Top Rated Cisco Secure Endpoints Alternatives
21 Cisco Secure Endpoints Reviews
Overall Review Sentiment for Cisco Secure Endpoints
Log in to view review sentiment.
Ease of use and deployment to our endpoints. Policy customization and reporting is excellent. Reasearching and finding root cause of an issue with tools provided helps tremendously as well. Review collected by and hosted on G2.com.
Only issue we have come accross is the usability of the product with deprecated operating systems. We understand the risk in that area, but some systems take time to upgrade and many moving parts on said systems might not support newer operating systems. Review collected by and hosted on G2.com.
Very useful platform and easily integrated end to end with complete cisco stack of technologies which enables complete security visibility and enables efficent incident response. Review collected by and hosted on G2.com.
It has seperate portal for on prem and cloud deployments so for hybrid devices a unfied platform should be adopted. Review collected by and hosted on G2.com.
Good UI, very easy to use and gives you access to information regarding deployed assets, current status and any detected threats. Review collected by and hosted on G2.com.
There is very little not to like about a solution that gives you great visibility of your deployed assets and any detected threats on them, with options to remediate. Review collected by and hosted on G2.com.
Cisco protects your network and users against attacks and many types of threats such as Ransomware, Malware, Exploit. It is very fast in detecting threat and consumes little ram memory. Cisco AMP is certified as an “Approved Business Product” by AV-Comparatives, the tested products must score at least 90% in the Malware Protection Test, and at least 90% in the overall Real-World Protection Test Review collected by and hosted on G2.com.
As every anti-malware sometimes gives false positives, files are classified as threats.
Installing on Macs is not as easy as it sounds Review collected by and hosted on G2.com.
I liked the insight that Cisco AMP would Provide. It was in great detail that allowed us to determine issues faster. The agent was very lightweight as well and thats always a a big plus for an organization like ours. Review collected by and hosted on G2.com.
We unfortunetly didnt like the detection time frame. During our testing with Cisco AMP we noticed the detection times for virus's/malware/ransomeware was much slower than competitors. This was a large downfall for us. Review collected by and hosted on G2.com.
Cisco AMP can help IT control our computer remotely, I always have some VPN issue, and IT just easily take over from me and resolve it! That's perfect! It saved a lot of time of back and forth. Review collected by and hosted on G2.com.
On my end (IOS system), Cisco AMP requested full-screen access, which makes me concerned a bit. But all in all, it's a must-have. Review collected by and hosted on G2.com.
I love that the product is cloud based, it can communicate with my devices that are on-site and which may be offsite, I can easily white list an app that they don't know about or black list something I don't want to be used in my environment. Have a device that a user won't bring in for updates? I can isolate it and prevent it from getting anywhere on the internet! The hash based functionality for detections seems to be great, sometimes it results in a false positive, but as noted above we can white list apps that we so choose. Review collected by and hosted on G2.com.
It can be a resource hog without rhyme or reason, before we added an internal Tetra server all of our devices would update at once and clog our internet pipe, but with our on-site tetra server, the devices at home won't get tetra updates, so they show up as being "out of date" - needs to be an option for two servers for the updates, one for when the user is on-site with the device, one for when they are at home. Review collected by and hosted on G2.com.
It is not big, and cannot realize it is running. But will block threats whenever needed. Review collected by and hosted on G2.com.
Menu is simple and don't have detail control. If it can provide us more detail control in a "advanced model" that will help person like me to make it exactly like what I want. Review collected by and hosted on G2.com.
We utilize Cisco AMP on our ASA and our CES as well. Using it everywhere gives us great visibility into where a file came from and what it does. Review collected by and hosted on G2.com.
When whitelisting files, for example, some security tools, AMP can get pretty picky on the file and stealing it from us. More of an annoyance because it is security software. When adding to the whitelist and re-syncing the policy this can add a minute or two. It is still a straightforward process. Review collected by and hosted on G2.com.
I love this Cisco software because it provides a very complete protection for endpoints and this is because from the point of entry and is acting to prevent any vulnerability regardless of whether it is very advanced for all this is prepared, It is also able to provide its users with a view of blind spots so all the servers that run on Windows, MacOS, Android, iOS and Linux can observe them in more detail and is that before any attack this software acts immediately isolating the final point affected to remedy it and once it is completely well put back in place and all with just a few clicks, but the best thing is that this powerful software is ideal for companies that want to carry out non-rigorous implementations but effective. Review collected by and hosted on G2.com.
One of the flaws or deficiencies in this powerful Cisco software is that sometimes it gives false positives of found malwares, besides that for its configuration it takes more time than it is because it is not at all simple. Review collected by and hosted on G2.com.