![Cisco SecureX [EOL] Logo](https://images.peerspot.com/image/upload/c_scale,dpr_3.0,f_auto,q_100,w_64/0dra2w8zbx5vrvwmhkdswx9l90ys.jpg?_a=BACAGSDL)

Cisco SecureX [EOL] and Wazuh are competitors in the security management market. Cisco SecureX [EOL] seems to have an advantage in integration capabilities and automation, while Wazuh shines in its cost-effectiveness and open-source flexibility.
Features: Cisco SecureX [EOL] offers a unified dashboard for endpoints and sites, threat-hunting modules, and extensive automation tools. It integrates with Cisco and third-party products, enhancing threat intelligence. Wazuh provides SIEM capabilities, excellent log monitoring, and integration with cloud platforms, all at no licensing cost. Its open-source nature facilitates flexibility and customization.
Room for Improvement: Cisco SecureX [EOL] could improve its automation workflows and expand third-party integrations. Its documentation and reporting need to be more comprehensive, and more intuitive orchestration tools are desirable. Wazuh lacks native threat intelligence and faces challenges with scalability and ease of use. More direct support and cloud API integrations are needed. Simplification of setup procedures is also desirable.
Ease of Deployment and Customer Service:Cisco SecureX [EOL] integrates well with Cisco products and supports deployments on public cloud, private cloud, and on-premises. Users report responsive Cisco technical support. Wazuh offers on-premises and hybrid cloud deployments, relying heavily on community support for integration assistance. While flexible, comprehensive enterprise support would be beneficial.
Pricing and ROI: Cisco SecureX [EOL] is free with existing Cisco products, which justifies its higher pricing with robust integrations. The return on investment is noted in reduced workloads and enhanced efficiency. Wazuh is minimal in cost, barring support and infrastructure expenses. While cost-effective, it requires consideration of the total ownership cost due to support and resource needs.

| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 7 |
| Large Enterprise | 3 |
| Company Size | Count |
|---|---|
| Small Business | 27 |
| Midsize Enterprise | 15 |
| Large Enterprise | 8 |
Cisco SecureX is an integrated security platform that connects the breadth of Cisco's integrated security portfolio and the customer's infrastructure to create a consistent experience. The solution unifies visibility, enables automation, and strengthens your security across network, endpoints, cloud, and applications. Cisco SecureX is embedded within every Cisco Security product and supports integrations with SIEM and SOAR, so customers will not need to replace any solution or worry about layering on new technology.
Cisco SecureX Features
Cisco SecureX has many valuable key features. Some of the most useful ones include:
Cisco SecureX Benefits
Some of the benefits of using Cisco SecureX include:
Reviews from Real Users
Below are some reviews and helpful feedback written by Cisco SecureX users.
PeerSpot user Wouter H., Technical Team Lead Network & Security at Missing Piece BV, shares several reasons why he thinks the solution is fantastic. In his opinion, “SecureX takes all the separate pieces of security within your company, adds in intelligence from different sites and services on the internet, and makes them work together. If an email is received on a machine and malware is being executed, it can be put into lockdown mode. The fact that you can have a single solution that combines endpoint intelligence with email intelligence, firewalls, and publicly available intelligence is really helpful. Also, SecureX provides us with contextual awareness throughout our security ecosystem. Before SecureX, things that were not possible, or that would take days, now literally take seconds to find out.
Michal S., Infrastructure Engineer at a media company, says, “SecureX provides many measurements and has a really good dashboard. Working with it you are able to see things very clearly and you have every detail on a single display. That saves us money and time.” He also adds, “It brings all our data into a central point. It also shows us many data connections between many of our environments. SecureX gives you really good information about potential risks. You are able to find the source of a risk, a potential risk from a user or a machine.”
Blair A., Technology Director at Shawnee Heights USD #450, explains, "One of the most valuable features is the simplicity of deploying SecureX. It's very easy to do that and then you gain very detailed visibility into everything that's going on in your network and, obviously, at the device level. There's just a wealth of information that you can pull from all of these products that are part of SecureX. You know exactly if you have an issue or not."
Wazuh offers an open-source platform designed for seamless integration into diverse environments, making it ideal for enhancing security infrastructure. Its features include log monitoring, compliance support, and real-time threat detection, providing effective cybersecurity management.
Wazuh stands out for its ability to integrate easily with Kubernetes, cloud-native infrastructures, and various SIEM platforms like ELK. It features robust MITRE ATT&CK correlation, comprehensive log monitoring capabilities, and detailed reporting dashboards. Users benefit from its file integrity monitoring and endpoint detection and response (EDR) capabilities, which streamline compliance and vulnerability assessments. While appreciated for its customization and easy deployment, room for improvement exists in scalability, particularly in the free version, and in areas such as threat intelligence integration, cloud integration, and container security. The platform is acknowledged for its strong documentation and technical support.
What are the key features of Wazuh?In industries like finance, healthcare, and technology, Wazuh is utilized for its capabilities in log aggregation, threat detection, and vulnerability management. Companies often implement its features to ensure compliance with stringent regulations and to enhance security practices across cloud environments. By leveraging its integration capabilities, organizations can achieve unified security management, ensuring comprehensive protection of their digital assets.
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.