Cisco Secure Endpoint and Trend Vision One are prominent competitors in the cybersecurity solutions category, with Trend Vision One having an upper hand due to its robust centralized visibility and operational insights that cater to multi-layered security needs effectively.
Features: Cisco Secure Endpoint provides advanced threat prevention with real-time visibility using File and Device Trajectory, sandboxing, and robust integration with the Cisco ecosystem. Its support for ISR routers enhances its appeal. Trend Vision One stands out for its comprehensive centralized visibility, strong XDR capabilities, and integration across endpoint, network, and cloud layers, focusing on real-time activity monitoring.
Room for Improvement: Cisco Secure Endpoint could benefit by enhancing third-party integration and improving reporting and analytics, along with user interface enhancements and minimizing update performance impacts. Trend Vision One requires a streamlined installation process, a more user-friendly interface, better automation features, and reduced false positive rates.
Ease of Deployment and Customer Service: Cisco Secure Endpoint is typically deployed on-premises and in the public cloud, with robust and responsive customer support. Trend Vision One offers deployment across diverse environments, including public and hybrid clouds, with adequate customer service but noted room for improved responsiveness.
Pricing and ROI: Cisco Secure Endpoint is considered fairly priced with a strong ROI, particularly due to reduced detection and response times, and often integrates into broader Cisco Enterprise Agreements. Trend Vision One is competitively priced with suggestions for more cost-effective options, yet both solutions deliver significant ROI through enhanced productivity and robust threat protection.
Trend Vision One has improved our ROI by 30 percent.
Thankfully, we also had cyber security insurance, and the insurance covered the incidents because, through Trend Micro and the implementation of the solution, along with the data it provided, we were able to demonstrate what had happened.
The email filtering system paid for itself within a year.
Cisco has good technical support, especially considering these are newer solutions compared to traditional routing and switching products.
It's not just about high-level support with the chatbot; rather, when an issue occurs, we have the experts on-site and ready to respond swiftly, which is crucial.
The engineers are not readily available.
To improve support, the company should streamline communication and reduce response times.
Cisco Secure Endpoint is definitely scalable.
I’d give scalability a 10 because nearly everything is integrated.
We found that it scales easily.
Its scalability is very good as we can work with it flexibly.
We have not encountered any problems.
The stability is very high.
The forensic capabilities need enhancement, especially for deep forensic data collection.
The deployment can be complex, and we'd like an easier process, especially when integrating with on-prem and cloud environments.
For XDR threat investigation, there is not enough documentation about how to search for different keywords.
There is increasingly a blending of the traditional OT world, which requires a specific focus, as OT devices often don't use standard Ethernet protocols and similar technologies.
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdStrike, Microsoft Defender, or SentinelOne.
Trend Vision One offers a competitive price-to-value ratio.
Trend Vision One is an expensive product.
The pricing is fair and not on the higher side.
Cisco Secure Endpoint is very good in machine learning, which allows it to secure offline contents even if not connected to the internet.
The most important features of Vision One include visibility, AI integration, attack pattern analysis, predictive analytics, and centralized visibility and management across protection layers.
The most critical feature of Vision One is that it gives us a single console for threat management.
Its ability to identify unmonitored endpoints and perform log inspection, which establishes operational baselines and detects anomalies, proves invaluable for threat identification.
Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader.
Cisco Secure Endpoint was formerly known as Cisco AMP for Endpoints.
Reviews from Real Users
Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.
Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
Trend Vision One offers comprehensive protection for endpoints, networks, and email with centralized visibility. It is valued for its attack surface management, real-time threat detection, integrated management, ease of deployment, and user-friendly interface.
Trend Vision One provides a sophisticated security platform combining endpoint, network, and email protection with features like virtual patching and advanced AI capabilities. Its centralized management and integration with platforms like Office 365 and Azure make it an attractive option for organizations needing streamlined workflows and efficient risk management. While it boasts robust integrations and ease of use, enhancements are needed in reporting, tool integration, and reducing false positives. Users call for better support infrastructure, faster response times, and improved threat intelligence capabilities. Despite some complexity, its AI and ML features significantly enhance threat detection and response.
What Features Define Trend Vision One?Trend Vision One is implemented in industries that require endpoint protection, ransomware defense, and incident response, being flexible for both on-premises and cloud environments. It is used to monitor servers, networks, and endpoints, providing features like email protection, behavioral detection, and threat visibility. Organizations benefit from AI and ML, improving their security posture and response capabilities.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.