TrustRadius: an HG Insights company

Cisco Secure Endpoint

Score9.3 out of 10

92 Reviews and Ratings

What is Cisco Secure Endpoint?

Cisco Secure Endpoint is a comprehensive, cloud-managed endpoint security solution designed to protect devices from advanced malware and cyber threats throughout the entire attack lifecycle—before, during, and after an attack. It offers powerful prevention capabilities to identify and stop threats before they compromise your systems, using multifaceted techniques including risk-based vulnerability management and posture assessments. The solution provides deep visibility and advanced detection through Endpoint Detection and Response (EDR) and integrated Extended Detection and Response (XDR) capabilities, enabling rapid threat hunting, investigation, and response with enriched global threat intelligence from Cisco Talos.

Cisco Secure Endpoint supports a wide range of devices including laptops, desktops, servers, mobile devices, and virtual workloads. It is a core component of Cisco’s broader security architecture, including the Breach Protection Suite and User Protection Suite, and is designed to simplify security operations while improving efficacy and resilience against evolving threats.


This solution is suitable for organizations seeking a unified, scalable endpoint security platform that combines prevention, detection, response, and expert-managed services to protect their endpoints and reduce risk effectively.


For customers evaluating endpoint security solutions, Cisco Secure Endpoint offers flexible licensing tiers (Essentials, Advantage, Premier) to fit different needs and budgets, with options to add advanced threat hunting and managed services.

Categories & Use Cases

Top Performing Features

  • Malware Detection

    Detection and blocking of zero-day file and fileless malware.

    Category average: 9

  • Endpoint Detection and Response (EDR)

    Continuous monitoring and response to advanced internet threats by endpoint agents.

    Category average: 9.1

  • Hybrid Deployment Support

    Administrators should be able to choose endpoint security on-premise, cloud, or hybrid.

    Category average: 8.3

Areas for Improvement

  • Vulnerability Management

    Vulnerability prioritization for fixes.

    Category average: 8.3

  • Anti-Exploit Technology

    In-memory and application layer attack blocking (e.g. ransomeware)

    Category average: 8.6

  • Centralized Management

    Centralized management supporting multi-factor authentication, customized views, and role-based access control.

    Category average: 8.5

Great Endpoint Security Capabilities With Cisco Secure Endpoint

Use Cases and Deployment Scope

Cisco Secure Endpoint has been our security solution against cyberattacks for over 5 years. The platform combines XDR, EDR, and EPP to keep our business endpoints secure. It seamless detects, prevents, and remediate cyber threats on time thereby keeping our systems, networks, and devices performing optimally. With its advanced threat intelligence, ability to deal with known/unknown threats and the fact that it works across all devices makes a great endpoint security solution.

Pros

  • Enforces Zero Trust policy.
  • Reliable threat prevention, detection, and remediation.
  • Works across all devices and operating systems.
  • Automated containment - it is able to isolate infected devices from main network to avoid spread of cyber threats.
  • XDR threat hunting works perfectly.

Cons

  • Support is slow.
  • Outdated user interface.

Return on Investment

  • It ensures minimal spread of cyber threats in case of infiltration thanks to containment response capabilities.
  • By keeping our endpoints threat-proof, our systems and devices run efficiently hence better productivity.
  • It frees IT staff thanks to its automation and ability to keep threats away with minimal intervention.

Usability

Other Software Used

AWS Backup, AWS Chatbot

Protecting Devices and Systems With Cisco Secure Endpoint

Use Cases and Deployment Scope

With its multilayered protection, this tool protects all our devices from all manner of endpoint threats. We have deployed Cisco Secure Endpoint company-wide and it helps keep cyberattacks at bay. From ransomware, malware, data breaches, among other threats, this tool detects, responds, block and reports all manner of threats thereby keeping of devices and systems optimal. It ensures proper visibility and its proactive threat hunting makes it a better tool.

Pros

  • Proactive threat hunting.
  • Detects, responds, and block threats.
  • Works on all devices.
  • Offers advanced threat protection.

Cons

  • It is not the most affordable.

Return on Investment

  • Keeps our devices protected and performing optimally.
  • It's multilayered protection and proactive threat monitoring both ensures no cyber threat goes unnoticed.
  • It reduces our security costs thanks to its effectiveness in dealing with endpoint threats.

Usability

Other Software Used

Avica Remote Desktop, Zoom Rooms, Avaya Communications API

An Advanced Endpoint Protection Solution That Suits Our Needs

Use Cases and Deployment Scope

The most critical way we use Cisco Secure Endpoint in our company is to safeguard our endpoints. Unlike other similar tools, the threat detection and response features of Cisco Secure Endpoint are exceptional. To add on that, Cisco Secure Endpoint's endpoint visibility capabilities are world-class and highly powerful. It keeps our endpoints secure from malware 24/7.

Pros

  • Cisco Secure Endpoint keeps our company's systems and endpoints safe from threats and malware.
  • Cisco Secure Endpoint offers endpoint visibility services all the time.
  • Cisco Secure Endpoint has exceptional threat detection features.

Cons

  • The developer of Cisco Secure Endpoint should make its interface more intuitive.
  • Cisco Secure Endpoint's performance should be improved to enhance efficiency.
  • Cisco Secure Endpoint has integration complexities which should be addressed.

Return on Investment

  • It offers fast services when it comes to threat detection and response
  • Minimizes security incidents
  • Improves compliance

Usability

Alternatives Considered

Trellix Endpoint Detection and Response (EDR), Symantec Endpoint Security and Securden Endpoint Privilege Manager

Other Software Used

Cisco 5520 Wireless Controller, Zoho Bookings, Vena

My Experience With Cisco Secure Endpoint.

Use Cases and Deployment Scope

We have deployed Cisco Secure Endpoint to enhance our security and threat awareness, and it has worked flawlessly. It comes with advanced threat detection features, and it not only detects cyberattacks but also blocks, responds to, and prevents threats. It is accurate thanks to its AI capabilities, and it works on all operating systems. Additionally, continuous monitoring of threats and the ability to centralize threat management make it a more effective solution for endpoint protection.

Pros

  • It is fast in detecting cyberattacks.
  • It centralizes threat management.
  • I like continuous monitoring of threats.
  • Responds and blocks threats.
  • Works on all operating systems.

Cons

  • I have had no bad encounters.

Return on Investment

  • Keeps threats at bay and our systems run efficiently.
  • Supports Windows and MacOS.
  • It has enhanced our preparedness in handling endpoint threats.

Usability

Other Software Used

Apple Remote Desktop, Cyren Email Security, Akamai Identity Cloud

Cisco Secure Endpoint

Use Cases and Deployment Scope

We use Cisco Secure Endpoint mainly to protect our customers’ laptops, servers, and virtual machines. It helps us stop malware and ransomware, gives visibility on endpoint activity, and integrates well with the Cisco security stack (like SecureX). As a Cisco partner, it’s a practical tool we use both internally and in customer deployments to improve detection and response while keeping operations running smoothly.

Pros

  • Easy deployment and management across different endpoints
  • strong malware and ransomware protection
  • good integration with SecureX and other Cisco tools

Cons

  • Licensing and price could be more competitive compared to other vendors
  • Reporting and dashboards could be more user-friendly and customizable

Return on Investment

  • Stronger protection of customer data
  • Reduced incident response time
  • Greater visibility into threats

Usability

Other Software Used

Splunk Enterprise, Splunk Enterprise Security, Cisco UCS X-Series, ChatGPT