We changed our name from IT Central Station: Here's why

Cisco Secure Endpoint OverviewUNIXBusinessApplication

Cisco Secure Endpoint is #4 ranked solution in endpoint security software and EDR tools. PeerSpot users give Cisco Secure Endpoint an average rating of 10 out of 10. Cisco Secure Endpoint is most commonly compared to Microsoft Defender for Endpoint: Cisco Secure Endpoint vs Microsoft Defender for Endpoint. Cisco Secure Endpoint is popular among the large enterprise segment, accounting for 51% of users researching this solution on PeerSpot. The top industry researching this solution are professionals from a comms service provider, accounting for 24% of all views.
What is Cisco Secure Endpoint?

Advanced Malware Protection (AMP) is subscription-based, managed through a web-based management console, and deployed on a variety of platforms that protects endpoints, network, email and web Traffic. AMP key features include the following: Global threat intelligence to proactively defend against known and emerging threats, Advanced sandboxing that performs automated static and dynamic analysis of files against more than 700 behavioral indicators, Point-in-time malware detection and blocking in real time and Continuous analysis and retrospective security regardless of the file's disposition and Continuous analysis and retrospective security.

Cisco Secure Endpoint was previously known as Cisco AMP for Endpoints.

Cisco Secure Endpoint Buyer's Guide

Download the Cisco Secure Endpoint Buyer's Guide including reviews and more. Updated: January 2022

Cisco Secure Endpoint Customers

Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank

Cisco Secure Endpoint Video

Archived Cisco Secure Endpoint Reviews (more than two years old)

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
MohamedEladawy
Designer Engineer Cyber Security at Salam Technology
Real User
Top 10
Good sandboxing features but the technical support could be better
Pros and Cons
  • "It is a very stable program."
  • "The technical support is very slow."

What is our primary use case?

We mainly use this program for our business operations.

What is most valuable?

The feature I find most valuable is the sandboxing.

What needs improvement?

I think there should be better support and I would also like to see an easier implementation of the solution. The support should be cheaper and more available during the implementation stage. It would be great if they could have support teams that involve an AMP team because there's a specific team for AMP.

For how long have I used the solution?

I have been using Cisco AMP for Endpoints for around three years now.

What do I think about the stability of the solution?

Cisco AMP for Endpoints has been very stable so far. 

What do I think about the scalability of the solution?

I believe the solution is scalable. We have around 200 end users working on this program, and then we have a team of 15 that is responsible for technical and maintenance issues.

How are customer service and technical support?

I will rate the technical support a six out of ten because their response time was very slow. Not as fast as they used to be.

Which solution did I use previously and why did I switch?

We also use Micro, so we use two programs simultaneously. 

How was the initial setup?

I did the initial setup myself and it was really easy and straightforward.

What other advice do I have?

I will recommend this solution to others. I would, however, like to see better features and implementation to cover some points. It would be nice if they could add more protocols to support encrypted files, and be able to inspect an encrypted file, or at least be able to support that. Better and faster technical support is also necessary. 

On a scale from one to 10, I rate this solution a seven.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: partner
CEO at Oriental Weavers
Real User
It is stable, easy to scale and I like the price
Pros and Cons
  • "I am really satisfied with the technical support."
  • "I would like more seamless integration."

What is most valuable?

I like that this program is very light on the computer and very powerful. I also like the price.

What needs improvement?

I would like more seamless integration, because I have a security solution based on Cisco and I'm looking at integration for the old solution. It would be much easier for the security administrator to monitor integration.

For how long have I used the solution?

I have you been using this solution for almost a year now.

What do I think about the scalability of the solution?

I guess it's easy to scale, because I started a project with the requirements and when I needed to move forward to scale it up, it's been so easy. We currently have around 50 users. 

How are customer service and technical support?

I am really satisfied with the technical support.

Which solution did I use previously and why did I switch?

I also use Trend Micro. I use both programs, because they have different security layers. Both programs are very good.

How was the initial setup?

The initial setup was straightforward as we used one of the Cisco partners. The deployment took a couple of days. 

What other advice do I have?

On a scale from one to ten, I will rate this solution an eight. I do recommend it to others.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Learn what your peers think about Cisco Secure Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: January 2022.
564,599 professionals have used our research since 2012.
Mohammad Siraj
Deputy GM at Oregon Systems
Real User
A solution that's easy to implement, is highly scalable and is extremely user-friendly
Pros and Cons
  • "The stability of the solution is perfect. I believe it's the most stable solution on the market right now."
  • "The reporting and analytics areas of the solution need to be improved."

What is our primary use case?

We're in the banking sector. We use AMP to protect security endpoints.

What is most valuable?

The ease of implementation is a very valuable aspect of the solution. It's also very user-friendly.

What needs improvement?

The reporting and analytics areas of the solution need to be improved.

For how long have I used the solution?

I've been using the solution for four years.

What do I think about the stability of the solution?

The stability of the solution is perfect. I believe it's the most stable solution on the market right now.

What do I think about the scalability of the solution?

The solution is highly scalable. It's the best part of the solution because we have done the sizing. We have focused on the sizing, which was highly scalable. And it's very clean, clear and very transparent in this area.

How are customer service and technical support?

We're very satisfied with technical support. It's one of the best.

How was the initial setup?

The initial setup was straightforward. We're well-versed in the solution, so for us, it was easy.

What about the implementation team?

We handle the implementation ourselves.

What other advice do I have?

We use the hybrid deployment model.

I would advise other potential users that if they are looking for a long term security solution, this particular solution is going to add value to their cybersecurity strategy. Cisco AMP is one of the solutions that adds value to your cybersecurity roadmap. It should not be considered as a solution, but rather as a strategy.

I would rate the solution nine out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Solution Architect / Presales Engineer at a comms service provider with 1,001-5,000 employees
Real User
Offers a good scope and a good ability to shut attacks down then go back and see what happened
Pros and Cons
  • "The simplicity of use is its most valuable feature. You can very clearly see things."
  • "The initial setup is a bit complex because you need to execute existing antiviruses or security software that you have on your device."
  • "In the next release, I would for it to have back up abilities. I would like the ability to go back to a point in time to when my PC was uninfected and to the moment of when the infection happened."

What is our primary use case?

I use the public cloud deployment model. I have installed the license, the software, on my VM and it is being managed by Cisco Cloud.

My primary use case for this solution is to test it against malicious links and for encryption and decryption. 

What is most valuable?

The simplicity of use is its most valuable feature. You can very clearly see things. You have the ability to go back in time and get details, where the malware started, what happened and where it went from the minute it got in. It offers a good scope and a good ability to shut it down then go back and see what happened. 

What needs improvement?

It should be doing backups. Every stage that this malware is going forward, it should snapshot the situation. Then I could go back to the first stage before it got infected. It doesn't have this option, and I know that other manufacturers have it, like Check Point, for example. 

In the next release, I would for it to have back up abilities. I would like the ability to go back to a point in time to when my PC was uninfected and to the moment of when the infection happened.

For how long have I used the solution?

I have been using AMP for Endpoints for three months.

What do I think about the stability of the solution?

The stability is good. 

What do I think about the scalability of the solution?

I haven't needed to scale up yet but from what I see it's supposed to be easy. My organization sells this solution. We provide the service and management of the environment of our clients. 

It only requires one staff member for deployment and maintenance. 

I'm looking to expand the usage. I offer this solution to almost every endpoint SMB client. I'm looking to establish a faster solution and I meet with clients to discuss their network security. 

How are customer service and technical support?

We haven't needed to contact their technical support because we've never had a problem that we couldn't resolve ourselves. 

Which solution did I use previously and why did I switch?

We were previously using Check Point Sandblast Agent. We switched because it wasn't as stable as this one. We had some problems with it and we needed to contact their support and it wasn't so good. I would get tough questions from my clients so eventually I told them that we would look into other solutions.

We also work with Fortinet but I prefer AMP. 

How was the initial setup?

The initial setup is a bit complex because you need to execute existing antiviruses or security software that you have on your device. 

The deployment took around fifteen to twenty minutes. 

What about the implementation team?

I deployed it myself. I am the consultant who does the deployments. 

What's my experience with pricing, setup cost, and licensing?

The costs of 50 licenses of AMP for three years is around $9,360. There are no additional costs. 

What other advice do I have?

Just purchase the license, download it, install it to an active device, the main controller, and send it to everyone. My advice is that you need to delete your existing endpoint security solution because AMP actually contains everything that you need. Those two softwares can attack each other which can be a problem.

I would rate it a nine out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
CISO & COO at a tech services company with 1-10 employees
Real User
Improves our security using network segmentation, IPS, and integration with ISE
Pros and Cons
  • "The most valuable features of this solution are the IPS and the integration with ISE."
  • "In the next version of this solution, I would like to see the addition of local authentication."

What is our primary use case?

We use this solution as part of our organization security.

How has it helped my organization?

This solution has allowed us to segment the organization to provide better security.

What is most valuable?

The most valuable features of this solution are the IPS and the integration with ISE.

What needs improvement?

In the next version of this solution, I would like to see the addition of local authentication.

How are customer service and technical support?

Technical support for this solution is good. 

What about the implementation team?

We did the integration ourselves.

What was our ROI?

We have seen ROI with this solution.

What's my experience with pricing, setup cost, and licensing?

The licensing fees for this solution are paid on a yearly basis.

Which other solutions did I evaluate?

We chose this product based on research and for its integration with other Cisco security products.

What other advice do I have?

This is a good product but there are always going to be some issues.

I would rate this solution an eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Mohammad Siraj
Deputy GM at Oregon Systems
Real User
Cloud-based, highly scalable and highly integrated
Pros and Cons
  • "For the initial first level of support, we provide it from our side. If there's escalation required, we use Cisco tech for the AMP. And again, they are perfect. I mean, one of the best, compared to any other vendors."
  • "The solution needs more in-depth analytics."

What is most valuable?

The most important thing is that they're cloud-based. And Cisco has introduced Cisco Umbrella, which includes AMP, Open DNS, and they integrated certain solutions, and AMP is part of their portfolio. That's why it's adding value. 

What needs improvement?

When we're talking about anti-malware protection, AMP is a very good solution, but again, the CSO level reports are not generated. There is a dashboard, there is a report, but again, those reports have to be taken to the CSO, because when it comes to security, we always want to have high-level reports. So if we had a system that generated reports from the AMP itself, that would be great for us.

Also, the solution needs more in-depth analytics. Right now they have implemented AMP, so, monitoring is happening, but you need to see what exactly is happening, the updates and then the mode of attacks that have happened and have been prevented. An in-depth report could be generated, and it should be on a CSO level. That's the value should be added to AMP solution.

For how long have I used the solution?

I've been using the solution for 4 years.

What do I think about the stability of the solution?

The solution's stability is perfect. It's the best. All the customers we have sold it to have been super happy. We mostly work with SMEs, small and medium-sized enterprises.

What do I think about the scalability of the solution?

It is scalable. Since it is part of the umbrella family, it is highly scalable, and highly integrated as well.

How are customer service and technical support?

For the initial first level of support, we provide it from our side. If there's escalation required, we use Cisco tech for the AMP. And again, they are perfect. I mean, one of the best, compared to any other vendors.

How was the initial setup?

The initial setup was straightforward and user-friendly.

What's my experience with pricing, setup cost, and licensing?

If you talk about the commercial aspect, this solution is not the Gartner one. We have a challenge because there are other solutions which are Gartner solutions, where we have competition. So we have to justify, explain, show the value propositions and then we sell are able to sell.

What other advice do I have?

I would say that if you have a vision or plan for security, and want to have an integrated solution, AMP can be a very integral part of this digitization roadmap. AMP should be considered if you have digitization or a digitalization plan, which most if not all organizations are going for. So I think AMP is good for that, from the security standpoint.

I would give this solution an 8 out of 10. It has all the solutions. 

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
Chief Information Officer at Sacramento County
Real User
The sheer volume of the number of emails that it blocks has increased staff productivity
Pros and Cons
  • "I am told that we get over 100 million emails a month. This filters them down and allows only somewhere about three million emails, which is a great help."
  • "I would like them to add whatever makes filtering more advanced in scanning and blocking for malware in emails."

What is our primary use case?

The primary use case is email filtering.

We are using the latest version.

How has it helped my organization?

I am told that we get over 100 million emails a month. This filters them down and allows only somewhere about three million emails, which is a great help.

What is most valuable?

We are a Cisco shop, so it just integrates with everything else that we are doing.

What needs improvement?

I would like them to add whatever makes filtering more advanced in scanning and blocking for malware in emails. It would just improve the product further. I think they are working on this, the continuous improvement aspect. 

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

The stability seems to work well.

What do I think about the scalability of the solution?

The scalability is fine.

How are customer service and technical support?

The technical support is sufficient. Every time that we have had an issue, we call the tech support, and they are very responsive.

Which solution did I use previously and why did I switch?

We wanted to get a homogeneous environment where everything works together and is integrated well together. This was a big advantage and big driver for us.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

We used Dimension Data for the deployment. The experience was positive.

What was our ROI?

This solution has helped increase staff productivity, e.g., if you get 1000 emails a day and 95 percent of those are garbage, then the savings that you receive from going through those emails is immense.

We have seen a measurable decrease in the mean time to detect or respond to threats by 90 percent, blocking a vast majority of threats. 

What other advice do I have?

Seriously consider it. It blocks a lot of emails. Look at the market, do your evaluation, and pick the right solution for you.

We are fairly mature in our security program maturity, but there is always room for improvement.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Edvins Logins
IT Security Services Owner at Atea Global services
Consultant
Its most valuable features are its scalability and advanced threat protection for customers
Pros and Cons
  • "Its most valuable features are its scalability and advanced threat protection for customers."
  • "We would like to have an API integration with a SIEM solution, because as far as I know, it currently hasn't yet been released."

What is our primary use case?

We are trying to provide managed security services. This solution would be part of those managed security services.

How has it helped my organization?

We are on proof of concept phase and will see how it works.

I hope it will help decrease mean time to detect and respond, because it provides scalability, and we could make an efficient, effective service providing it for customers.

What is most valuable?

  • Scalability
  • Ability to integrate with SIEM.
  • Advanced threat protection for customers.

What needs improvement?

We would like to have an API integration with a SIEM solution, because as far as I know, it currently hasn't yet been released. We are looking forward to it because it's important for us to integrate the product with a SIEM solution in order to provide our customers a good, robust solution.

It needs major improvement with its ease of integration.

For how long have I used the solution?

Trial/evaluations only.

What do I think about the stability of the solution?

So far, so good.

What do I think about the scalability of the solution?

The scalability is good.

How are customer service and technical support?

We have not had any technical cases.

Which solution did I use previously and why did I switch?

We are providing our customers multiple solutions depending on their needs. So, it's more like what our customer needs. We could go with Cisco or maybe we could with another vendor (we will see). Right now, we are quite satisfied with Cisco.

How was the initial setup?

For what we have already set up, the process has been straightforward.

What was our ROI?

We are estimating 5 to 10 percent staff productivity increases.

What's my experience with pricing, setup cost, and licensing?

Our partner in Norway does the price negotiation.

Which other solutions did I evaluate?

We are looking for cost-effective, efficient solutions for our customers, and Cisco happens to be one of the vendors who fits into that scope.

Microsoft is another vendor who offers a similar licensing model for this type of solution. There is also McAfee and Trend Micro. It depends on the customer's requirements.

What other advice do I have?

We have some mature security services, like anti-malware. We are looking to broaden our service portfolio and are on the first steps to climb further. 

You should always assess your customers' needs. Once you get that information, you just look for respective vendors. 

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
ITCS user
Solution Sales Specialist at a tech services company with 5,001-10,000 employees
MSP
Real-time threat prevention using sandboxing, file trajectory, and retrospective security
Pros and Cons
  • "Real-time threat prevention using sandboxing, file trajectory, and retrospective security."
  • "It does not include encryption and decryption of local file shares."

What is our primary use case?

Endpoint security prevents malware and exploit kits coming into your mobile devices, and when you are outside the corporate network and not protected by the firewall.

How has it helped my organization?

Provides enhanced security, lowering IT risks, and IT operational costs by integrating with Cisco NGFW, network security and email security.

What is most valuable?

Real-time threat prevention using sandboxing, file trajectory, and retrospective security. On the prevention side, AMP has nine engines.

New feature AMP Visibility (beta) is an IR orchestration tool, where the local AMP for Endpoint Intelligence, Talos Intelligence, Threat Grid, AMP global intelligence, Umbrella Investigate, and VirusTotal are correlated. This gives a visual IR tool where you can search by file (SHA256), IP, or domain.

AMP for Endpoints is not a point solution. The AMP architecture also support ISR routers, IPSs, and NGFWs, Email and web security from Cisco is making common cloud threat architecture for all customers checkpoints.

What needs improvement?

It does not include:

  • Encryption
  • Decryption of local file shares
  • Disks and URL filtering are done by separate product (Umbrella/OpenDNS).

For how long have I used the solution?

Less than one year.

What's my experience with pricing, setup cost, and licensing?

Pricing can be more expensive than similar software that does less functionality, but not recognized by customers.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Cisco Secure Endpoint Report and get advice and tips from experienced pros sharing their opinions.