Coming October 25: PeerSpot Awards will be announced! Learn more

Panda Security Adaptive Defense vs Sophos Intercept X comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Panda Security Adaptive Defense and Sophos Intercept X based on real PeerSpot user reviews.

Find out in this report how the two EPP (Endpoint Protection for Business) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.

To learn more, read our detailed Panda Security Adaptive Defense vs. Sophos Intercept X report (Updated: September 2022).
632,779 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP.""I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It should protect all kinds of things that might happen on the servers, things that I cannot see.""Device Trajectory is one of the most valuable features. We're able to dig in and really understand how things came to be and where to focus our efforts.""appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst. I can track everything that happens on our server from my PC or device. Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us.""The integration with other Cisco products seemed to be really effective. We had Umbrella in place and we were using AnyConnect as well as Firepower. Once a threat was detected, being able to do the threat lookups and the live tracking was really useful.""Definitely, the best feature for Cisco Secure Endpoint is the integration with Talos. On the backend, Talos checks all the signatures, all the malware, and for any attacks going on around the world... Because Secure Endpoint has a connection to it, we get protected by it right then and there.""The entirety of our network infrastructure is Cisco and the most valuable feature is the integration.""The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great."

More Cisco Secure Endpoint Pros →

"I've found it's got excellent web protection.""Great technical support staff.""It allows us to stop activation windows.""It prevents our users from circumventing security. Everything is password protected so they can't get into it. They can't uninstall it. They can't do anything.""The protection from malware is the most important feature. It has some endpoint information about the vehicle of the virus, malware, etc. It is also stable and easy to install, and they also provide good technical support.""The product so far has been good at protecting us. We haven't faced a breach.""The most valuable features of Panda Security Adaptive Defense are the useful hardware information it provides, light on resources, controllable from the console, remote scan functionality, and the blocking of a lot of URL malware.""The interface is great."

More Panda Security Adaptive Defense Pros →

"It's a good antivirus software and has a lot of features. It now integrates with their on-premises firewall, which is perfect.""What I have found the most valuable about Sophos Intercept X is the ease of use with management administration and the solution's ability to stop exploits and ransomware.""The solution is scalable.""One of the best use cases involves synchronized security staff, which allows us to manage both the firewall and the anti-virus features from the cloud.""Sophos Intercept X has a host of valuable features, including its anti-malware feature, which we considered key.""The most valuable features are ease of use and the GUI.""The security on offer is pretty good. We are happy with it.""Solution for endpoint detection and response, with good stability and scalability. Users also benefit from email protection and data loss prevention."

More Sophos Intercept X Pros →

Cons
"The GUI needs improvement, it's not good.""In Orbital, there are tons of prebuilt queries, but there is not a lot of information in lay terms. There isn't enough information to help us with what we're looking for and why we are looking for it with this query. There are probably a dozen queries in there that really focus on what I need to focus on, but they are not always easy to find the first time through.""It could be improved in connection with artificial intelligence and IoT.""The thing I hate the most, which they have not fixed, is when it creates duplicate entries within a console. If you have a computer and you upgrade from Windows 7 to Windows 10, or you upgrade your agent from version 6 to 7, it creates a new instance in there instead of updating the information. Instead of paying a license for one computer, I have to license two computers until I manually go in, search for all the duplicate entries, and clean them out myself.""This product has issues with the number of false positives that it reports.""They could improve the main dashboard to more clearly show me the things that I want to see. When I open the dashboard right now, I see a million things and they are not always the things that I need.""In terms of the user experience, if the UX design could be much simpler [that would improve things]... if they could make it more intuitive for someone who is not an engineer so that they still can read what's going on in their webpage and understand, that would be something.""An easier way to do deduplication of machines, or be alerted to the fact that there's more than one instance of a machine, would be useful... That way you could get a more accurate device count, so you're not having an inflated number."

More Cisco Secure Endpoint Cons →

"We do get the odd false positive when we're trying to install the software.""It needs some improvements in the DNS security feature. Currently, it does not have full DNS security. It only has semi-DNS security, which can be improved. It is an important feature for us, and it would be really good if they can improve the DNS security feature. Our group has some plans to change to Cisco AMP, which has features such as DNS, Umbrella. We are trying to learn about Cisco AMP and compare it with Panda.""It needs improvements in its EDR and its ability to manage all the nodes. I'd like better communication between the console and the nodes, so I don't have to remote into each individual machine that's having an issue with the protection.""It would be nice if Panda Security Adaptive Defense could come out with remote desktop usage.""Panda Security Adaptive Defense can improve by including the intrusion and prevention system not only on their most expensive platform. Additionally, it blocks software that is legitimate from users. They complain and then we have to manually unblock the software, by hash, or we receive a message. Some of the prevention features are not available and this might cause us to need a separate firewall or something to protect the company.""The implementation was difficult.""Needs a better way to scan the hardware to detect whether it's valid.""Occasionally, we suffer from little bugs that give us the wrong message."

More Panda Security Adaptive Defense Cons →

"I would like to have a built-in firewall, rather than having to integrate one.""The initial setup can be difficult if you don't come in with at least some knowledge about the product.""When I use a proxy, I can bypass Sophos, which is an area that needs improvement.""The choices offered for the on-premises and cloud-based platforms are the reverse of each other.""We would like more application control in order to be able to schedule times and access.""I have not done it, but integrating it with authenticating the users on the Windows system looks a bit complicated to me. It could be because I don't understand it.""It consumes a lot of resources, and something needs to be done for that.""Installing Sophos Intercept X was not as straightforward, as we had to ask support and had to work with an integrator, though the process didn't take much time, e.g. it was completed within one hour."

More Sophos Intercept X Cons →

Pricing and Cost Advice
  • "Licensing fees are on a yearly basis and I am happy with the pricing."
  • "We have a license for 3,000 users and if we get up to 3,100 users, it doesn't stop working, but on the next renewal date you're supposed to go in there and add that extra 100 licenses. It's really good that they let you grow and expand and then pay for it. Sometimes, with other products, you overuse a license and they just don't work."
  • "Cisco Secure Endpoint is not too expensive and it's not cheap. It's quite fair."
  • "The price is very fair to the customer."
  • "...the licensing needs to be improved. All the product features we need are there. It's just a matter of the complexity and the different offerings and trying to figure things out."
  • "The pricing and licensing fees are okay."
  • "Because we do see the value of what it's bringing, I think they have priced it well."
  • "The solution is highly affordable; I believe we pay $2 or $3 per endpoint. It's significantly cheaper than the competitors on the market."
  • More Cisco Secure Endpoint Pricing and Cost Advice →

  • "The licensing costs are not too high. We pay about 20 Euros a year. It's a reasonable amount to pay."
  • "I don't think Panda's license is too expensive, but they're charging more than it's worth. It's a yearly license. For 1,000 endpoints, it's around $18,000."
  • "There is a license needed to use this solution and it is approximately $30 annually."
  • More Panda Security Adaptive Defense Pricing and Cost Advice →

  • "I find the pricing to be a little bit expensive, although it is acceptable, for now."
  • "The price of this product should be reduced because it is a little high."
  • "The pricing is average for software like this, but you can purchase additional services if you wish."
  • "Compared to other solutions, such as CrowdStrike, we are most certainly happy with its pricing. We did a three year-business deal."
  • "I am not sure about the cost. I would guess it to be between $50 to $60 per license. This would be the cost of the overall subscription. There is no additional fee."
  • "Licensing costs are not expensive."
  • "Its price depends on the scenario. It is very expensive, but it is not more expensive than other vendors. The price of Check Point and other vendors is much higher than Sophos."
  • "You can purchase a license for one to three years."
  • More Sophos Intercept X Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which EPP (Endpoint Protection for Business) solutions are best for your needs.
    632,779 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable feature is signature-based malware detection.
    Top Answer:Licensing fees are on a yearly basis and I am happy with the pricing.
    Top Answer:The GUI needs improvement, it's not good. There are false positives in emails. At times, the emails are blocked and… more »
    Top Answer:The product so far has been good at protecting us. We haven't faced a breach.
    Top Answer:The licensing costs are not too high. We pay about 20 Euros a year. It's a reasonable amount to pay.
    Top Answer:Although the antivirus solution is so good that we've never suffered from an attack, we've had a few problems with false… more »
    Top Answer:I like that Crowdstrike Falcon allows me to easily correlate data between my firewalls. Its detection and machine… more »
    Top Answer:Bonjour Monsieur, Pour le cas de Sophos InterceptX le déploiement est selon un demarché très aisée et d’une façon… more »
    Top Answer:The most valuable feature of Intercept X its ability to stay ahead of the infection. By the time the ransomware spreads… more »
    Comparisons
    Also Known As
    Cisco AMP for Endpoints
    Panda Security Adaptive Defense 360, Panda Security Endpoint Protection, Panda Security for Desktops
    Intercept X
    Learn More
    Overview

    Cisco Secure Endpoint is a cloud-managed endpoint security solution that provides advanced protection against viruses, malware, and other cyber threats by detecting, preventing, and responding to threats. Cisco Secure Endpoint is managed online via a web-based management console and can be deployed on a variety of platforms. It protects endpoints, networks, emails, and web traffic.

    In a world of evolving threats, it’s necessary to put security above everything. Cisco Secure Endpoint provides you with the scope, scale, and capabilities to attain effective security with its integrated portfolio and industry-leading threat intelligence. Cisco Secure Endpoint continuously tracks and analyzes files and file activities across your systems - both remote and on premises - and compares these events to other events that occurred before or during past attacks. If a file exhibits malicious behavior, the tool sends an alert which enables you to stop a potential threat from succeeding.

    Key Capabilities of Cisco Secure Endpoint

    • Multi-layered protection: Cisco Secure Endpoint combines behavioral analytics, machine learning, and signature-based techniques to prevent threats from compromising your endpoints.

    • Powerful EDR capabilities: Reduce attack surface using advanced endpoint and extended detection and response, threat hunting, and endpoint isolation.

    • Dynamic malware analysis: Identify and block attacks in real time.

    • Simplified investigations: Advanced search capabilities help you get the information you need about your endpoints fast.

    Reviews from Real Users

    Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.

    Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."

    Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."

    Adaptive Defense 360 is a cyber-security service that combines next-generation protection (NG EPP) and detection and remediation technologies (EDR), with the ability to classify 100% of running processes.

    Sophos Intercept X stops the widest range of attacks with a unique combination of deep learning malware detection, exploit prevention, anti-ransomware, and more.

    Offer
    Learn more about Cisco Secure Endpoint
    Learn more about Panda Security Adaptive Defense
    Learn more about Sophos Intercept X
    Sample Customers
    Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
    Indra, Valea AB, Fineit, Aemcom, Data Solutions INC., Gloucestershire NHS, Golden Star Resources Ltd, Hispania Racing Team, Instituto Dos Museus e da ConserÊo, Escuelas Pias Provincia Emaus, Axiom Housing Association, Municipality of Bjuv, Lesedi Nuclear, Mullsj_ municipality, Eng. skolan Norr AB, Dalakraft AB, Peter Green Haulage Ltd
    Flexible Systems
    Top Industries
    REVIEWERS
    Comms Service Provider16%
    Government11%
    Healthcare Company11%
    Manufacturing Company11%
    VISITORS READING REVIEWS
    Computer Software Company19%
    Comms Service Provider15%
    Government8%
    Financial Services Firm6%
    REVIEWERS
    Security Firm29%
    Manufacturing Company29%
    Engineering Company29%
    Financial Services Firm14%
    VISITORS READING REVIEWS
    Comms Service Provider32%
    Computer Software Company22%
    Wholesaler/Distributor8%
    Government5%
    REVIEWERS
    Financial Services Firm17%
    Manufacturing Company14%
    Healthcare Company10%
    Insurance Company7%
    VISITORS READING REVIEWS
    Computer Software Company18%
    Comms Service Provider18%
    Government7%
    Educational Organization6%
    Company Size
    REVIEWERS
    Small Business34%
    Midsize Enterprise23%
    Large Enterprise43%
    VISITORS READING REVIEWS
    Small Business25%
    Midsize Enterprise19%
    Large Enterprise55%
    REVIEWERS
    Small Business73%
    Midsize Enterprise20%
    Large Enterprise7%
    VISITORS READING REVIEWS
    Small Business30%
    Midsize Enterprise27%
    Large Enterprise43%
    REVIEWERS
    Small Business63%
    Midsize Enterprise17%
    Large Enterprise20%
    VISITORS READING REVIEWS
    Small Business35%
    Midsize Enterprise22%
    Large Enterprise43%
    Buyer's Guide
    Panda Security Adaptive Defense vs. Sophos Intercept X
    September 2022
    Find out what your peers are saying about Panda Security Adaptive Defense vs. Sophos Intercept X and other solutions. Updated: September 2022.
    632,779 professionals have used our research since 2012.

    Panda Security Adaptive Defense is ranked 29th in EPP (Endpoint Protection for Business) with 9 reviews while Sophos Intercept X is ranked 6th in EPP (Endpoint Protection for Business) with 56 reviews. Panda Security Adaptive Defense is rated 7.6, while Sophos Intercept X is rated 8.6. The top reviewer of Panda Security Adaptive Defense writes "Managing multiple machines is a pain, but support is top notch". On the other hand, the top reviewer of Sophos Intercept X writes "Great reporting and good training with a pretty straightforward setup". Panda Security Adaptive Defense is most compared with Microsoft Defender for Endpoint, ESET Endpoint Security, Kaspersky Endpoint Security for Business, CrowdStrike Falcon and SentinelOne, whereas Sophos Intercept X is most compared with Microsoft Defender for Endpoint, SentinelOne, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and Cortex XDR by Palo Alto Networks. See our Panda Security Adaptive Defense vs. Sophos Intercept X report.

    See our list of best EPP (Endpoint Protection for Business) vendors.

    We monitor all EPP (Endpoint Protection for Business) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.