We just raised a $30M Series A: Read our story

Compare Hysolate vs. iWave Security

Cancel
You must select at least 2 products to compare!
Cisco Secure Endpoint Logo
21,103 views|14,046 comparisons
Hysolate Logo
257 views|94 comparisons
iWave Security Logo
6 views|2 comparisons
Top Review
Find out what your peers are saying about CrowdStrike, SentinelOne, Microsoft and others in Endpoint Protection for Business (EPP). Updated: October 2021.
543,936 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
"The price is very good.""The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost.""Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc.""In our case, it is a straightforward annual payment through our Enterprise Agreement.""Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection.""There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization.""The Enterprise Agreement is like an all-you-can-eat buffet of Cisco products. In that vein, it was very affordable.""We can know if something bad is potentially happening instantaneously and prevent it from happening. We can go to a device and isolate it before it infects other devices. In our environment, that's millions of dollars saved in a matter of seconds."

More Cisco Secure Endpoint Pricing and Cost Advice »

Information Not Available
Information Not Available
report
Use our free recommendation engine to learn which Endpoint Protection for Business (EPP) solutions are best for your needs.
543,936 professionals have used our research since 2012.
Questions from the Community
Top Answer: The most valuable feature is signature-based malware detection.
Top Answer: Licensing fees are on a yearly basis and I am happy with the pricing.
Top Answer: The GUI needs improvement, it's not good. There are false positives in emails. At times, the emails are blocked and… more »
Ask a question

Earn 20 points

Ask a question

Earn 20 points

Comparisons
Also Known As
Cisco AMP for Endpoints
Learn More
Hysolate
Video Not Available
Overview

Advanced Malware Protection (AMP) is subscription-based, managed through a web-based management console, and deployed on a variety of platforms that protects endpoints, network, email and web Traffic. AMP key features include the following: Global threat intelligence to proactively defend against known and emerging threats, Advanced sandboxing that performs automated static and dynamic analysis of files against more than 700 behavioral indicators, Point-in-time malware detection and blocking in real time and Continuous analysis and retrospective security regardless of the file's disposition and Continuous analysis and retrospective security.

Hysolate is a software platform that enables running multiple isolated operating systems on a single device with a unified and seamless user experience. Using Hysolate, organizations can apply the utmost security when accessing sensitive corporate systems and data without impacting user productivity.

With the rise of connected devices and the potential of exposure to large attack surfaces through various wireless technologies, there is now a great need to implement security by design in embedded connected products. iWave has introduced a Security Solution to protect the billions of connected IoT devices, enabling them with security functions such as encryption, storage, data transmission, and certificate management. Also, iWave offers a Security Suite development kit, which is developed for different variants of NXP i.MX 8 and i.MX 6 high-performance applications processors.

Offer
Learn more about Cisco Secure Endpoint
Learn more about Hysolate
Learn more about iWave Security
Sample Customers
Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Information Not Available
Information Not Available
Top Industries
REVIEWERS
Healthcare Company19%
Government13%
Manufacturing Company13%
University6%
VISITORS READING REVIEWS
Comms Service Provider24%
Computer Software Company23%
Government7%
Financial Services Firm5%
VISITORS READING REVIEWS
Comms Service Provider36%
Computer Software Company22%
Energy/Utilities Company8%
Retailer6%
No Data Available
Company Size
REVIEWERS
Small Business36%
Midsize Enterprise18%
Large Enterprise46%
VISITORS READING REVIEWS
Small Business27%
Midsize Enterprise21%
Large Enterprise52%
No Data Available
No Data Available
Find out what your peers are saying about CrowdStrike, SentinelOne, Microsoft and others in Endpoint Protection for Business (EPP). Updated: October 2021.
543,936 professionals have used our research since 2012.

Hysolate is ranked 51st in Endpoint Protection for Business (EPP) while iWave Security is ranked 18th in IoT Security. Hysolate is rated 0.0, while iWave Security is rated 0.0. On the other hand, Hysolate is most compared with SentinelOne and Bromium, whereas iWave Security is most compared with .

We monitor all Endpoint Protection for Business (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.