Cisco Secure Endpoint Licenses
Stop threats with simple, unified defense
Cisco Secure Endpoint Licenses
Easy-to-buy packages fit for every business
Cisco Secure Endpoint has licenses fit for every business. New Advantage and Essentials tiers allow you to select the license that best fits your needs.
New packages fit for every business
Cisco Secure Endpoint blocks attacks and helps you respond to threats quickly and confidently. Now our new Premier, Advantage, and Essentials tiers allow you to select the right license that best fits your business's needs.
Powered by Cisco Talos, we block more threats than any other security provider. See a threat once and block it everywhere. Automate threat responses with one-click isolation of an infected host.
Take advantage of the ability to simplify security investigations with advanced endpoint detection and response to easily access your advanced malware analysis and threat intelligence portal.
With Talos Threat Hunting, elite security experts from Cisco proactively search for threats in your environment and provide high-fidelity alerts with remediation recommendations.
|Cisco Secure MDR for Endpoint
Let Cisco security experts accelerate your endpoint detection and response.
|Cisco SecureX platform
Benefit from a true XDR platform with built-in integrations and automated security playbooks with SecureX orchestration.
|Next-generation endpoint protection
Block threats using powerful machine-learning-based behavioral monitoring engines and protect against fileless malware and ransomware.
Monitor all endpoint activity nonstop and provide run-time detection and blocking of abnormal activities on the endpoint.
|Dynamic file analysis
Use our built-in, highly secure sandboxing environment to analyze suspect files in detail.
Stop threats from spreading with one-click isolation of an infected endpoint.
Will allow visibility and control over USB mass storage devices.
|Risk-based vulnerability framework
Scannerless visibility, context, and actionable risk scores.
|Orbital Advanced Search
Accelerate threat hunting and investigations with 200+ pre-defined vulnerability, IT operations, and threat-hunting queries.
|Malware Analytics Cloud
Use advanced sandboxing techniques to perform in-depth dynamic file analysis and deep malware threat intelligence.
|Threat Hunting by Talos
Get integrated, continuous hunting by elite Cisco threat hunters with detailed alerts and clear remediation instructions.
Platform support and compatibility
Secure Endpoint is compatible with the following operating systems:
- Windows 7* (ESU required)
- Windows 8*, 8.1*, 10, 11
- Windows Server 2008 R2* (ESU Required)
- Windows Server 2012, 2012 R2, 2016, 2019, 2022
- Red Hat Enterprise Linux 6, 7, 8
- CentOS 6, 7, 8
- Oracle Linux RHCK (Red Hat Compatible Kernel) 6, 7, 8
- Oracle UEK (Unbreakable Enterprise Kernels) 7, 8
- Alma Linux 8
- Rocky Linux 8
- Ubuntu Linux 18.04, 20.04
- Amazon Linux 2 - Kernel 4.14 and above
- SUSE Enterprise Linux 15 / openSUSE Leap 15
- Debian Linux 10, 11
- MacOS and iOS
- macOS 10.13, 10.14, 10.15, 11, 12
- iOS 14.4 and above
- Android 8.0 (Oreo) and above
* Limitations to legacy OS systems may apply