Earn 20 points
Cisco Secure Endpoint is a cloud-managed endpoint security solution that provides advanced protection against viruses, malware, and other cyber threats by detecting, preventing, and responding to threats. Cisco Secure Endpoint is managed online via a web-based management console and can be deployed on a variety of platforms. It protects endpoints, networks, emails, and web traffic.
In a world of evolving threats, it’s necessary to put security above everything. Cisco Secure Endpoint provides you with the scope, scale, and capabilities to attain effective security with its integrated portfolio and industry-leading threat intelligence. Cisco Secure Endpoint continuously tracks and analyzes files and file activities across your systems - both remote and on premises - and compares these events to other events that occurred before or during past attacks. If a file exhibits malicious behavior, the tool sends an alert which enables you to stop a potential threat from succeeding.
Key Capabilities of Cisco Secure Endpoint
Reviews from Real Users
Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.
Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
Adaptive Defense 360 is a cyber-security service that combines next-generation protection (NG EPP) and detection and remediation technologies (EDR), with the ability to classify 100% of running processes.
VIPRE is a leading provider of Internet security solutions purpose-built to protect businesses, solution providers, and home users from costly and malicious cyber threats. With over twenty years of industry expertise, VIPRE is one of the world’s largest threat intelligence clouds, delivering unmatched protection against today’s most aggressive online threats.
Panda Security Adaptive Defense is ranked 31st in Endpoint Protection for Business (EPP) with 7 reviews while VIPRE Endpoint Security Cloud is ranked 58th in Endpoint Protection for Business (EPP). Panda Security Adaptive Defense is rated 7.6, while VIPRE Endpoint Security Cloud is rated 0.0. The top reviewer of Panda Security Adaptive Defense writes "Managing multiple machines is a pain, but support is top notch". On the other hand, Panda Security Adaptive Defense is most compared with Microsoft Defender for Endpoint, ESET Endpoint Security, Sophos Intercept X, CrowdStrike Falcon and Kaspersky Endpoint Security for Business, whereas VIPRE Endpoint Security Cloud is most compared with .
See our list of best Endpoint Protection for Business (EPP) vendors.
We monitor all Endpoint Protection for Business (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.