IT Central Station is now PeerSpot: Here's why

Cybereason Endpoint Detection & Response vs FireEye Endpoint Security comparison

Cancel
You must select at least 2 products to compare!
Featured Review
Buyer's Guide
Cybereason Endpoint Detection & Response vs. FireEye Endpoint Security
July 2022
Find out what your peers are saying about Cybereason Endpoint Detection & Response vs. FireEye Endpoint Security and other solutions. Updated: July 2022.
619,967 professionals have used our research since 2012.
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The biggest lesson that I have learned from using this product is that there is a lot more malware slipping through my email filters than I expected.""Among the most valuable features are the exclusions. And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source.""The entirety of our network infrastructure is Cisco and the most valuable feature is the integration.""The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices.""It is extensive in terms of providing visibility and insights into threats. It allows for research into a threat, and you can chart your progress on how you're resolving it.""Device Trajectory is one of the most valuable features. We're able to dig in and really understand how things came to be and where to focus our efforts.""I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It should protect all kinds of things that might happen on the servers, things that I cannot see.""Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP."

More Cisco Secure Endpoint Pros →

"The dashboard is very good and you can consider it as an interactive UI.""Cybereason absolutely enables us to mitigate and isolate on the fly. Our managed detection response telemetry has dropped dramatically since we began using it. It's very top-of-mind. We were running some tabletop exercises and none of the detections were getting triggered by the managed security services provider. So we needed to find a solution that would trigger high-fidelity alerts. That was Cybereason and it dramatically changed our landscape from the detection and response perspective.""The solution is efficient.""The initial setup is not overly complicated.""We didn't have the visibility that we now have. It has increased our visibility by a lot. So, we put a lot more time into really looking at our environment and what is happening throughout our different networks. It has increased our visibility by around fivefold.""Their EDR solution, the ability to mitigate issues through their command line, is probably the best feature that we've had. We use that all the time. It's very useful for doing investigations.""The most valuable feature is the capability of the command used by the machine so that we see the kind of performance that is running.""Cybereason's threat hunting and investigation are the most valuable features. Threat hunting is a user-friendly feature that keeps you safe. Investigation offers an added value that I haven't seen with other EDR services. It allows you to find specific policy problems within your environment."

More Cybereason Endpoint Detection & Response Pros →

"A great console with a user-friendly GUI.""It has a feature called Isolation. If a device is compromised, we can connect it to our SOC, and no one would be able to access it. This way we can limit the damage to the network while we are investigating.""If the network has seen something, we can use that to put a block to all the endpoints.""The features we have found most valuable have been containment as well as the ability to triage agent activities.""It's a stable solution with good performance.""The response part of EDR was most valuable. We used that to separate the endpoint from the network. We utilized the solution during the instant response. We were also utilizing advanced malware detection capabilities, but we benefited the most from its help with the response.""FireEye Endpoint Security is easy to use and lightweight compared to others.""FireEye Endpoint Security's scalability is awesome. I think it is one of the best on that front."

More FireEye Endpoint Security Pros →

Cons
"This product has issues with the number of false positives that it reports.""We don't have issues. We think that Cisco covers all of the security aspects on the market. They continue to innovate in the right way.""It could be improved in connection with artificial intelligence and IoT.""They could improve the main dashboard to more clearly show me the things that I want to see. When I open the dashboard right now, I see a million things and they are not always the things that I need.""We had a lot of noise at the beginning, and we had to turn it down based on exclusions, application whitelisting, and excluding unknown benign applications. Cisco should understand the need for continuous updates on the custom Cisco exclusions and the custom applications that come out-of-the-box with the AMP for Endpoints.""I would like to see integration with Cisco Analytics.""In Orbital, there are tons of prebuilt queries, but there is not a lot of information in lay terms. There isn't enough information to help us with what we're looking for and why we are looking for it with this query. There are probably a dozen queries in there that really focus on what I need to focus on, but they are not always easy to find the first time through.""The thing I hate the most, which they have not fixed, is when it creates duplicate entries within a console. If you have a computer and you upgrade from Windows 7 to Windows 10, or you upgrade your agent from version 6 to 7, it creates a new instance in there instead of updating the information. Instead of paying a license for one computer, I have to license two computers until I manually go in, search for all the duplicate entries, and clean them out myself."

More Cisco Secure Endpoint Cons →

"Compared to our previous endpoint, we have a lot more false positives and a lot more duplication of alerts. So we're chasing more alerts.""The product's reporting isn't great.""Cybereason does not have sandbox functionality.""They need to improve their technical support services.""Its Microsoft PowerShell protections still need some compatibility improvements. We have run across just a few. It is compatible with 90% of what we have in our network, but there is that 10% that we are still struggling with as far as compatibility with the type of PowerShell scripts needed to run our day-to-day business.""The deployment on individual endpoints is more geared toward larger organizations. It might prove to be a bit too complicated for a smaller organization. You need to know what you're doing when you're deploying the sensor.""What needs to improve in Cybereason Endpoint Detection & Response and what I'd like to see in its next release is a centralized dashboard that allows you to view what is there, similar to what's on Symantec Endpoint Protection Manager: a beautiful display and reporting. Cybereason Endpoint Detection & Response has to start with the compliance, the homepage, etc. Everything should be there and should be customizable. The options should be there. The tool is very good currently, but visibility for IT administrators is lacking and needs to be worked on.""While the product is very good, there are still some areas for improvement. The initial triage area could be a bit simpler. They get into the weeds real fast; it gets very detailed very fast. I am still looking for an easier triage layer on top with the ability to dig deeper."

More Cybereason Endpoint Detection & Response Cons →

"Most of these types of solutions including others, such as Carbon Black and FortiEDR, all have the same features. However, Carbon Black is the leader when it comes to being robust and user-friendly and this solution should improve in those areas to stay more competitive.""We would like to solution to offer better security.""The reports need more development. They need more details on the reports and more details taking the executive view into consideration.""The way that signatures work when using this solution could be improved. They could be more user friendly. We would like the ability to select a client's signature from a menu or file share to save time.""The solution can be expensive.""It has very good integrations. However, its integration with Palo Alto was not good, and they seem to be working on it at the backend. It is not very resource-hungry, but it can be even better in terms of resource utilization. It could be improved in terms of efficiency, memory sizing, and disk consumption by agents.""They have something called Managed Detection and Response. They get intel from their customers, and that intel is shared with the rest of FireEye's customers. I want to subscribe to their intel, but that is not available to us.""Search feature could be made more user-friendly."

More FireEye Endpoint Security Cons →

Pricing and Cost Advice
  • "Licensing fees are on a yearly basis and I am happy with the pricing."
  • "We have a license for 3,000 users and if we get up to 3,100 users, it doesn't stop working, but on the next renewal date you're supposed to go in there and add that extra 100 licenses. It's really good that they let you grow and expand and then pay for it. Sometimes, with other products, you overuse a license and they just don't work."
  • "Cisco Secure Endpoint is not too expensive and it's not cheap. It's quite fair."
  • "The price is very fair to the customer."
  • "...the licensing needs to be improved. All the product features we need are there. It's just a matter of the complexity and the different offerings and trying to figure things out."
  • "The pricing and licensing fees are okay."
  • More Cisco Secure Endpoint Pricing and Cost Advice →

  • "This product is somewhat expensive and should be cheaper."
  • "We considered a few other solutions. Some were ridiculously overpriced, while others didn't have solutions for Mac endpoints. That was a deal-breaker because most of our organization is on Mac. It came down to two vendors: Cybereason and another. They had similar pitches and almost identical approaches, but in the end, Cybereason gave us the best value for our money."
  • "I had to go through a third-party to purchase it, which I wasn't really pleased about."
  • More Cybereason Endpoint Detection & Response Pricing and Cost Advice →

  • "It was an annual fee. There was just one overall fee."
  • "It is not so cheap in comparison to Sophos and other solutions."
  • More FireEye Endpoint Security Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which EDR (Endpoint Detection and Response) solutions are best for your needs.
    619,967 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable feature is signature-based malware detection.
    Top Answer:Licensing fees are on a yearly basis and I am happy with the pricing.
    Top Answer:The GUI needs improvement, it's not good. There are false positives in emails. At times, the emails are blocked and… more »
    Top Answer:I had to go through a third-party to purchase it, which I wasn't really pleased about.
    Top Answer:My use case for this solution is multipronged. First of all, I use this solution to provide the traditional… more »
    Top Answer:They do a very good job of providing multi-stage visualizations of malicious operations that immediately show all attack… more »
    Top Answer: The Crowdstrike Falcon program has a simple to use user interface, making it both an easy to use as well as an… more »
    Top Answer:It is easy to use, flexible, and stable. Because it is a cloud-based solution and it integrates all endpoints of the… more »
    Top Answer:If you compare your solution without the antivirus solution, and the price of the agent, it is a little bit expensive… more »
    Comparisons
    Also Known As
    Cisco AMP for Endpoints
    Cybereason EDR, Cybereason Deep Detect & Respond
    Learn More
    Cybereason
    Video Not Available
    Overview

    Cisco Secure Endpoint is a cloud-managed endpoint security solution that provides advanced protection against viruses, malware, and other cyber threats by detecting, preventing, and responding to threats. Cisco Secure Endpoint is managed online via a web-based management console and can be deployed on a variety of platforms. It protects endpoints, networks, emails, and web traffic.

    In a world of evolving threats, it’s necessary to put security above everything. Cisco Secure Endpoint provides you with the scope, scale, and capabilities to attain effective security with its integrated portfolio and industry-leading threat intelligence. Cisco Secure Endpoint continuously tracks and analyzes files and file activities across your systems - both remote and on premises - and compares these events to other events that occurred before or during past attacks. If a file exhibits malicious behavior, the tool sends an alert which enables you to stop a potential threat from succeeding.

    Key Capabilities of Cisco Secure Endpoint

    • Multi-layered protection: Cisco Secure Endpoint combines behavioral analytics, machine learning, and signature-based techniques to prevent threats from compromising your endpoints.

    • Powerful EDR capabilities: Reduce attack surface using advanced endpoint and extended detection and response, threat hunting, and endpoint isolation.

    • Dynamic malware analysis: Identify and block attacks in real time.

    • Simplified investigations: Advanced search capabilities help you get the information you need about your endpoints fast.

    Reviews from Real Users

    Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.

    Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."

    Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."

    Cybereason's Endpoint Detection and Response platform detects in real-time both signature and non-signature-based attacks and accelerates incident investigation and response. Cybereason connects together individual pieces of evidence to form a complete picture of a malicious operation.

    FireEye Endpoint Security is an integrated endpoint solution that detects, prevents and responds effectively to known malware and threats traditional anti-virus endpoint security products miss. It expands endpoint visibility and provides contextual frontline intelligence to help analysts automate protection, quickly determine the exact scope and level of any attack activity and adapt defenses as needed.

    Offer
    Learn more about Cisco Secure Endpoint
    Learn more about Cybereason Endpoint Detection & Response
    Learn more about FireEye Endpoint Security
    Sample Customers
    Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
    Lockheed Martin, Spark Capital, DocuSign, Softbank Capital
    Tech Resources Limited, Globe Telecom, Rizal Commercial Banking Corporation
    Top Industries
    REVIEWERS
    Comms Service Provider16%
    Manufacturing Company11%
    Healthcare Company11%
    Government11%
    VISITORS READING REVIEWS
    Computer Software Company22%
    Comms Service Provider20%
    Government7%
    Financial Services Firm5%
    REVIEWERS
    Manufacturing Company27%
    Comms Service Provider27%
    Transportation Company9%
    Insurance Company9%
    VISITORS READING REVIEWS
    Computer Software Company27%
    Comms Service Provider21%
    Financial Services Firm6%
    Government5%
    VISITORS READING REVIEWS
    Computer Software Company22%
    Comms Service Provider16%
    Government10%
    Financial Services Firm8%
    Company Size
    REVIEWERS
    Small Business32%
    Midsize Enterprise24%
    Large Enterprise44%
    VISITORS READING REVIEWS
    Small Business24%
    Midsize Enterprise20%
    Large Enterprise56%
    REVIEWERS
    Small Business20%
    Midsize Enterprise20%
    Large Enterprise60%
    VISITORS READING REVIEWS
    Small Business24%
    Midsize Enterprise17%
    Large Enterprise60%
    REVIEWERS
    Small Business33%
    Midsize Enterprise7%
    Large Enterprise60%
    VISITORS READING REVIEWS
    Small Business19%
    Midsize Enterprise15%
    Large Enterprise66%
    Buyer's Guide
    Cybereason Endpoint Detection & Response vs. FireEye Endpoint Security
    July 2022
    Find out what your peers are saying about Cybereason Endpoint Detection & Response vs. FireEye Endpoint Security and other solutions. Updated: July 2022.
    619,967 professionals have used our research since 2012.

    Cybereason Endpoint Detection & Response is ranked 10th in EDR (Endpoint Detection and Response) with 10 reviews while FireEye Endpoint Security is ranked 12th in EDR (Endpoint Detection and Response) with 10 reviews. Cybereason Endpoint Detection & Response is rated 8.2, while FireEye Endpoint Security is rated 8.2. The top reviewer of Cybereason Endpoint Detection & Response writes "We can make more informed decisions on whether an action is malicious". On the other hand, the top reviewer of FireEye Endpoint Security writes "Enables us to do IOC-based search across the enterprise and isolate compromised devices". Cybereason Endpoint Detection & Response is most compared with CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint, Darktrace and Cortex XDR by Palo Alto Networks, whereas FireEye Endpoint Security is most compared with CrowdStrike Falcon, Microsoft Defender for Endpoint, Darktrace, Cortex XDR by Palo Alto Networks and Code42 Next-Gen DLP. See our Cybereason Endpoint Detection & Response vs. FireEye Endpoint Security report.

    See our list of best EDR (Endpoint Detection and Response) vendors.

    We monitor all EDR (Endpoint Detection and Response) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.