


Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP).
| Product | Mindshare (%) |
|---|---|
| Cisco Secure Endpoint | 1.3% |
| Microsoft Defender for Endpoint | 7.0% |
| CrowdStrike Falcon | 6.2% |
| Other | 85.5% |
| Product | Mindshare (%) |
|---|---|
| Secude SecureFolder | 1.9% |
| Microsoft BitLocker | 16.5% |
| Symantec Endpoint Encryption | 8.1% |
| Other | 73.5% |


| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 21 |
| Large Enterprise | 48 |
| Company Size | Count |
|---|---|
| Small Business | 21 |
| Midsize Enterprise | 14 |
| Large Enterprise | 21 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
Cisco Secure Endpoint offers robust endpoint security with real-time threat prevention and cloud-based management. It is designed for seamless integration with Cisco products, delivering comprehensive protection and ease of use.
Cisco Secure Endpoint provides real-time threat detection, analytics, and rapid response capabilities. Its ease of use, integrated features like sandboxing and Device and File Trajectory, and its incorporation with Talos make it effective for threat hunting and endpoint protection. With strong machine learning and seamless integration with other tools, it addresses threat prevention and network visibility. However, there is room for improvement in AI features, SIEM API integration, user interface simplification, and cost reduction. Enhanced dashboards, reporting, and support are also areas for potential enhancement.
What are the primary features of Cisco Secure Endpoint?In industries such as finance, healthcare, and manufacturing, Cisco Secure Endpoint is vital for maintaining endpoint security and malware protection. Organizations use it within managed security services, integrating with tools like Umbrella for DNS security. It provides visibility into malware activities and supports threat hunting for devices beyond corporate networks. Deployed on workstations, servers, and laptops, it efficiently logs and blocks malicious actions, ensuring a secure environment.
Secude SecureFolder offers a robust encryption solution for protecting sensitive files and data across enterprise networks, ensuring comprehensive security for digital business environments.
Secude SecureFolder is designed for organizations that prioritize data security. Its advanced encryption capabilities provide a secure environment for storing and sharing sensitive files within a networked infrastructure. This encryption solution is tailored to meet the high security standards demanded by modern enterprises, providing end-users with the assurance that their data is safe from unauthorized access. Ease of integration with existing systems makes Secude SecureFolder a preferred choice for IT professionals seeking to enhance data protection measures.
What are the key features of Secude SecureFolder?Secude SecureFolder is implemented across industries such as finance, healthcare, and legal, where data protection is crucial. Financial services use it to secure sensitive customer information, healthcare organizations rely on it for safeguarding patient records, and legal firms protect client confidentiality with its encryption features. This flexibility makes it a versatile choice for various sectors requiring stringent data protection.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.