Korede OlatunjiApplication Manager at Huntington Bancshares Incorporated
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The costs of 50 licenses of AMP for three years is around $9,360."
"The price is very good."
"The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost."
"Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc."
"In our case, it is a straightforward annual payment through our Enterprise Agreement."
"Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection."
"There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization."
"The Enterprise Agreement is like an all-you-can-eat buffet of Cisco products. In that vein, it was very affordable."
Advanced Malware Protection (AMP) is subscription-based, managed through a web-based management console, and deployed on a variety of platforms that protects endpoints, network, email and web Traffic. AMP key features include the following: Global threat intelligence to proactively defend against known and emerging threats, Advanced sandboxing that performs automated static and dynamic analysis of files against more than 700 behavioral indicators, Point-in-time malware detection and blocking in real time and Continuous analysis and retrospective security regardless of the file's disposition and Continuous analysis and retrospective security.
Endpoints are still your organization’s weakest security link, being the target of choice for seasoned cybercriminals to disrupt your business operations, steal your valuable data and damage your brand reputation.
ClearSkies™ NG EDR Agent v6.1 is a comprehensive Endpoint Detection & Response solution, fully integrated with ClearSkies™ SaaS NG SIEM. It complements the detection and prevention of never-before-seen targeted attacks and insider threats with the use of Behavioral Monitoring and Analysis (BMA) and by leveraging Advanced Security Analytics complemented by Threat Intelligence and signature-based detection.
ESET Enterprise Inspector is a sophisticated EDR tool for identification of anomalous behavior and breaches, risk assessment, incident response, investigations and remediation. It monitors and evaluates all the activities happening in the network (for example, user, file, process, registry, memory and network events) in real time and allows you to take immediate action if needed.
ClearSkies NG Endpoint Detection & Response is ranked 34th in Endpoint Detection and Response (EDR) while ESET Enterprise Inspector is ranked 24th in Endpoint Detection and Response (EDR). ClearSkies NG Endpoint Detection & Response is rated 0.0, while ESET Enterprise Inspector is rated 0.0. On the other hand, ClearSkies NG Endpoint Detection & Response is most compared with , whereas ESET Enterprise Inspector is most compared with CrowdStrike Falcon, Microsoft Defender for Endpoint , Kaspersky Endpoint Detection and Response, Cortex XDR by Palo Alto Networks and Trend Micro XDR.
See our list of best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.