


Cisco Secure Endpoint and Dell Endpoint Security powered by CrowdStrike Falcon are focused on endpoint protection. Cisco Secure Endpoint appears to have the upper hand due to its comprehensive threat detection and integration capabilities.
Features: Cisco Secure Endpoint offers comprehensive threat detection, threat hunting capabilities, and integrated threat intelligence. Dell Endpoint Security offers advanced threat prevention, robust endpoint detection, and cloud-based analytics.
Ease of Deployment and Customer Service: Cisco Secure Endpoint features streamlined deployment for businesses using Cisco systems with responsive support. Dell Endpoint Security provides flexible deployment options and strong customer service for companies needing adaptive security solutions.
Pricing and ROI: Cisco Secure Endpoint is a cost-effective solution with significant ROI for existing Cisco users through integration capabilities. Dell Endpoint Security may have higher initial setup costs but offers long-term value with advanced analytics and threat prevention, justifying the investment.


| Company Size | Count |
|---|---|
| Small Business | 44 |
| Midsize Enterprise | 20 |
| Large Enterprise | 47 |
| Company Size | Count |
|---|---|
| Small Business | 21 |
| Midsize Enterprise | 14 |
| Large Enterprise | 21 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader.
Cisco Secure Endpoint was formerly known as Cisco AMP for Endpoints.
Reviews from Real Users
Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.
Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
Dell Endpoint Security powered by CrowdStrike Falcon offers an advanced cybersecurity solution that provides comprehensive protection against sophisticated threats ensuring endpoint safety and effective threat management.
With cutting-edge technology, Dell Endpoint Security powered by CrowdStrike Falcon enhances security measures by leveraging real-time threat intelligence and proactive defense mechanisms. Designed to address the critical needs of endpoint protection, it utilizes a cloud-native architecture to deliver rapid threat detection and response. This strategic approach ensures minimal system impact while providing robust capabilities in mitigating ransomware, malware, and fileless attacks.
What are the key features of Dell Endpoint Security powered by CrowdStrike Falcon?Industries such as finance and healthcare implement Dell Endpoint Security powered by CrowdStrike Falcon to protect sensitive data and comply with stringent regulatory requirements. It provides these sectors with a reliable defense strategy catering to specific industry needs, ensuring compliance and security standards are upheld effectively.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.