IT Central Station is now PeerSpot: Here's why

Hysolate vs Wedge Cloud Network Defense comparison

Cancel
You must select at least 2 products to compare!
Cisco Logo
21,041 views|12,877 comparisons
Hysolate Logo
358 views|141 comparisons
Wedge Networks Logo
55 views|24 comparisons
Featured Review
Buyer's Guide
Endpoint Protection for Business (EPP)
May 2022
Find out what your peers are saying about CrowdStrike, SentinelOne, Microsoft and others in Endpoint Protection for Business (EPP). Updated: May 2022.
597,415 professionals have used our research since 2012.
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pricing and Cost Advice
  • "The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost."
  • "Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc."
  • "In our case, it is a straightforward annual payment through our Enterprise Agreement."
  • "Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection."
  • "There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization."
  • "The Enterprise Agreement is like an all-you-can-eat buffet of Cisco products. In that vein, it was very affordable."
  • "We can know if something bad is potentially happening instantaneously and prevent it from happening. We can go to a device and isolate it before it infects other devices. In our environment, that's millions of dollars saved in a matter of seconds."
  • "The pricing and licensing are reasonable. The cost of AMP for Endpoints is inline with all the other software that has a monthly endpoint cost. It might be a little bit higher than other antivirus type products, but we're only talking about a dollar a month per user. I don't see that cost as being an issue if it's going to give us the confidence and security that we're looking for. We have had a lot of success and happiness with what we're using, so there's no point in changing."
  • More Cisco Secure Endpoint Pricing and Cost Advice →

    Information Not Available
    Information Not Available
    report
    Use our free recommendation engine to learn which Endpoint Protection for Business (EPP) solutions are best for your needs.
    597,415 professionals have used our research since 2012.
    Questions from the Community
    Top Answer: 
    It is extensive in terms of providing visibility and insights into threats. It allows for research into a threat, and… more »
    Top Answer: 
    The pricing was negotiated before I started, so I don't really know.
    Top Answer: 
    While I've attended a lot of their training webinars, they were mostly high-level. They just say that these are the… more »
    Ask a question

    Earn 20 points

    Ask a question

    Earn 20 points

    Comparisons
    Also Known As
    Cisco AMP for Endpoints
    WedgeCND
    Learn More
    Hysolate
    Video Not Available
    Overview

    Cisco Secure Endpoint is a cloud-managed endpoint security solution that provides advanced protection against viruses, malware, and other cyber threats by detecting, preventing, and responding to threats. Cisco Secure Endpoint is managed online via a web-based management console and can be deployed on a variety of platforms. It protects endpoints, networks, emails, and web traffic.

    In a world of evolving threats, it’s necessary to put security above everything. Cisco Secure Endpoint provides you with the scope, scale, and capabilities to attain effective security with its integrated portfolio and industry-leading threat intelligence. Cisco Secure Endpoint continuously tracks and analyzes files and file activities across your systems - both remote and on premises - and compares these events to other events that occurred before or during past attacks. If a file exhibits malicious behavior, the tool sends an alert which enables you to stop a potential threat from succeeding.

    Key Capabilities of Cisco Secure Endpoint

    • Multi-layered protection: Cisco Secure Endpoint combines behavioral analytics, machine learning, and signature-based techniques to prevent threats from compromising your endpoints.

    • Powerful EDR capabilities: Reduce attack surface using advanced endpoint and extended detection and response, threat hunting, and endpoint isolation.

    • Dynamic malware analysis: Identify and block attacks in real time.

    • Simplified investigations: Advanced search capabilities help you get the information you need about your endpoints fast.

    Reviews from Real Users

    Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.

    Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."

    Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."

    Hysolate is a software platform that enables running multiple isolated operating systems on a single device with a unified and seamless user experience. Using Hysolate, organizations can apply the utmost security when accessing sensitive corporate systems and data without impacting user productivity.

    Cloud Network Defense is the world's highest performance cloud security solution. As an embedded software defined solution, it doesn't require user traffic to leave the network. Situated between the client request and the destination server, it directs the actual switching fabric of the network to inspect and implement policy-based security services on selected traffic in real time. This architecture employs the award-winning WedgeOS with the deepest security inspection possible to replace endpoint based security. Its Elastic Security Service Orchestration can dynamically process high volumes of network traffic in real time without compromising the performance of the world's largest and most demanding networks.

    Offer
    Learn more about Cisco Secure Endpoint
    Learn more about Hysolate
    Learn more about Wedge Cloud Network Defense
    Sample Customers
    Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
    Information Not Available
    Bell, SUZUE CORPORATION, NEC, airtel, MARVELL
    Top Industries
    REVIEWERS
    Government13%
    Healthcare Company13%
    Manufacturing Company13%
    University7%
    VISITORS READING REVIEWS
    Comms Service Provider24%
    Computer Software Company22%
    Government7%
    Financial Services Firm5%
    VISITORS READING REVIEWS
    Comms Service Provider34%
    Computer Software Company21%
    Energy/Utilities Company7%
    Retailer5%
    No Data Available
    Company Size
    REVIEWERS
    Small Business39%
    Midsize Enterprise18%
    Large Enterprise43%
    VISITORS READING REVIEWS
    Small Business28%
    Midsize Enterprise21%
    Large Enterprise52%
    No Data Available
    No Data Available
    Buyer's Guide
    Endpoint Protection for Business (EPP)
    May 2022
    Find out what your peers are saying about CrowdStrike, SentinelOne, Microsoft and others in Endpoint Protection for Business (EPP). Updated: May 2022.
    597,415 professionals have used our research since 2012.

    Hysolate is ranked 54th in Endpoint Protection for Business (EPP) while Wedge Cloud Network Defense is ranked 62nd in Endpoint Protection for Business (EPP). Hysolate is rated 0.0, while Wedge Cloud Network Defense is rated 0.0. On the other hand, Hysolate is most compared with SentinelOne and Bromium, whereas Wedge Cloud Network Defense is most compared with .

    See our list of best Endpoint Protection for Business (EPP) vendors.

    We monitor all Endpoint Protection for Business (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.