Contact Details

Cisco Systems, Inc.

Located in United States, California, San Jose

Founded in 1984

Best For User Type

  • Simplified investigations
  • Integrated XDR capabilities
  • Built-in SecureX threat hunting
Search

Compare product ratings to similar products Find other products with similar features to suit your business

contact us

Have you used this product before? Find other productswith similar features to suit your business

Write a review

Does this product belong to you

Alternatives to Cisco Secure Endpoint

SentinelOne Active EDR

SentinelOne Active EDR

No ratings yet!
Falcon Insight

Falcon Insight

No ratings yet!
Blackberry optics

Blackberry optics

No ratings yet!
MVISION EDR

MVISION EDR

No ratings yet!
Cortex XDR

Cortex XDR

No ratings yet!
Cynet 360

Cynet 360

No ratings yet!
Sophos Intercept X

Sophos Intercept X

No ratings yet!
Apex One

Apex One

No ratings yet!
Binary Defense MDR

Binary Defense MDR

No ratings yet!
FireEye Endpoint Security

FireEye Endpoint Security

No ratings yet!
View all alternatives

What is Cisco Secure Endpoint?

Show Less

Contact Details

Cisco Systems, Inc.

Located in United States, California, San Jose

Founded in 1984

Best For User Type

  • Simplified investigations
  • Integrated XDR capabilities
  • Built-in SecureX threat hunting

Top Industries Represented

Data from Grid Report for Endpoint Detection and Response (Edr) Software

View grid data

Deployment & Support

Deployment

  • Cloud, Saas, Web-based
  • Desktop-mac
  • Desktop-Windows
  • Desktop-Linux
  • Desktop-Chromebook
  • On Promise Windows
  • On Premise Linux
  • Mobile-Android
  • Mobile-Iphone
  • Mobile-Ipad

Support

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live Recap)

Training

  • In Person
  • Live Online
  • Webinars
  • Documentation
  • Videos

Cisco Secure Endpoint Pricing

Check out our offers for each of our packages to get best out of the software

Secure Endpoint Essentials

Custom Price
On request

    Secure Endpoint Advantage

    Custom Price
    On request

      Secure Endpoint Premier

      Custom Price
      On request

        Visit us on our website to know more

        Get a custom quote

        Cisco Secure Endpoint Features

        Primary Features

        Behavioral Analytics

        EDR uses behavioral analysis to analyze and connect the activity of individual users on your system.

        Remediation Management

        Endpoint Remediation is the process of resolving a cybersecurity threat once it has been identified to have infiltrated an endpoint device, such as a PC, laptop, mobile phone, tablet or even IoT device.

        Vulnerability Scanning

        Vulnerability scanning is an inspection of the potential points of exploit on a computer or network to identify security holes.

        Endpoint Management

        Endpoint management is an IT and cybersecurity process that consists of two main tasks: evaluating, assigning and overseeing the access rights of all endpoints; and applying security policies and tools that will reduce the risk of an attack or prevent such events.

        Real Time Monitoring

        Real-time monitoring is the process of collecting and storing performance metrics for data as it traverses your network. It involves polling and streaming data from infrastructure devices so that you know how your networks, applications, and services are performing.

        Secondary Features

        • Device Management
        • Maintenance Scheduling
        • Compliance Tracking
        • Third Party Integrations
        • Encryption

        Compare with Similar Products

        SentinelOne Active EDR

        SentinelOne Active EDR

        Falcon Insight

        Falcon Insight

        Blackberry optics

        Blackberry optics

        MVISION EDR

        MVISION EDR

        Cortex XDR

        Cortex XDR

        Cynet 360

        Cynet 360

        Sophos Intercept X

        Sophos Intercept X

        Apex One

        Apex One

        Binary Defense MDR

        Binary Defense MDR

        FireEye Endpoint Security

        FireEye Endpoint Security

        Show Comparisons