ESET Endpoint Security vs Seqrite Endpoint Security comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between ESET Endpoint Security and Seqrite Endpoint Security based on real PeerSpot user reviews.

Find out in this report how the two EPP (Endpoint Protection for Business) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed ESET Endpoint Security vs. Seqrite Endpoint Security Report (Updated: November 2022).
657,849 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It is extensive in terms of providing visibility and insights into threats. It allows for research into a threat, and you can chart your progress on how you're resolving it.""I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It should protect all kinds of things that might happen on the servers, things that I cannot see.""Definitely, the best feature for Cisco Secure Endpoint is the integration with Talos. On the backend, Talos checks all the signatures, all the malware, and for any attacks going on around the world... Because Secure Endpoint has a connection to it, we get protected by it right then and there.""The biggest lesson that I have learned from using this product is that there is a lot more malware slipping through my email filters than I expected.""appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst. I can track everything that happens on our server from my PC or device. Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us.""The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great.""The most valuable feature is signature-based malware detection.""The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices."

More Cisco Secure Endpoint Pros →

"The overall security capability of the product is pretty reliable.""All of our devices are integrated with the solution.""The product is quite affordable.""It can scale as well.""It's a very user-friendly product.""The pricing is good.""Technical support has been very good. They are helpful and responsive.""The product is good and has a good interface."

More ESET Endpoint Security Pros →

"Endpoint Security's best features are inventory, asset management, and quick scanning.""The convenience has been great.""In case it works, we are looking to use features like USB blocking, file upload alerts, and other antivirus features as well, but this software has to work first.""There are many features available in this solution, such as asset management."

More Seqrite Endpoint Security Pros →

Cons
"An easier way to do deduplication of machines, or be alerted to the fact that there's more than one instance of a machine, would be useful... That way you could get a more accurate device count, so you're not having an inflated number.""They could improve the main dashboard to more clearly show me the things that I want to see. When I open the dashboard right now, I see a million things and they are not always the things that I need.""This product has issues with the number of false positives that it reports.""In Orbital, there are tons of prebuilt queries, but there is not a lot of information in lay terms. There isn't enough information to help us with what we're looking for and why we are looking for it with this query. There are probably a dozen queries in there that really focus on what I need to focus on, but they are not always easy to find the first time through.""We had a lot of noise at the beginning, and we had to turn it down based on exclusions, application whitelisting, and excluding unknown benign applications. Cisco should understand the need for continuous updates on the custom Cisco exclusions and the custom applications that come out-of-the-box with the AMP for Endpoints.""The Linux agent is a simple offline classic agent, and it doesn't support Secure Boot, which is important to have on a Linux machine. The Linux agent has conflicts with other solutions, including the Exploit Prevention system found in Windows servers. We didn't find a fix during troubleshooting, and Cisco couldn't offer one either. Eventually, we had to shut down the Exploit Prevention system. We didn't like that as we always want a solution that can fit smoothly into the setup without causing problems, especially where security is concerned. The tool also caused CPU spikes on our production machine, and we were seriously considering moving to another product.""The thing I hate the most, which they have not fixed, is when it creates duplicate entries within a console. If you have a computer and you upgrade from Windows 7 to Windows 10, or you upgrade your agent from version 6 to 7, it creates a new instance in there instead of updating the information. Instead of paying a license for one computer, I have to license two computers until I manually go in, search for all the duplicate entries, and clean them out myself.""In terms of the user experience, if the UX design could be much simpler [that would improve things]... if they could make it more intuitive for someone who is not an engineer so that they still can read what's going on in their webpage and understand, that would be something."

More Cisco Secure Endpoint Cons →

"ESET Endpoint Security should offer more integration with multi-attack frameworks.""The interface is good. However, it could always be better. It could be more user-friendly.""There are some new antivirus technologies that rely on AI, artificial intelligence. ESET does not have this technology right now.""The integration capabilities might be lacking a bit.""They recently released an EDR integration. I hope they have more AI or intelligence filtering on the EDR events. Even though it has already got AI, but it is quite a different thing. So, they still have room to improve on the EDR part. This is one small piece that they need to improve. Otherwise, it is just fine.""In the future, a cloud version of the solution would be great.""The feature is somewhat lacking in security protection.""It can be hard to set up if you need to customize it."

More ESET Endpoint Security Cons →

"The solution could improve by providing better security and a cloud base version.""User management could be improved.""Endpoint Security would be improved by adding DLP.""A handbook of known issues and quick fixes should be given so that troubleshooting and frustration are less."

More Seqrite Endpoint Security Cons →

Pricing and Cost Advice
  • "Licensing fees are on a yearly basis and I am happy with the pricing."
  • "We have a license for 3,000 users and if we get up to 3,100 users, it doesn't stop working, but on the next renewal date you're supposed to go in there and add that extra 100 licenses. It's really good that they let you grow and expand and then pay for it. Sometimes, with other products, you overuse a license and they just don't work."
  • "Cisco Secure Endpoint is not too expensive and it's not cheap. It's quite fair."
  • "The price is very fair to the customer."
  • "...the licensing needs to be improved. All the product features we need are there. It's just a matter of the complexity and the different offerings and trying to figure things out."
  • "The pricing and licensing fees are okay."
  • "Because we do see the value of what it's bringing, I think they have priced it well."
  • "The solution is highly affordable; I believe we pay $2 or $3 per endpoint. It's significantly cheaper than the competitors on the market."
  • More Cisco Secure Endpoint Pricing and Cost Advice →

  • "The price could be lower, but it's comparable, as other solutions have a similar price for the same effect."
  • "I think it's available for a pretty fair price. If you know how to use it, then it's a very fair price for what you get."
  • "I pay about $100 a year, so it's really cheap. I'm sure that if I need something else beyond more technical support, I'll need to pay more."
  • "The license is annually, and the price is low compared to competitors."
  • "The price of the solution is reasonable compared to the other products out there. It is definitely in line with the competition."
  • "The price is okay and I don't have any issues with it."
  • "The price of the solution is reasonable compared to competitors."
  • "Its price is reasonable."
  • More ESET Endpoint Security Pricing and Cost Advice →

  • "There is no option to refund the money and unfortunately, we bought a three-year license, seeing that Quick Heal is a long-established player in the market."
  • "We pay approximately $1,500 for licenses for the solution."
  • "Endpoint Security is cheaper than Trend Micro."
  • More Seqrite Endpoint Security Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which EPP (Endpoint Protection for Business) solutions are best for your needs.
    657,849 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable feature is signature-based malware detection.
    Top Answer:Licensing fees are on a yearly basis and I am happy with the pricing.
    Top Answer:The GUI needs improvement, it's not good. There are false positives in emails. At times, the emails are blocked and… more »
    Top Answer:The price is good when you compare it to other solutions. That said, when the client needs to renew the license for the… more »
    Top Answer:There is no such thing as a 100% secure system. That said, the main problems are coming from the users and how they use… more »
    Top Answer:In case it works, we are looking to use features like USB blocking, file upload alerts, and other antivirus features as… more »
    Top Answer:There is no option to refund the money and unfortunately, we bought a three-year license, seeing that Quick Heal is a… more »
    Top Answer:Integrity is compromised, they should accept a bug in the software and promptly provide a simple fix, like on Macs… more »
    Comparisons
    Also Known As
    Cisco AMP for Endpoints
    Smart Security
    Seqrite End Point Security, Seqrite EPS
    Learn More
    ESET
    Video Not Available
    Overview

    Cisco Secure Endpoint is a cloud-managed endpoint security solution that provides advanced protection against viruses, malware, and other cyber threats by detecting, preventing, and responding to threats. Cisco Secure Endpoint is managed online via a web-based management console and can be deployed on a variety of platforms. It protects endpoints, networks, emails, and web traffic.

    In a world of evolving threats, it’s necessary to put security above everything. Cisco Secure Endpoint provides you with the scope, scale, and capabilities to attain effective security with its integrated portfolio and industry-leading threat intelligence. Cisco Secure Endpoint continuously tracks and analyzes files and file activities across your systems - both remote and on premises - and compares these events to other events that occurred before or during past attacks. If a file exhibits malicious behavior, the tool sends an alert which enables you to stop a potential threat from succeeding.

    Key Capabilities of Cisco Secure Endpoint

    • Multi-layered protection: Cisco Secure Endpoint combines behavioral analytics, machine learning, and signature-based techniques to prevent threats from compromising your endpoints.

    • Powerful EDR capabilities: Reduce attack surface using advanced endpoint and extended detection and response, threat hunting, and endpoint isolation.

    • Dynamic malware analysis: Identify and block attacks in real time.

    • Simplified investigations: Advanced search capabilities help you get the information you need about your endpoints fast.

    Reviews from Real Users

    Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.

    Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."

    Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."

    ESET Endpoint Security is a comprehensive multilayered solution, combining machine learning and human expertise to deliver the ultimate in protection. The solution is deployed on endpoint devices to prevent file-based malware attacks, detect malicious activity, and provide the investigation and remediation capabilities needed to respond to dynamic security incidents and alerts.

    The technology, which is based in 30+ years of research and innovation, is constantly adjusting and changing to provide the best balance of detection, low false positives and performance.

    ESET endpoint protection products support all OSes including Windows, macOS, Linux and Android.

    Seqrite Endpoint Security is a comprehensive security platform used to protect enterprise networks and connected devices from advanced threats. To do so, it integrates with innovative technologies such as Anti Ransomware, Advanced DNA Scan, and Behavioral Detection System.

    Seqrite Endpoint Security Features

    Seqrite Endpoint Security has many valuable key features. Some of the most useful ones include:

    • Application control: Seqrite Endpoint Security gives you control over the use of unauthorized applications within the network.
    • Advanced device control: Seqrite Endpoint Security configures device policies for different device types for Windows and Mac platforms to safeguard the network against unverified devices.
    • Data loss prevention (DLP): Seqrite Endpoint Security’s data loss prevention secures confidential data to avoid losses. Another advantage of this feature is that data that is at rest can also be scanned on endpoints and removable devices.
    • Ransomware protection: Seqrite Endpoint Security uses behavior-based detection technology to detect and block ransomware threats. In addition, it also backs up your data in a secured location to help you restore your files in case of a ransomware attack.
    • Vulnerability scan: By scanning known vulnerabilities of applications and operating systems, users can update necessary security patches.
    • Web filtering: With the web filtering featureת you can block websites individually or according to categories in order to limit web access for employees.
    • Asset management: This feature helps alert administrators of any alterations on company systems by monitoring hardware and software configurations.
    • File activity monitor: Seqrite Endpoint Security enables you to monitor confidential company files and notifies administrators when such files are copied, renamedת or deleted.
    • IDS/IPS protection: Seqrite Endpoint Security provides advanced protection that proactively detects malicious activity to prevent attacks that may exploit application vulnerabilities.
    • Group policy management: Based on the hierarchy within your organization, administrators can define user groups and can also set flexible policies depending on situational requirements.

    Seqrite Endpoint Security Benefits

    There are several benefits to implementing Seqrite Endpoint Security. Some of the biggest advantages the solution offers include:

    • Advanced security: Seqrite Endpoint Security offers 360-degree data security. The solution provides comprehensive endpoint and data protection in one integrated solution and is suitable for businesses of all sizes.
    • Uninterrupted protection: With Seqrite Endpoint Security, your daily business operations go uninterrupted, with protection that works to prevent malicious websites, phishing attacks, and more.
    • Linux-based support: Seqrite Endpoint Security’s solution supports Linux-based systems and also provides higher scalability and enhanced security for Windows and Mac platforms.
    • Compliance: The solution has competitive security enhancements to meet enterprises’ compliance needs.
    • Patch management: With Seqrite Endpoint Security, you will have access to simplified and centralized patch management strategy, allowing for higher productivity and more robust security.
    • Vulnerability detection: By using proactive scanning of installed applications, Seqrite Endpoint Security is able to detect unforeseen vulnerabilities and also reduce unauthorized installations.
    • Reduced risk: Because the solution has enhanced device control features, it is easier to reduce business security risks.
    • Advanced endpoint protection: The solution provides advanced endpoint protection with antivirus, firewall, intrusion detection, and more.

    Reviews from Real Users

    A Manager IT at a healthcare company says, “We use the solution for managing our main product, antivirus, and device locking. There are many features available in this solution, such as asset management. It is easy to install and stable.”

    Offer
    Learn more about Cisco Secure Endpoint
    Learn more about ESET Endpoint Security
    Learn more about Seqrite Endpoint Security
    Sample Customers
    Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
    ERSTE Group Bank, Miller Solutions, Wesleyan University, The Hospital Center of Luxembourg, Deer Valley USD, SPAR, Industrial Federal Credit Union, Honda, City Hall of Palmela, Hays CISD, Lester B Pearson School Board
    Gadre, Bharat Vikas Group, Fernandez Hospital, Fabtech Projects & Engineering, KIMS Hospital, National Steel And Agro Industries, Sardar Patel University, Sterling Wilson, Chowgule Industries
    Top Industries
    REVIEWERS
    Comms Service Provider16%
    Manufacturing Company11%
    Healthcare Company11%
    Government11%
    VISITORS READING REVIEWS
    Computer Software Company19%
    Comms Service Provider13%
    Government8%
    Financial Services Firm7%
    REVIEWERS
    Non Tech Company11%
    Financial Services Firm11%
    Media Company7%
    Retailer7%
    VISITORS READING REVIEWS
    Comms Service Provider25%
    Computer Software Company20%
    Educational Organization5%
    Retailer5%
    VISITORS READING REVIEWS
    Computer Software Company19%
    Comms Service Provider19%
    Media Company9%
    Government8%
    Company Size
    REVIEWERS
    Small Business34%
    Midsize Enterprise23%
    Large Enterprise43%
    VISITORS READING REVIEWS
    Small Business26%
    Midsize Enterprise18%
    Large Enterprise56%
    REVIEWERS
    Small Business65%
    Midsize Enterprise17%
    Large Enterprise18%
    VISITORS READING REVIEWS
    Small Business37%
    Midsize Enterprise21%
    Large Enterprise42%
    VISITORS READING REVIEWS
    Small Business33%
    Midsize Enterprise32%
    Large Enterprise36%
    Buyer's Guide
    ESET Endpoint Security vs. Seqrite Endpoint Security
    November 2022
    Find out what your peers are saying about ESET Endpoint Security vs. Seqrite Endpoint Security and other solutions. Updated: November 2022.
    657,849 professionals have used our research since 2012.

    ESET Endpoint Security is ranked 14th in EPP (Endpoint Protection for Business) with 45 reviews while Seqrite Endpoint Security is ranked 42nd in EPP (Endpoint Protection for Business) with 4 reviews. ESET Endpoint Security is rated 8.4, while Seqrite Endpoint Security is rated 6.0. The top reviewer of ESET Endpoint Security writes "Good at detecting potentially dangerous websites, but the alerts can be confusing at times". On the other hand, the top reviewer of Seqrite Endpoint Security writes "Slows Mac machine boot time, many issues with instability, and the support is not helpful ". ESET Endpoint Security is most compared with Microsoft Defender for Endpoint, SentinelOne, Sophos Intercept X and CrowdStrike Falcon, whereas Seqrite Endpoint Security is most compared with Sophos Intercept X, Trend Micro Apex One, Kaspersky Endpoint Security for Business, Symantec Endpoint Security and Bitdefender GravityZone Enterprise Security. See our ESET Endpoint Security vs. Seqrite Endpoint Security report.

    See our list of best EPP (Endpoint Protection for Business) vendors.

    We monitor all EPP (Endpoint Protection for Business) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.