

Malwarebytes Teams and Cisco Secure Endpoint compete in the cybersecurity space, focusing on threat detection and protection. Cisco Secure Endpoint seems to have the upper hand due to its strong integration capabilities and cohesive security ecosystem, as well as extensive feature set.
Features: Malwarebytes Teams provides comprehensive threat detection and removal, ease of use, cloud-based management, and a unique rollback feature for ransomware events. Cisco Secure Endpoint offers strong detection and analytics integration, a detailed forensic tracking system, and a versatile threat eradication approach, enhanced by its seamless integration with other Cisco products, creating a cohesive security ecosystem.
Room for Improvement: Malwarebytes users report issues with false positives, desire less system resource usage during scans, and seek better integration capabilities and more detailed logging. Cisco Secure Endpoint users need improved AI capabilities, easier third-party integrations, simpler report generation, and reduced deployment complexity, along with a desire for stronger support and streamlined user interface.
Ease of Deployment and Customer Service: Malwarebytes Teams is easy to use and scalable across platforms with reliable customer support, although deployment can require additional guidance. Cisco Secure Endpoint offers versatile deployment options but can be complex, with users requesting better initial setup processes. Both generally receive positive feedback for technical support, although some Cisco users prefer more direct support and integration advice.
Pricing and ROI: Malwarebytes Teams is generally seen as reasonably priced, though some users find it costly for additional features. It offers a decent return on investment through improved productivity and security. Cisco Secure Endpoint is considered cost-effective due to its extensive feature set and network-wide visibility, with an Enterprise Agreement providing further pricing benefits, focusing more on threat prevention value rather than direct ROI.
| Product | Market Share (%) |
|---|---|
| Malwarebytes Teams | 2.2% |
| Cisco Secure Endpoint | 1.3% |
| Other | 96.5% |


| Company Size | Count |
|---|---|
| Small Business | 21 |
| Midsize Enterprise | 14 |
| Large Enterprise | 21 |
| Company Size | Count |
|---|---|
| Small Business | 22 |
| Midsize Enterprise | 8 |
| Large Enterprise | 6 |
Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader.
Cisco Secure Endpoint was formerly known as Cisco AMP for Endpoints.
Reviews from Real Users
Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.
Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
Malwarebytes Teams provides advanced threat protection and efficient detection and removal capabilities, featuring cloud-based management and robust endpoint security. It operates on Windows and Mac, emphasizing threat interception and the cloud-management interface.
Offering comprehensive protection, Malwarebytes Teams is recognized for its customizable and user-friendly interface. The anti-exploit feature effectively intercepts threats in Office applications, while frequent updates maintain security standards. Efficient scanning, threat response, and rollback features are highly valued, as is its ability to integrate seamlessly into diverse environments. Remote accessibility and cloud management enhance its robust endpoint protection.
What are the key features of Malwarebytes Teams?Malwarebytes Teams is widely implemented in cybersecurity across industries for endpoint security. Organizations deploy it for malware detection, intrusion protection, and compliance scanning, relying on its antivirus capabilities and ransomware rollback. It serves as a secondary tool alongside primary systems to enhance security on both Windows and Mac environments, particularly valued for monitoring usage behaviors without controlling endpoints.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.