We performed a comparison between Cisco Secure Endpoint and McAfee Complete Data Protection based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, SentinelOne, CrowdStrike and others in Endpoint Protection Platform (EPP)."It is very easy to set up. I would rate my experience with the initial setup a ten out of ten, with ten being very easy to set up."
"NGAV and EDR features are outstanding."
"The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration."
"The stability is very good."
"The solution was relatively easy to deploy."
"Fortinet FortiEDR's scalability is quite good, and you can add licenses to the solution."
"Ability to get forensics details and also memory exfiltration."
"Exceptions are easy to create and the interface is easy to follow with a nice appearance."
"The most valuable feature of the solution is its technical support."
"The biggest lesson that I have learned from using this product is that there is a lot more malware slipping through my email filters than I expected."
"There are no issues or drops in the solution's performance...The solution's technical support was helpful."
"Real-time threat prevention using sandboxing, file trajectory, and retrospective security."
"The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
"Device Trajectory is one of the most valuable features. We're able to dig in and really understand how things came to be and where to focus our efforts."
"Cisco has definitely improved our organization a lot. In terms of business, our company feels safer. We actually switched from legacy signature-based solutions to threat intelligence-based and machine learning-based solutions, which is Cisco Secure. This has improved our security significantly, from 10% of signature-based technology security to 99.9% of the current one which we are running. We were happy."
"The simplicity of use is its most valuable feature. You can very clearly see things."
"With proper policies and configuration, it prevents sending corporate data to both cloud storage or to flash drives and data extraction."
"I have found the USB part most valuable."
"With this solution, the device control is more reliable and more stable."
"With respect to data loss prevention, I think it is helpful to the customer."
"Complete Data Protection lets us define roles in our data products. It helps us identify something suspicious on the client's device."
"In addition, it is easy to use, and you can define rules that protect the database beyond the built-in rules of the product. I found another purpose for the product besides the basic things that it does, protecting the database: privileged use, weak authentication, SQL injection and and database platform vulnerability."
"I am satisfied with the customer service/technical support."
"The console of the EDR is totally in the cloud."
"I haven't seen the use of AI in the solution."
"Integration with Azure and SaaS provisioning tools could improve Fortinet FortiEDR."
"There's room for improvement in the quick response time and technical support for integration issues, especially when dealing with multiple vendors."
"Once, we had an event that was locked and blocked, but information about it came to us two or three days later."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"The solution is not stable."
"We find the solution to be a bit expensive."
"The user interface is dull."
"It's pretty good as it is, but its cost could be improved."
"The room for improvement would be on event notifications. I have mine tuned fairly well. I do feel that if you subscribe to all the event notification types out-of-the-box, or don't really go through and take the time to filter out events, the notifications can become overwhelming with information. Sometimes, when you're overwhelmed with information, you just say, "I'm not going to look at anything because I'm receiving so much." I recommend the vendor come up with a white paper on the best practices for event notifications."
"The product does not provide options like tunnel creation or virtual appliances."
"I would like more seamless integration."
"In the next release, I would for it to have back up abilities. I would like the ability to go back to a point in time to when my PC was uninfected and to the moment of when the infection happened."
"Cisco is good in terms of threat intelligence plus machine learning-based solutions, but we feel Cisco is lagging behind in using artificial intelligence in its systems."
"The integration of the Cisco products for security could be better in the sense that not everything is integrated, and they aren't working together. In addition, not all products are multi-tenant, so you can't separate different customer environments from each other, which makes it a little bit hard for a managed service provider to deliver services to the customers."
"I would like to have an easier and less-hassle upgrade process in future releases of the software, and extra license renewal price discounts too."
"A better GUI platform would make it easier to present information to management; I would not need to fix the data before I present it."
"It is difficult to manage."
"The UI could be improved a bit."
"Some clients still receive spam and malware in their attachments, so the data protection isn't working correctly. We have configured it and enabled the features in the client's system, but some policies have failed to work once or twice."
"We encountered several problems with the solution's stability."
"The solution needs a next generation or AI firewall that doesn't rely on signatures to detect traits."
"There was an option for SQL setup in the older versions of this product and it has been removed, but we would like to see it made available as an add-on."
More McAfee Complete Data Protection Pricing and Cost Advice →
Cisco Secure Endpoint is ranked 10th in Endpoint Protection Platform (EPP) with 43 reviews while McAfee Complete Data Protection is ranked 2nd in Endpoint Encryption with 30 reviews. Cisco Secure Endpoint is rated 8.6, while McAfee Complete Data Protection is rated 8.0. The top reviewer of Cisco Secure Endpoint writes "Single dashboard management, quick infrastructure threat detection, and high level support". On the other hand, the top reviewer of McAfee Complete Data Protection writes "Bandwidth is reduced and online protection does a good job of identifying traits". Cisco Secure Endpoint is most compared with Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks, CrowdStrike Falcon, Check Point Harmony Endpoint and Cisco Umbrella, whereas McAfee Complete Data Protection is most compared with Microsoft BitLocker, Symantec Endpoint Encryption, Check Point Full Disk Encryption Software Blade, Trend Micro Endpoint Encryption and Sophos SafeGuard.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.