
I find Cisco Secure Endpoints incredibly important for securing user devices and data across the organization from threats. It serves as an advanced threat intelligence system that can detect, analyze, and prevent very sophisticated threats like malware. I appreciate how it intelligently monitors incoming traffic and behaviors, helping us manage cloud-based systems with many users and permissions. During peak hours, it provides valuable tools to analyze, hunt, and stop unauthorized activities, which is incredibly helpful. Its integration capabilities with Microsoft, Linux, and cloud-based systems make it really versatile for our needs. Review collected by and hosted on G2.com.
The initial setup process can be quite tricky. We have to gather requirements, create documents, discuss onboards across the board, analyze existing systems, decide the number of endpoints, set policies for remote resources and connections, and analyze peak time traffic to configure policies. Review collected by and hosted on G2.com.
Our network of Icons are G2 members who are recognized for their outstanding contributions and commitment to helping others through their expertise.
At G2, we prefer fresh reviews and we like to follow up with reviewers. They may not have updated their review text, but have updated their review.
The reviewer uploaded a screenshot or submitted the review in-app verifying them as current user.
Validated through Google using a business email account
This reviewer was offered a nominal gift card as thank you for completing this review.
Invitation from G2. This reviewer was offered a nominal gift card as thank you for completing this review.




