Try our new research platform with insights from 80,000+ expert users

Cisco Secure Endpoint vs Jamf Protect comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Endpoint
Ranking in Endpoint Protection Platform (EPP)
12th
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
49
Ranking in other categories
Endpoint Detection and Response (EDR) (13th), Cisco Security Portfolio (5th)
Jamf Protect
Ranking in Endpoint Protection Platform (EPP)
30th
Average Rating
9.4
Reviews Sentiment
7.9
Number of Reviews
10
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2025, in the Endpoint Protection Platform (EPP) category, the mindshare of Cisco Secure Endpoint is 1.5%, down from 1.8% compared to the previous year. The mindshare of Jamf Protect is 0.8%, up from 0.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Mark Broughton - PeerSpot reviewer
Tighter integration with Umbrella and Firepower gave us eye-opening information
We were using a third-party help desk. One of the ways that they were fixing problems was to delete the client and then add the client back if there was an issue where the client had stopped communicating. Any improvement in the client communicating back to the server would be good, particularly for machines that are offline for a couple of weeks. A lot of our guys were working on a rotation where the machine might be offline for that long. They were also terrible about rebooting their machines, so those network connections didn't necessarily get refreshed. So, anything that could improve that communication would be good. Also, an easier way to do deduplication of machines, or be alerted to the fact that there's more than one instance of a machine, would be useful. If you could say, "Okay, we've got these two machines. This one says it's not reporting and this one says it's been reporting. Obviously, somebody did a reinstall," it would help. That way you could get a more accurate device count, so you're not having an inflated number. Not that Cisco was going to come down on you and say, "Oh, you're using too many licenses," right away. But to have a much more accurate license usage count by being able to better dedupe the records would be good. I also sent over a couple of other ideas to our technical rep. A lot of that had to do with the reporting options. It would be really nice to be able to do a lot more in the reporting. You can't really drill down into the reports that are there. The reporting and the need for the documentation to be updated and current would be my two biggest areas of complaint. Also, there was one section when I was playing with the automation where it was asking for the endpoint type rather than the machine name. If I could have just put in the machine name, that would have been great. So there are some opportunities, when it comes to searching, to have more options. If I wanted to search, for example, by a Mac address because, for some reason, I thought there was a duplication and I didn't have the machine name, how could I pull it up with the Mac address? When you're getting to that level, you're really starting to get into the ticky tacky. I would definitely put the reporting and documentation way ahead of that.
Dinesh Venkates - PeerSpot reviewer
Effective device management, enhance threat detection and smooth integration
I would rate my experience with the initial setup a ten out of ten, with ten being easy. Initially, the deployment took 15 days for the pilot phase, and then another 15 days for production. However, the actual deployment itself only took 15 days, as it was preconfigured. So it took around one month in total. Stakeholder approval caused a delay, but the actual deployment for the facility department was only 15 days. No maintenance is required because everything is associated. It's a cloud solution, so we only need to modify applications for the services. So, 99.9% of the time, it's working fine.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The VPN is most valuable. It's the best thing in the market today. We can use two-factor authentication with another platform, and we can authenticate with two-factor."
"The most valuable feature of the solution is its technical support."
"It used to take us a month to find out that something is infected, we now know that same day, as soon it is infected."
"I am really satisfied with the technical support."
"It provides real-time visibility and control over endpoints, allowing its users to promptly respond to any security incidents and remediate any vulnerabilities."
"With Cisco Secure Endpoint, we now have visibility over what is happening on the endpoint side."
"The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great."
"The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices."
"We mainly use Jamf Protect to protect staff computers from malware and antivirus."
"I rate the technical support a ten out of ten."
"Jamf Protect's most effective features for threat detection include managing devices and applications, deploying and upgrading the OS, and its overall security features."
"The tool's tech support is helpful and efficient. It also has an active community."
"The product's initial setup phase is straightforward and as simple as CrowdStrike."
"The behavioral detection is valuable."
"Jamf Protect searches incoming and outgoing traffic for malware to monitor the network for security."
"Jamf Protect is a security product that helps us with CIS benchmarks and threat prevention."
 

Cons

"In the next version of this solution, I would like to see the addition of local authentication."
"It does not include encryption and decryption of local file shares."
"In terms of the user experience, if the UX design could be much simpler [that would improve things]... if they could make it more intuitive for someone who is not an engineer so that they still can read what's going on in their webpage and understand, that would be something."
"Its price is okay for us, but it can always be better. There's always room for improvement when it comes to pricing."
"The user interface is dull."
"It's pretty good as it is, but its cost could be improved."
"Logging could be better in terms of sending more logs to Cisco Firepower or Cisco ASA. That's an area where it could be made better."
"I would like to see integration with Cisco Analytics."
"Jamf Protect needs to improve its pricing."
"The tool's drawback is that it fails to offer support for Linux."
"The scope of improvement will fall under the support hierarchy that the tool offers to the latest version that Apple derives for any of the latest operating systems to launch."
"I'd really like to see some data loss prevention (DLP) capabilities. More visibility into user activity on laptops would be helpful."
"The dependency on Jamf Pro or SIEM or SOAR for some automations and integrations could be reduced."
"The product's price is an area of concern where improvements are required."
"Beginners need initial training."
"The solution's integration with other tools is slow."
 

Pricing and Cost Advice

"The pricing and licensing fees are okay."
"Cisco's pricing is reasonable. We also do not need to opt for niche players, which would have charged us significantly more than Cisco for ecosystem solutions. We are highly satisfied with the pricing structure of Cisco's solutions they are reasonable."
"The Enterprise Agreement is like an all-you-can-eat buffet of Cisco products. In that vein, it was very affordable."
"The price is very good."
"...the licensing needs to be improved. All the product features we need are there. It's just a matter of the complexity and the different offerings and trying to figure things out."
"Licensing fees are on a yearly basis and I am happy with the pricing."
"The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost."
"Cisco Secure Endpoint is not too expensive and it's not cheap. It's quite fair."
"The licensing costs are yearly and expensive."
"I rate the product price as a five on a scale of one to ten, where one is a low price, and ten is a high price."
"Jamf Protect is an expensive solution."
"Jamf Protect costs double the price that we were paying before."
"The product is not an averagely priced tool."
"It's significantly cheaper than other options like ApexOne."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
850,671 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
18%
Government
9%
Financial Services Firm
8%
Manufacturing Company
8%
Computer Software Company
16%
University
13%
Financial Services Firm
9%
Healthcare Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdStrike, Microsoft Defender, or SentinelOne.
What needs improvement with Cisco Secure Endpoint?
Cisco Secure Endpoint lacks features like DLP which other vendors offer. XDR is new, so integration capabilities with third-party tools need improvement. The forensic capabilities need enhancement,...
What do you like most about Jamf Protect?
Jamf Protect searches incoming and outgoing traffic for malware to monitor the network for security.
What is your experience regarding pricing and costs for Jamf Protect?
The product is not an averagely priced tool. If the organization is fully on Apple's fleet, they can consider Jamf Protect, but it is quite costly. Jamf Protect is costly compared with any other so...
What needs improvement with Jamf Protect?
The dependency on Jamf Pro or SIEM or SOAR for some automations and integrations could be reduced. In-built automation and remediation of behavior-based threats would be beneficial enhancements.
 

Also Known As

Cisco AMP for Endpoints
No data available
 

Overview

 

Sample Customers

Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Information Not Available
Find out what your peers are saying about Cisco Secure Endpoint vs. Jamf Protect and other solutions. Updated: April 2025.
850,671 professionals have used our research since 2012.
OSZAR »