Cisco Secure Endpoint
Cisco Secure Endpoint
Cisco Secure Endpoint integrates threat detection and response capabilities to identify and mitigate risks across devices. It leverages behavioral analytics and threat intelligence to address complex attack vectors.
Cisco Secure Endpoint integrates threat detection and response capabilities to identify and mitigate risks across devices. It leverages behavioral analytics and threat intelligence to address complex attack vectors.
Cost considerations
Functionality
Compatibility
User experience
Customer support
Why these ratings?
Cyberse perspective
Solution details
Cloud ecosystem partners
Amazon Web Services
Microsoft Azure Cloud
Google Cloud Platform
Key features
API access
Platform solution
Point solution
Subcategory
Endpoint Detection & Response
Endpoint Protection Platform
Pricing
Free trial available
Integrations
Security automation
Target industry
Technology
Public sector
Industrials
Healthcare
Retail
Manufacturing
Financial services
Market segment
Small business
Enterprise
Midmarket
Services support
In-house services
Managed services
Product features
Signature-based detection
Behavioral-based detection
Deployment
Cloud-native
Cloud-hosted
We use the following criteria to evaluate this product:
Cost considerations
The base Essentials tier is moderately priced, but customers pay extra for sandboxing, Orbital search, and full SecureX/XDR in the Advantage and Premier bundles. Those add-on costs raise the overall bill yet stop short of the highest-priced competitors. The net spend lands in the middle of the market.
Cost considerations
The base Essentials tier is moderately priced, but customers pay extra for sandboxing, Orbital search, and full SecureX/XDR in the Advantage and Premier bundles. Those add-on costs raise the overall bill yet stop short of the highest-priced competitors. The net spend lands in the middle of the market.
Functionality
Cisco Secure Endpoint uses machine-learning detection plus real-time EDR to stop threats and lets analysts trigger automated actions like quarantine or process kill. The software streams detailed endpoint data into SecureX to support cross-domain investigations and XDR. Device control and built-in firewall options lag the most comprehensive suites, so overall functionality ranks just below the top tier.
Functionality
Cisco Secure Endpoint uses machine-learning detection plus real-time EDR to stop threats and lets analysts trigger automated actions like quarantine or process kill. The software streams detailed endpoint data into SecureX to support cross-domain investigations and XDR. Device control and built-in firewall options lag the most comprehensive suites, so overall functionality ranks just below the top tier.
Compatibility
Cisco Secure Endpoint installs on Windows, macOS and Linux, while Android and iOS are protected through separate mobile connectors delivered by MDM. Events and telemetry export cleanly to third-party SIEMs through APIs and syslog, so security teams keep a unified view. This coverage handles most modern endpoints but falls short of the full legacy-OS and VDI depth required for a top score.
Compatibility
Cisco Secure Endpoint installs on Windows, macOS and Linux, while Android and iOS are protected through separate mobile connectors delivered by MDM. Events and telemetry export cleanly to third-party SIEMs through APIs and syslog, so security teams keep a unified view. This coverage handles most modern endpoints but falls short of the full legacy-OS and VDI depth required for a top score.
User experience
Cisco Secure Endpoint provides a cloud console with guided workflows but the interface feels crowded and navigation across SecureX panes takes practice. Device isolation is available from the UI, yet finding investigation data or policy settings often requires several clicks. Most security teams need formal training before they are fully comfortable managing daily tasks.
User experience
Cisco Secure Endpoint provides a cloud console with guided workflows but the interface feels crowded and navigation across SecureX panes takes practice. Device isolation is available from the UI, yet finding investigation data or policy settings often requires several clicks. Most security teams need formal training before they are fully comfortable managing daily tasks.
Customer support
Cisco provides round-the-clock phone and chat access to its global technical assistance center and a dedicated Talos incident-response team. Daily threat-intelligence updates from Talos feed directly into Secure Endpoint. This 24×7 expert coverage and continuous intel place Cisco’s support ahead of most endpoint security competitors.
Customer support
Cisco provides round-the-clock phone and chat access to its global technical assistance center and a dedicated Talos incident-response team. Daily threat-intelligence updates from Talos feed directly into Secure Endpoint. This 24×7 expert coverage and continuous intel place Cisco’s support ahead of most endpoint security competitors.