We performed a comparison between Cisco Secure Endpoint and WithSecure Elements Endpoint Detection and Response based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Detection and Response (EDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The features that I have found most valuable are the ability to customize it and to reduce its size. It lets you run in a very small window in terms of memory and resources on legacy cash registers."
"Fortinet FortiEDR made our clients feel secure and more at ease, knowing that they had an EDR solution that would close the gap in their security posture."
"It is stable and scalable."
"Forensics is a valuable feature of Fortinet FortiEDR."
"The setup is pretty simple."
"Exceptions are easy to create and the interface is easy to follow with a nice appearance."
"It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward."
"Having all monitoring, response, tracking, and mitigation tools in one dashboard provides our analysts and SOC team with a comprehensive view at a glance."
"It is extensive in terms of providing visibility and insights into threats. It allows for research into a threat, and you can chart your progress on how you're resolving it."
"The best feature that we found most valuable, is actually the security product for the endpoint, formerly known as AMP. It has behavioral analytics, so you can be more proactive toward zero-day threats. I found that quite good."
"The product itself is pretty reliable. The security features that it has make it reliable."
"The visibility and insight this solution gives you into threats is pretty granular. It has constant monitoring. You can get onto the device trajectory to look at a threat, but you can also see what happened prior to the threat. You can see what happened after the threat. You can see what other applications were incorporated into the execution of the threat. For example, you have the event, but you see that the event was launched by Google Chrome, which was launched by something else. Then, after the event, something else was launched by whatever the threat was. Therefore, it gives you great detail, a timeline, and continuity of events leading up to whatever the incident is, and then, after. This helps you understand and nail down what the threat is and how to fix it."
"The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
"Its most valuable features are its scalability and advanced threat protection for customers."
"The product provides sandboxing options like file reputation and file analysis."
"Among the most valuable features are the exclusions. And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source."
"I use the solution to protect our infrastructure. The tool has special frames for banking. There is an additional secure filter for banking-related pages. It protects me from viruses, malware, and attacks."
"WithSecure includes an encrypted drive that stores a key for accessing the encrypted data."
"It offers good scalability."
"It is a scalable solution."
"The product is stable."
"The only issue that we have today is with false positives. We have too many false positives with the solution."
More WithSecure Elements Endpoint Detection and Response Pros →
"It takes about two business days for initial support, which is too slow in urgent situations."
"We'd like to see more one-to-one product presentations for the distribution channels."
"I haven't seen the use of AI in the solution."
"The EDR console should have more extensive reporting. You shouldn't need to purchase FortiAnalyzer. It should be included in the EDR part. The security adviser cloud platform could be improved with more options for exclusive or intensive rules for devices."
"We find the solution to be a bit expensive."
"Making the portal mobile friendly would be helpful when I am out of office."
"Cannot be used on mobile devices with a secure connection."
"Detections could be improved."
"It's pretty good as it is, but its cost could be improved."
"It does not include encryption and decryption of local file shares."
"In Orbital, there are tons of prebuilt queries, but there is not a lot of information in lay terms. There isn't enough information to help us with what we're looking for and why we are looking for it with this query. There are probably a dozen queries in there that really focus on what I need to focus on, but they are not always easy to find the first time through."
"The technical support is very slow."
"The user interface is dull."
"It is not very stable because we have new versions four times a year, which fixes bugs. We had some problems with some deployments."
"The product does not provide options like tunnel creation or virtual appliances."
"Maybe there is room for improvement in some of the automated remediation. We have other tools in place that AMP feeds into that allow for that to happen, so I look at it as one seamless solution. But if you're buying AMP all by itself, I don't know if it can remove malicious software after the fact or if it requires the other tools that we use to do some of that."
"Its automated functionality could be better."
"The website rules are too complicated."
"The initial setup is very straightforward."
"WithSecure Elements Endpoint Detection and Response is scalable. My company has 800-1000 customers."
"The monthly reporting feature of WithSecure can be improved."
"The tool’s mobile version needs to be improved."
More WithSecure Elements Endpoint Detection and Response Cons →
More WithSecure Elements Endpoint Detection and Response Pricing and Cost Advice →
Cisco Secure Endpoint is ranked 9th in Endpoint Detection and Response (EDR) with 43 reviews while WithSecure Elements Endpoint Detection and Response is ranked 31st in Endpoint Detection and Response (EDR) with 6 reviews. Cisco Secure Endpoint is rated 8.6, while WithSecure Elements Endpoint Detection and Response is rated 8.0. The top reviewer of Cisco Secure Endpoint writes "Single dashboard management, quick infrastructure threat detection, and high level support". On the other hand, the top reviewer of WithSecure Elements Endpoint Detection and Response writes "Includes an encrypted drive that stores a key for accessing the encrypted data, but the monthly reporting feature can be improved". Cisco Secure Endpoint is most compared with Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks, CrowdStrike Falcon, Check Point Harmony Endpoint and Cisco Umbrella, whereas WithSecure Elements Endpoint Detection and Response is most compared with CrowdStrike Falcon, Trend Vision One, Elastic Security, Microsoft Defender for Endpoint and Cynet. See our Cisco Secure Endpoint vs. WithSecure Elements Endpoint Detection and Response report.
See our list of best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.