Cisco Secure Endpoint vs G Data Endpoint Protection

Compare Cisco Secure Endpoint vs G Data Endpoint Protection based on verified reviews from real users in the Endpoint Protection Platforms market. Cisco Secure Endpoint has a rating of 4.37 stars with 183 reviews while G Data Endpoint Protection has a rating of 4.43 stars with 5 reviews. See side-by-side comparisons of product capabilities, customer experience, pros and cons, and reviewer demographics to find the best fit for your organization.
Overall Peer Rating
4.37
(183 reviews)
4.43
(5 reviews)
Ratings Distribution
 
 
 
 
 
 
 
 
 
 
Willingness to recommend
85% Yes
Would Recommend
80% Yes
Would Recommend

Product Capabilities

Overall Capability Score
Overall Capability Score
 
 
 
 
 
4.55
Overall Capability Score
 
 
 
 
 
4
Ease of Use
Ease of Use
 
 
 
 
 
4.31
Ease of Use
 
Cloud Management
Cloud Management
 
 
 
 
 
4.49
Cloud Management
 
Prevention
Prevention
 
 
 
 
 
4.33
Prevention
 
EDR Functionality
EDR Functionality
 
 
 
 
 
4.28
EDR Functionality
 
EPP Suite
EPP Suite
 
 
 
 
 
4.34
EPP Suite
 
Managed Services
Managed Services
 
 
 
 
 
4.48
Managed Services
 
Geographic Support
Geographic Support
 
 
 
 
 
4.45
Geographic Support
 
OS Support
OS Support
 
 
 
 
 
4.62
OS Support
 

Customer Experience

Evaluation & Contracting
Evaluation & Contracting
 
 
 
 
 
4.43
Evaluation & Contracting
 
 
 
 
 
4.2
Pricing Flexibility
Pricing Flexibility
 
 
 
 
 
4.25
Pricing Flexibility
 
 
 
 
 
4
Ability to Understand Needs
Ability to Understand Needs
 
 
 
 
 
4.49
Ability to Understand Needs
 
 
 
 
 
4.6
Integration & Deployment
Integration & Deployment
 
 
 
 
 
4.48
Integration & Deployment
 
 
 
 
 
4.2
Ease of Deployment
Ease of Deployment
 
 
 
 
 
4.41
Ease of Deployment
 
 
 
 
 
4.2
Quality of End-User Training
Quality of End-User Training
 
 
 
 
 
4.19
Quality of End-User Training
 
 
 
 
 
4.33
Ease of Integration using Standard APIs and Tools
Ease of Integration using Standard APIs and Tools
 
 
 
 
 
4.34
Ease of Integration using Standard APIs and Tools
 
 
 
 
 
3.67
Availability of 3rd-Party Resources
Availability of 3rd-Party Resources
 
 
 
 
 
4.31
Availability of 3rd-Party Resources
 
 
 
 
 
4.5
Service & Support
Service & Support
 
 
 
 
 
4.51
Service & Support
 
 
 
 
 
4.4
Timeliness of Vendor Response
Timeliness of Vendor Response
 
 
 
 
 
4.46
Timeliness of Vendor Response
 
 
 
 
 
4.25
Quality of Technical Support
Quality of Technical Support
 
 
 
 
 
4.49
Quality of Technical Support
 
 
 
 
 
4.4
Quality of Peer User Community
Quality of Peer User Community
 
 
 
 
 
4.22
Quality of Peer User Community
 
 
 
 
 
4.25

Product Review Excerpts

Favorable Review Excerpts
Critical Review Excerpts

Reviewer Demographics

Reviewer Demographics by Company Size
Reviewer Demographics by Industry

Reviewer Considerations

Other Vendors Considered by Reviewers

"Willingness to Recommend" is calculated based on the responses to the question "Would you recommend this product to others?" The options include "yes," "yes, with reservations," "I do not know" and "no." The percentage is calculated as number of "yes" responses divided by total responses for the question.

"Favorable" and "Critical" user reviews are selected using the review helpfulness score. The helpfulness score predicts the relative value a user receives from a given review based on a number of factors. Factors may include the content in the review, feedback provided by other readers, the age of the review, and other factors that indicate review quality. The favorable review displayed is selected from the most helpful 4 or 5 star review. The critical user review displayed is selected from the most helpful 1,2 or 3 star review.