Compare Elastic Security vs. FireEye Endpoint Security

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Elastic Security vs. FireEye Endpoint Security and other solutions. Updated: May 2021.
509,641 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"For the initial first level of support, we provide it from our side. If there's escalation required, we use Cisco tech for the AMP. And again, they are perfect. I mean, one of the best, compared to any other vendors.""The most valuable features of this solution are the IPS and the integration with ISE.""The simplicity of use is its most valuable feature. You can very clearly see things.""The stability of the solution is perfect. I believe it's the most stable solution on the market right now.""I am really satisfied with the technical support.""It is a very stable program.""The solution's integration capabilities are excellent. It's one of the best features.""It doesn't impact the devices. It is an agent-based solution, and we see no performance knock on cell phones. That was a big thing for us, especially in the mobile world. We don't see battery degradation like you do with other solutions which really drain the battery, as they're constantly doing things. That can shorten the useful life of a device."

More Cisco AMP for Endpoints Pros »

"The intelligence of the system has been very impressive. It's not quite AI, but the technical bit where it correlates information, based on the seen attacks within an organization is good.""The stability of the solution is good."

More Elastic Security Pros »

"The most valuable feature of this solution is its simplicity.""The most valuable network security feature is the network sandbox solution. This sandbox feature works on traffic flow.""The investigation and forensic analysis have been most helpful.""The most valuable feature is the integration between environments.""The exploit guard and malware protection features are very useful. The logon tracker feature is also very useful. They have also given new modules such as logout backup, process backup. We ordered these modules from the FireEye market place, and we have installed these modules. We are currently exploring these features.""FireEye Endpoint Security's scalability is awesome. I think it is one of the best on that front.""It is easy to use, flexible, and stable. Because it is a cloud-based solution and it integrates all endpoints of the cloud, we can do an IOC-based search. It can search the entire enterprise and tell us the endpoints that are possibly compromised.""It has a feature called Isolation. If a device is compromised, we can connect it to our SOC, and no one would be able to access it. This way we can limit the damage to the network while we are investigating."

More FireEye Endpoint Security Pros »

Cons
"The solution needs more in-depth analytics.""In the next version of this solution, I would like to see the addition of local authentication.""The initial setup is a bit complex because you need to execute existing antiviruses or security software that you have on your device.""In the next release, I would for it to have back up abilities. I would like the ability to go back to a point in time to when my PC was uninfected and to the moment of when the infection happened.""The reporting and analytics areas of the solution need to be improved.""I would like more seamless integration.""The technical support is very slow.""I would recommend that the solution offer more availability in terms of the product portfolio and integration with third-party products."

More Cisco AMP for Endpoints Cons »

"The solution could also use better dashboards. They need to be more graphical, more matrix-like.""The solution could offer better reporting features."

More Elastic Security Cons »

"The integration and display of the dashboards have to be done better.""They could also increase or improve the scalability because to my knowledge the biggest bandwidth can only support up to 10 gigs of input.""If you have another endpoint product running on the same machine, you have to fine tune functions from FireEye to avoid performance and user experience issues.""I would like to see simple processing and reporting online.""The Linux support is very poor. I use base detection. Currently, they are providing malware protection and logon track features in Windows and Mac. These features aren't available in Linux. It will be helpful to extend these capabilities to Linux. We would also like assets grouping and device lock protection features, which are included in their roadmap.""The reports need more development. They need more details on the reports and more details taking the executive view into consideration.""Malware detection can be better. It doesn't have support and detection for the recent malware, but it has a compensatory control where it can do the behavior-based assessment and alert you when there is something malicious or unexpected. For example, when a certain user is executing the privilege command, which is not normal. These dynamic detections are good, and they compensate for malware detection.""It has very good integrations. However, its integration with Palo Alto was not good, and they seem to be working on it at the backend. It is not very resource-hungry, but it can be even better in terms of resource utilization. It could be improved in terms of efficiency, memory sizing, and disk consumption by agents."

More FireEye Endpoint Security Cons »

Pricing and Cost Advice
"The costs of 50 licenses of AMP for three years is around $9,360.""The price is very good.""The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost.""Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc.""In our case, it is a straightforward annual payment through our Enterprise Agreement.""Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection.""There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization.""The Enterprise Agreement is like an all-you-can-eat buffet of Cisco products. In that vein, it was very affordable."

More Cisco AMP for Endpoints Pricing and Cost Advice »

Information Not Available
"The current pricing is much better than before because they now offer product-related promotions along with some changes in product licensing. The new pricing model is better than before.""It is a yearly subscription-based product, which includes the license and hardware. There is also a subscription for technical support up to five years."

More FireEye Endpoint Security Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
509,641 professionals have used our research since 2012.
Questions from the Community
Top Answer: The most valuable feature is signature-based malware detection.
Top Answer: Licensing fees are on a yearly basis and I am happy with the pricing.
Top Answer: The GUI needs improvement, it's not good. There are false positives in emails. At times, the emails are blocked and… more »
Ask a question

Earn 20 points

Top Answer: It is easy to use, flexible, and stable. Because it is a cloud-based solution and it integrates all endpoints of the… more »
Top Answer: If you compare your solution without the antivirus solution, and the price of the agent, it is a little bit expensive… more »
Top Answer: Malware detection can be better. It doesn't have support and detection for the recent malware, but it has a compensatory… more »
Popular Comparisons
Also Known As
Cisco Secure Endpoint
Learn More
Overview

Advanced Malware Protection (AMP) is subscription-based, managed through a web-based management console, and deployed on a variety of platforms that protects endpoints, network, email and web Traffic. AMP key features include the following: Global threat intelligence to proactively defend against known and emerging threats, Advanced sandboxing that performs automated static and dynamic analysis of files against more than 700 behavioral indicators, Point-in-time malware detection and blocking in real time and Continuous analysis and retrospective security regardless of the file's disposition and Continuous analysis and retrospective security.

Endgame's converged endpoint security platform is transforming security programs - their people, processes and technology - with the most powerful endpoint protection and simplest user experience, ensuring analysts of any skill level can stop targeted attacks before information theft. Endgame unifies prevention, detection, and threat hunting to stop known and unknown attacker behaviors at scale with a single agent.

FireEye Endpoint Security is an integrated endpoint solution that detects, prevents and responds effectively to known malware and threats traditional anti-virus endpoint security products miss. It expands endpoint visibility and provides contextual frontline intelligence to help analysts automate protection, quickly determine the exact scope and level of any attack activity and adapt defenses as needed.

Offer
Learn more about Cisco AMP for Endpoints
Learn more about Elastic Security
Learn more about FireEye Endpoint Security
Sample Customers
Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Texas A&M, U.S. Air Force, NuScale Power, Martin's Point Health Care
Tech Resources Limited, Globe Telecom, Rizal Commercial Banking Corporation
Top Industries
REVIEWERS
Healthcare Company20%
Government13%
University7%
Comms Service Provider7%
VISITORS READING REVIEWS
Comms Service Provider27%
Computer Software Company22%
Government6%
Financial Services Firm5%
VISITORS READING REVIEWS
Computer Software Company26%
Comms Service Provider22%
Government14%
Manufacturing Company4%
VISITORS READING REVIEWS
Computer Software Company25%
Comms Service Provider20%
Government10%
Financial Services Firm7%
Company Size
REVIEWERS
Small Business35%
Midsize Enterprise15%
Large Enterprise50%
VISITORS READING REVIEWS
Small Business27%
Midsize Enterprise20%
Large Enterprise53%
No Data Available
REVIEWERS
Small Business25%
Large Enterprise75%
Find out what your peers are saying about Elastic Security vs. FireEye Endpoint Security and other solutions. Updated: May 2021.
509,641 professionals have used our research since 2012.

Elastic Security is ranked 18th in Endpoint Detection and Response (EDR) with 2 reviews while FireEye Endpoint Security is ranked 12th in Endpoint Detection and Response (EDR) with 6 reviews. Elastic Security is rated 8.0, while FireEye Endpoint Security is rated 8.2. The top reviewer of Elastic Security writes "The system intelligence gives you good detail for creating intelligence reports". On the other hand, the top reviewer of FireEye Endpoint Security writes "Enables us to do IOC-based search across the enterprise and isolate compromised devices". Elastic Security is most compared with CrowdStrike Falcon, Cortex XDR by Palo Alto Networks, Carbon Black CB Defense, McAfee Endpoint Security and Sophos Intercept X, whereas FireEye Endpoint Security is most compared with CrowdStrike Falcon, Darktrace, Microsoft Defender for Endpoint, Carbon Black CB Defense and Fidelis Elevate. See our Elastic Security vs. FireEye Endpoint Security report.

See our list of best Endpoint Detection and Response (EDR) vendors.

We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.