Korede OlatunjiApplication Manager at Huntington Bancshares Incorporated
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The costs of 50 licenses of AMP for three years is around $9,360."
"The price is very good."
"The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost."
"Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc."
"In our case, it is a straightforward annual payment through our Enterprise Agreement."
"Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection."
"There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization."
"The Enterprise Agreement is like an all-you-can-eat buffet of Cisco products. In that vein, it was very affordable."
Advanced Malware Protection (AMP) is subscription-based, managed through a web-based management console, and deployed on a variety of platforms that protects endpoints, network, email and web Traffic. AMP key features include the following: Global threat intelligence to proactively defend against known and emerging threats, Advanced sandboxing that performs automated static and dynamic analysis of files against more than 700 behavioral indicators, Point-in-time malware detection and blocking in real time and Continuous analysis and retrospective security regardless of the file's disposition and Continuous analysis and retrospective security.
AtomicEye CP (Continuous Protection) is engineered for forward-looking security organizations that recognize the inevitability of persistent threats and anticipate breaches. Cybersecurity success equates to instantly identifying when a breach occurs, minimizing damage done by a breach, and eliminating impact on the business. AtomicEye CP provides security teams with a software solution to automatically detect and remediate exploits—without relying on signatures of any kind. AtomicEye CP’s patented machine learning recognizes and prevents attacks as they are happening, even in volatile memory, by identifying anomalies specific to the environment that point to malware.
ESET Enterprise Inspector is a sophisticated EDR tool for identification of anomalous behavior and breaches, risk assessment, incident response, investigations and remediation. It monitors and evaluates all the activities happening in the network (for example, user, file, process, registry, memory and network events) in real time and allows you to take immediate action if needed.
AtomicEye CP is ranked 35th in Endpoint Detection and Response (EDR) while ESET Enterprise Inspector is ranked 24th in Endpoint Detection and Response (EDR). AtomicEye CP is rated 0.0, while ESET Enterprise Inspector is rated 0.0. On the other hand, AtomicEye CP is most compared with , whereas ESET Enterprise Inspector is most compared with CrowdStrike Falcon, Microsoft Defender for Endpoint, Kaspersky Endpoint Detection and Response, Cortex XDR by Palo Alto Networks and Trend Micro XDR.
See our list of best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.