


Cisco Secure Endpoint and Jamf Protect compete in the endpoint security category. Cisco Secure Endpoint appears to have the upper hand due to its comprehensive threat intelligence and broader array of security features.
Features: Cisco Secure Endpoint offers extensive threat detection capabilities, integration with other Cisco security products, and an array of security features. Jamf Protect provides seamless integration with Apple's ecosystem, strong focus on endpoint security, and specialized support for macOS environments.
Room for Improvement: Cisco Secure Endpoint could improve its performance impact on systems, simplify management complexity, and refine performance optimization. Jamf Protect could benefit from expanded features beyond macOS, enhanced reporting capabilities, and greater diversification in its offerings.
Ease of Deployment and Customer Service: Cisco Secure Endpoint users find deployment straightforward but note ongoing management complexity and praise customer support. Jamf Protect users report an easy deployment process with commendable customer service, especially for Apple products.
Pricing and ROI: Cisco Secure Endpoint users mention a higher setup cost but recognize strong ROI due to extensive capabilities. Jamf Protect users find pricing reasonable for specialized Apple support, though ROI feedback varies depending on deployment breadth.
They appreciate the rich telemetry data from the solution, as it provides in-depth threat identification.
Cortex XDR by Palo Alto Networks helps to reduce my total cost of ownership significantly.
In Cortex XDR by Palo Alto Networks, most of the remediation is automated and the accuracy is quite good.
A return on investment has been realized with Jamf Protect, having saved 30 to 40 percent in time due to faster detection-to-response cycles for macOS indications.
The technical support from Palo Alto deserves a mark of ten because they reach out within an hour whenever assistance is needed.
There is no back and forth, and they know what we are asking for and come up with the best resolution for a solution.
If any of these services are missed, it becomes a problem in terms of support tickets, follow-up, or special configuration that needs to be done in the system.
Cisco has good technical support, especially considering these are newer solutions compared to traditional routing and switching products.
The technical team is knowledgeable.
The customer support is very proactive, helpful, and knowledgeable.
You can onboard 10,000 endpoints in just hours, which demonstrates the excellent scalability of this product.
Cortex XDR by Palo Alto Networks can be expanded anytime by purchasing another license without any issues related to scalability.
I think scalability for Cortex XDR by Palo Alto Networks is good.
Cisco Secure Endpoint is definitely scalable.
I initially had a few customers with macOS but now have more, and it remains stable without encountering issues, allowing me to scale it up to many customers.
Jamf Protect is very scalable, enabling me to manage a large number of devices seamlessly and easily.
I believe Jamf Protect's scalability is effective because we have been using it in our organization since the start, and our numbers have recently risen by a large amount, so we are still using it.
Cortex remains fast and responsive, even with increasing data and alerts.
The thresholds we've seen on our firewall boxes at some instances reached 80% to 85%, but even at that level of utilization, we don't observe any latency or any issues reported with respect to accessing the application.
Cortex XDR is stable, offering high quality and reliable performance.
We have not encountered any problems.
In the alpha phase, we found out that it was taking twenty to thirty percent of CPU usage, and in some of the Macs, it was taking even more than seventy percent of CPU usage.
Jamf Protect is stable, reliable, and has been functioning well in production across the macOS fleet.
Jamf Protect is very stable, and I have not seen any downtime.
Improving reporting and dashboard customization, along with the addition of real-time and exportable reports, would help SOC teams greatly.
The inclusion of this feature would allow the application of DLP policies alongside antivirus policies via a single agent and console, making it more competitive as other OEMs often offer DLP solutions as part of their antivirus products.
If the per GB data could be provided at a certain level free of cost or at the same cost which the customer is taking for the entire bundle, that would be better.
The forensic capabilities need enhancement, especially for deep forensic data collection.
If they could be flagged the moment I visit them, that would be great because I would know exactly which website was causing the warnings.
Jamf Protect should have more built-in automated remediation actions, enhanced reporting and long-term analytics, and deeper SOAR and SIEM native integration with more customization in behavioral rule tuning for MSP environments.
Expanding out-of-the-box support for additional SIEMs.
The pricing on SentinelOne is far more reasonable and cheaper than Cortex XDR by Palo Alto Networks.
I would say it is definitely not a cheap product, considering how mature it is and how scalable all Palo Alto products are together.
Cortex XDR is perceived as expensive by some customers, yet offers dynamic pricing.
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdStrike, Microsoft Defender, or SentinelOne.
Jamf Protect includes a number of features that other EDR solutions charge additional fees for, such as compliance and device control.
The setup cost is relatively low due to the deployment effort for macOS fleet through standard setup via Jamf Pro policies and Jamf Protect onboarding, initial tuning, and rule configuration.
It incorporates AI for normal behavior detection, distinguishing unusual operations.
The product provides automation responses in case of a threat attack, severity assessments, centralized manageability, and comprehensive compliance features, resulting in reduced costs.
It includes machine learning to easily analyze data and detect complex threats across endpoints, networks, or clouds.
Cisco Secure Endpoint is very good in machine learning, which allows it to secure offline contents even if not connected to the internet.
The best features that stand out in Jamf Protect include macOS native threat detection using the kernel and user space behavioral analysis, real-time alerting, integration with Jamf Pro with automated response and quarantine actions, and pre-built rule sets that help with macOS threat models and MITRE mapping.
I can think of having a general sense that Jamf Protect makes me and my team feel more secure because I have not noticed or seen any security-related breaches with me or with any of my other colleagues.
Jamf Protect offers good telemetry and auditing capabilities.
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 3.5% |
| Jamf Protect | 1.0% |
| Cisco Secure Endpoint | 1.3% |
| Other | 94.2% |



| Company Size | Count |
|---|---|
| Small Business | 44 |
| Midsize Enterprise | 20 |
| Large Enterprise | 47 |
| Company Size | Count |
|---|---|
| Small Business | 21 |
| Midsize Enterprise | 14 |
| Large Enterprise | 21 |
| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 4 |
| Large Enterprise | 6 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader.
Cisco Secure Endpoint was formerly known as Cisco AMP for Endpoints.
Reviews from Real Users
Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.
Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
Jamf Protect provides comprehensive security for Apple devices, aiding in malware protection, threat prevention, CIS benchmarks, and USB blockages while supporting local accounts and password sync.
Designed for managing Apple devices, Jamf Protect offers robust security features, such as malware detection and prevention, unauthorized data transfer blocks, and enhanced security profiles. It allows seamless deployment and upgrades of applications, coupled with efficient endpoint management. The tool ensures zero performance impact while providing real-time notifications for password updates and comprehensive data protection across all Mac OS versions.
What are Jamf Protect's most notable features?Industries such as education, healthcare, and finance leverage Jamf Protect to maintain stringent security standards, streamline application deployment, and ensure devices meet compliance requirements. They benefit from real-time threat alerts, comprehensive data protection, and zero-touch integration, enhancing overall operational efficiency.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.