"Among the most valuable features are the exclusions. And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source."
"Device Trajectory is one of the most valuable features. We're able to dig in and really understand how things came to be and where to focus our efforts."
"It is extensive in terms of providing visibility and insights into threats. It allows for research into a threat, and you can chart your progress on how you're resolving it."
"The entirety of our network infrastructure is Cisco and the most valuable feature is the integration."
"Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP."
"The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great."
"I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It should protect all kinds of things that might happen on the servers, things that I cannot see."
"Definitely, the best feature for Cisco Secure Endpoint is the integration with Talos. On the backend, Talos checks all the signatures, all the malware, and for any attacks going on around the world... Because Secure Endpoint has a connection to it, we get protected by it right then and there."
"Some of the most valuable features were antivirus, malware, and spyware. They were really good."
"Symantec End-User Endpoint Security is easy to use."
"Its response time is the most valuable. It is very quick."
"The application and device control functionality is good. We are able to see which applications are installed using the product management dashboard."
"It is good for detecting signature-based viruses, and it is user friendly."
"The dashboard view and reporting are valuable. It is stable and easy to integrate, and it provides custom options."
"The solution detects malware very well."
"Great security and very user friendly."
"It's easy to use and the interface is simple."
"Deep Security is a good product for managing a few servers."
"The traceback feature in XDR is amazing. You can trace back an attack. You can playback where an attack actually occurred and see how the attacker moved. We can easily show this to management, and it makes it easy to make them understand and convince them, which is the best thing."
"It integrates well with the cloud; for example, AWS, and Google Cloud Provider."
"We've found stability to be great so far."
"The performance is good."
"DLP, Data Loss Prevention, and the complexity of how we manage the console and how this client, or this tool, will notify us when there is something going wrong within the server and endpoint, is good."
"We find that their technical support team is always accessible and willing to assist."
"We don't have issues. We think that Cisco covers all of the security aspects on the market. They continue to innovate in the right way."
"In Orbital, there are tons of prebuilt queries, but there is not a lot of information in lay terms. There isn't enough information to help us with what we're looking for and why we are looking for it with this query. There are probably a dozen queries in there that really focus on what I need to focus on, but they are not always easy to find the first time through."
"They could improve the main dashboard to more clearly show me the things that I want to see. When I open the dashboard right now, I see a million things and they are not always the things that I need."
"The thing I hate the most, which they have not fixed, is when it creates duplicate entries within a console. If you have a computer and you upgrade from Windows 7 to Windows 10, or you upgrade your agent from version 6 to 7, it creates a new instance in there instead of updating the information. Instead of paying a license for one computer, I have to license two computers until I manually go in, search for all the duplicate entries, and clean them out myself."
"It could be improved in connection with artificial intelligence and IoT."
"This product has issues with the number of false positives that it reports."
"The GUI needs improvement, it's not good."
"I would like to see integration with Cisco Analytics."
"Symantec isn't good in terms of updating customers about updates. You'd normally have to search it out. Sometimes, the update process for the administration and management console can be a bit intimidating, and it can be quite inconvenient to get the updates. That's because when you have to do the update, you have to update the management console, and then you need to update the clients. Their application that's installed on desktops and servers needs to go hand in hand with the management console. Sometimes, it's a bit unwieldy to see that process through."
"The agent shouldn't use up so many resources at the endpoint when scanning and protecting."
"The malware and ransomware protections could be improved, which was ultimately the reason why I stopped using the solution."
"I would like to be able to migrate to the cloud so that the end-users outside the company offices don't need a VPN to connect to the Symantec server to update the policies. They should be able to connect to the admin center directly through the internet to get updated policies. There is some integration issue with the other security appliances or tools. Other hardware, firewall, or Network Detection and Response (NDR) solution vendors are not willing to integrate with Symantec. They only mention products from other vendors such as CrowdStrike and Carbon Black. Symantec is not there. Symantec should work on integration with products from other security vendors."
"The Sandboxing and ATP functionality does not integrate very well, improving this would be helpful."
"The solution already has support for Windows, Mac, and Linux but it could improve by having better support for Linux. We have run into some problems when there are upgrades. If they can improve this point, Symantec would be good for endpoint protection as well as for a critical server."
"The support needs to be better. When we upgrade, we can run into issues, and it's hard to get the help we require."
"Future releases should ideally be cheaper."
"The problem with this solution is that if you go on large sites you have to have an external database, which would increase the cost."
"I would like to see an EDR function for the servers, as that would be useful for us."
"The cost is very high."
"The product isn't very user-friendly."
"Deep Security's reporting functionality could be improved."
"Another issue is if I want to suggest this solution to a customer, we won't get the pricing immediately, which is a major problem."
"I would like to see XDR features and endpoint sensor become available."
"The licensing structure could improve."
Cisco Secure Endpoint is a cloud-managed endpoint security solution that provides advanced protection against viruses, malware, and other cyber threats by detecting, preventing, and responding to threats. Cisco Secure Endpoint is managed online via a web-based management console and can be deployed on a variety of platforms. It protects endpoints, networks, emails, and web traffic.
In a world of evolving threats, it’s necessary to put security above everything. Cisco Secure Endpoint provides you with the scope, scale, and capabilities to attain effective security with its integrated portfolio and industry-leading threat intelligence. Cisco Secure Endpoint continuously tracks and analyzes files and file activities across your systems - both remote and on premises - and compares these events to other events that occurred before or during past attacks. If a file exhibits malicious behavior, the tool sends an alert which enables you to stop a potential threat from succeeding.
Key Capabilities of Cisco Secure Endpoint
Reviews from Real Users
Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.
Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
Unmatched Endpoint Safety for Your OrganizationAs an on-premises, hybrid, or cloud-based solution, the single-agent Symantec platform protects all your traditional and mobile endpoint devices, and uses artificial intelligence (AI) to optimize security decisions.
Trend Micro Deep Security is a powerful server security solution for physical, virtual, and cloud servers. It protects data centers and cloud operations from breaches and business disruptions without making use of emergency patching. This centrally managed platform ensures regulatory compliance and speeds up the return on investment (ROI) for virtualization and cloud initiatives.
Trend Micro Deep Security is offered as software or as a service. The solution includes integrated modules such as anti-malware, web reputation, firewall, intrusion prevention, integrity monitoring, and log inspection. Trend Micro Deep Security is a single, multifunction agent that can be deployed across all settings and streamlines security operations by providing a single management dashboard for all capabilities.
Trend Micro Deep Security works with cloud systems including Amazon Web Services (AWS), Microsoft Azure, and VMware vCloud Air to extend data center security standards to cloud-based applications.
Trend Micro Deep Security Features
Trend Micro Deep Security has many valuable key features. Some of the most useful ones include:
Reviews from Real Users
Trend Micro Deep Security stands out among its competitors for a number of reasons. Two major ones are its robust data and loss prevention feature and its patch management, which saves users money. PeerSpot users take note of the advantages of these features in their reviews:
One PeerSpot reviewer, a Senior Security Advisor at a healthcare company, writes, “DLP, Data Loss Prevention, and the complexity of how we manage the console and how this client, or this tool, will notify us when there is something going wrong within the server and endpoint, is good.”
Nadeem S., CEO at Haniya Technologies, notes of the solution, “Patch management is most valuable. The major selling point of Deep Security is that it is based on the cloud. Deep Security is for the servers and databases of data centers, and generally, for patch management, you have to shut down the machines, and then you have to restart them. So, they need shutdown time, which is a cost.”
Symantec Endpoint Security is ranked 11th in EPP (Endpoint Protection for Business) with 61 reviews while Trend Micro Deep Security is ranked 1st in Virtualization Security with 26 reviews. Symantec Endpoint Security is rated 7.4, while Trend Micro Deep Security is rated 8.4. The top reviewer of Symantec Endpoint Security writes "Lacks next-generation behaviour-based detection, offers terrible technical support, and not as robust as competitors". On the other hand, the top reviewer of Trend Micro Deep Security writes "Scalable and secure with an easy initial setup". Symantec Endpoint Security is most compared with Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and Fortinet FortiEDR, whereas Trend Micro Deep Security is most compared with Trend Micro Apex One, CrowdStrike Falcon, Microsoft Defender for Endpoint, Carbon Black CB Defense and SentinelOne.
We monitor all EPP (Endpoint Protection for Business) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.