secure Endpoint?
Cisco Secure Endpoint lacks features like DLP which other vendors offer. XDR is new, so integration capabilities with third-party tools need improvement. The forensic capabilities need enhancement,...
What needs improvement with Trend Micro Endpoint Encryption?
If Trend Micro Endpoint Encryption comes up with a SaaS solution, it will be better rather than just having an on-premises solution.
 

Also Known As

Cisco AMP for Endpoints
No data available
 

Overview

 

Sample Customers

Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP). Updated: December 2025.
879,672 professionals have used our research since 2012.