{"id":4553,"date":"2019-03-21T00:00:00","date_gmt":"2019-03-21T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2019\/03\/21\/fireeye-vs-cisco-top-edr-solutions-compared\/"},"modified":"2022-05-30T01:36:49","modified_gmt":"2022-05-30T01:36:49","slug":"fireeye-vs-cisco","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/","title":{"rendered":"FireEye vs Cisco: Top EDR Solutions Compared"},"content":{"rendered":"<div id=\"article-content\">\n<p>FireEye&#8217;s and Cisco&#8217;s <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/endpoint-security-its-way-more-complicated-than-you-think\/\">endpoint security<\/a> solutions both made <em>eSecurity Planet<\/em>&#8216;s list of <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">top endpoint detection and response (EDR) solutions<\/a>, and each product offers significant benefits to enterprise users. What follows is a look at each solution&#8217;s key features and recent enhancements, along with an analysis of their strengths and weaknesses.<\/p>\n<h2>The Bottom Line<\/h2>\n<p>Both solutions have enthusiastic supporters, with the vast majority of users saying they&#8217;d recommend both products to others. Key strengths of FireEye&#8217;s offering include the threat intelligence it receives from the company&#8217;s Mandiant subsidiary, as well as the solution&#8217;s new MalwareGuard detection and prevention engine. FireEye&#8217;s managed detection and response service is one key differentiator for customers short on resources. Cisco&#8217;s cloud-managed solution benefits from Talos threat intelligence, and many users cite the offering&#8217;s ease of deployment as a key strength.<\/p>\n<h2>Cisco Product Highlights<\/h2>\n<p><strong>Overview: <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/cisco-amp-for-endpoints\/\">Cisco AMP for Endpoints<\/a> (Advanced Malware Protection for Endpoints) is a cloud-managed solution designed to prevent, detect and respond \u2013 preventing breaches and blocking malware at the point of entry, then detecting, containing and remediating advanced threats. The solution automatically correlates files, telemetry data, behavior and activity to simplify investigations and shorten mitigation time, and the AMP Cloud is constantly updated with information from Cisco Talos and Threat Grid to provide real-time threat intelligence.<\/p>\n<p><strong>Recent developments: <\/strong>Recent enhancements to AMP for Endpoints include an improved Device Trajectory feature that shows a more in-depth view of the endpoint and helps users locate spikes in endpoint activity. A new threat severity feature gives events severity tags of Critical, High, Medium or Low. A new Overview Page gives a quick overview of an organization&#8217;s endpoint security state, and the Casebook integrated case management tool assists in gathering and pivoting on observables, assigning names to investigations, taking notes, and more.<\/p>\n<p><strong>Analysts&#8217; take:<\/strong> Gartner says the main strengths of Cisco AMP lie in threat intelligence and exploit prevention, with gradually improving integration and data sharing between AMP and other Cisco security offerings such as networks, firewalls, etc. Still, the research firm says that while the data it provides is relatively comprehensive, the solution requires multiple clicks across multiple screens to get a full understanding of the state of an endpoint or of the issues being caused by malware.<\/p>\n<h2>FireEye Product Highlights<\/h2>\n<p><strong>Overview: <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/fireeye-endpoint\/\">FireEye Endpoint Security<\/a> uses a signature-based endpoint protection platform (EPP) engine to block common malware, MalwareGuard machine learning to find threats for which a signature doesn&#8217;t yet exist, a behavior-based analytics engine to enable EDR capabilities against advanced threats, and a real-time indicators of compromise (IOC) engine to find hidden threats.<\/p>\n<p><strong>Recent developments: <\/strong>Recent additions to the offering include a signature-based prevention engine to filter out known malware, viruses and worms; and the machine learning-based MalwareGuard to protect from previously unknown threats. The MalwareGuard machine learning model is trained with both private and public data sources, including data gathered from more than 15 million endpoint agents, attack analyses based on over a million hours spent responding to attacks, more than 200,000 consulting hours every year, and adversarial intelligence collected from a global network of analysts speaking 32 languages.<\/p>\n<p><strong>Analysts&#8217; take: <\/strong>Gartner reports that FireEye&#8217;s offering benefits from threat intelligence from Mandiant&#8217;s breach investigation team and iSIGHT Threat Intelligence service as well as from FireEye products&#8217; shared threat indicators, and that its managed detection and response service is attractive to customers that are short on resources. Still, the research firm says some clients report that the solution produces high false positive rates when first implemented.<\/p>\n<h2>EDR Product Ratings<\/h2>\n<p>Here are <em>eSecurity Planet<\/em>&#8216;s ratings of each solution&#8217;s key features.<\/p>\n<h3>Performance<\/h3>\n<p>Cisco \u2013 Good<\/p>\n<p>FireEye \u2013 Very Good<\/p>\n<p>Customers of both vendors report solid performance. The most recent Forrester Wave report on EDR solutions gave FireEye a rating of 3.08 out of five and Cisco a rating of 2.84 out of five. The rating is based on a range of criteria including configurability, agent effectiveness, forensic capabilities, deployment options and response actions.<\/p>\n<h3>Detection and Response<\/h3>\n<p><strong>Cisco \u2013 Good<\/strong><\/p>\n<p><strong>FireEye \u2013 Good<\/strong><\/p>\n<p>In recent testing, Forrester rated FireEye&#8217;s detection capabilities at 3.0 out of five, and its response capabilities at 3.4 out of five. Cisco&#8217;s detection capabilities received a rating of 1.8 out of five, and its response capabilities 2.2 out of five. Cisco also received a Recommended rating and 94.5% security effectiveness rating from NSS Labs. Any NSS results from FireEye have yet to be released.<\/p>\n<h3>Value<\/h3>\n<p><strong>Cisco \u2013 Good<\/strong><\/p>\n<p><strong>FireEye \u2013 Good<\/strong><\/p>\n<p>Customers of both Cisco and FireEye generally report satisfaction with pricing and value for money, though in both cases some say the solution is more expensive than others.<\/p>\n<h3>Implementation and Management<\/h3>\n<p><strong>Cisco \u2013 Very Good<\/strong><\/p>\n<p><strong>FireEye \u2013 Good<\/strong><\/p>\n<p>FireEye users report relatively easy deployments. Several Cisco reviewers specifically cited the installation process as a key strength, saying it was simple and straightforward.<\/p>\n<h3>Support<\/h3>\n<p><strong>Cisco \u2013 Good<\/strong><\/p>\n<p><strong>FireEye \u2013 Very Good<\/strong><\/p>\n<p>FireEye users report positive experiences with customer support. Some Cisco reviewers expressed frustration with the level of support received.<\/p>\n<h3>Cloud Features<\/h3>\n<p><strong>Cisco \u2013 Very Good<\/strong><\/p>\n<p><strong>FireEye \u2013 Good<\/strong><\/p>\n<p>Both solutions offer both cloud-based and on-premises deployment options.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/fireeye-vs-cisco-top-edr-solutions-compared_5facc054be5d2.png\" alt=\"FireEye vs Cisco EDR\" width=\"846\" height=\"230\" \/><\/p>\n<h2>User Reviews<\/h2>\n<p><a href=\"https:\/\/www.gartner.com\/reviews\/market\/endpoint-detection-and-response-solutions\/compare\/fireeye-vs-cisco\" target=\"_blank\" rel=\"noopener noreferrer\">Gartner Peer Insights<\/a> users gave FireEye 4.4 stars out of five and Cisco 4.2 stars out of five, though 82 percent said they would recommend FireEye to others, and 88 percent said the same of Cisco.<\/p>\n<p>IT Central Station reviewers were also positive on both FireEye and Cisco.<\/p>\n<p>Cisco reviewers said &#8220;implementing AMP was simple,&#8221; that it &#8220;generally doesn&#8217;t impact performance in a very noticeable way,&#8221; and that &#8220;the cloud management simplifies administration.&#8221; Still, others said &#8220;bug fixes and enhancements are super slow,&#8221; and that early on in the deployment, &#8220;the false positives were somewhat frustrating.&#8221;<\/p>\n<p>FireEye reviewers said the solution &#8220;provides an excellent toolkit for monitoring, detecting and responding to threats at the endpoint level across the enterprise,&#8221; and that &#8220;support is very good.&#8221; Still, others said the solution is &#8220;on the expensive side,&#8221; and has caused some &#8220;difficulties with firmware updates and overall product bugs.&#8221;<\/p>\n<h2>Deployment<\/h2>\n<p>Cisco AMP for Endpoints supports cloud and on-premises deployments. Agents are available for Windows, Mac and Linux, as well as Android and iOS.<\/p>\n<p>FireEye Endpoint Security supports cloud, on-premises and hybrid deployments. Agents are available for Windows, Mac and Linux.<\/p>\n<h2>Pricing Structure<\/h2>\n<p>Cisco AMP for Endpoints is licensed on a one, three or five-year subscription term, with pricing based on the number of endpoints protected. The longer the subscription term and the more endpoints protected, the lower the cost per user.<\/p>\n<p>FireEye Endpoint Security is purchased through a subscription model based on the level of protection and investigation tools available \u2013 the Essential Edition starts at $39 per endpoint, and the more advanced Power Edition starts at $58.50 per endpoint, with volume discounts available for both. Free trials are available.<\/p>\n<h3>Other EDR product comparisons<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-symantec\/\">CrowdStrike vs Symantec<\/a><\/li>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-symantec\/\">FireEye vs Symantec<\/a><\/li>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-carbon-black\/\">FireEye vs Carbon Black<\/a><\/li>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/\">CrowdStrike vs Carbon Black<\/a><\/li>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/carbon-black-vs-mcafee\/\">Carbon Black vs McAfee<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d6ee14b5235-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ee14b5235\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ee14b5235\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ee14b5235\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ee14b5235\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ee14b5235\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ee14b5235\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>FireEye&#8217;s and Cisco&#8217;s endpoint security solutions both made eSecurity Planet&#8216;s list of top endpoint detection and response (EDR) solutions, and each product offers significant benefits to enterprise users. What follows is a look at each solution&#8217;s key features and recent enhancements, along with an analysis of their strengths and weaknesses. The Bottom Line Both solutions [&hellip;]<\/p>\n","protected":false},"author":166,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17],"tags":[789,31080,23445,595],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[378,375],"class_list":["post-4553","post","type-post","status-publish","format-standard","hentry","category-products","tag-cisco","tag-edr-comparison","tag-endpoint-detection-and-response","tag-fireeye","b2b_audience-evaluation-and-selection","b2b_product-endpoint-security","b2b_product-security-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>FireEye vs Cisco: Top EDR Solutions Compared<\/title>\n<meta name=\"description\" content=\"We examine strengths and weaknesses and key features of endpoint detection and response solutions from FireEye and Cisco.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FireEye vs Cisco: Top EDR Solutions Compared\" \/>\n<meta property=\"og:description\" content=\"We examine strengths and weaknesses and key features of endpoint detection and response solutions from FireEye and Cisco.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-21T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-30T01:36:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/fireeye-vs-cisco-top-edr-solutions-compared_5facc054be5d2.png\" \/>\n<meta name=\"author\" content=\"Jeff Goldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Goldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/\"},\"author\":{\"name\":\"Jeff Goldman\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\"},\"headline\":\"FireEye vs Cisco: Top EDR Solutions Compared\",\"datePublished\":\"2019-03-21T00:00:00+00:00\",\"dateModified\":\"2022-05-30T01:36:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/\"},\"wordCount\":1141,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/fireeye-vs-cisco-top-edr-solutions-compared_5facc054be5d2.png\",\"keywords\":[\"Cisco\",\"EDR comparison\",\"endpoint detection and response\",\"FireEye\"],\"articleSection\":[\"Products\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/\",\"name\":\"FireEye vs Cisco: Top EDR Solutions Compared\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/fireeye-vs-cisco-top-edr-solutions-compared_5facc054be5d2.png\",\"datePublished\":\"2019-03-21T00:00:00+00:00\",\"dateModified\":\"2022-05-30T01:36:49+00:00\",\"description\":\"We examine strengths and weaknesses and key features of endpoint detection and response solutions from FireEye and Cisco.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/#primaryimage\",\"url\":\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/fireeye-vs-cisco-top-edr-solutions-compared_5facc054be5d2.png\",\"contentUrl\":\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/fireeye-vs-cisco-top-edr-solutions-compared_5facc054be5d2.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"FireEye vs Cisco: Top EDR Solutions Compared\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\",\"name\":\"Jeff Goldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"caption\":\"Jeff Goldman\"},\"description\":\"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"FireEye vs Cisco: Top EDR Solutions Compared","description":"We examine strengths and weaknesses and key features of endpoint detection and response solutions from FireEye and Cisco.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/","og_locale":"en_US","og_type":"article","og_title":"FireEye vs Cisco: Top EDR Solutions Compared","og_description":"We examine strengths and weaknesses and key features of endpoint detection and response solutions from FireEye and Cisco.","og_url":"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/","og_site_name":"eSecurity Planet","article_published_time":"2019-03-21T00:00:00+00:00","article_modified_time":"2022-05-30T01:36:49+00:00","og_image":[{"url":"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/fireeye-vs-cisco-top-edr-solutions-compared_5facc054be5d2.png"}],"author":"Jeff Goldman","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Goldman","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/"},"author":{"name":"Jeff Goldman","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795"},"headline":"FireEye vs Cisco: Top EDR Solutions Compared","datePublished":"2019-03-21T00:00:00+00:00","dateModified":"2022-05-30T01:36:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/"},"wordCount":1141,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/fireeye-vs-cisco-top-edr-solutions-compared_5facc054be5d2.png","keywords":["Cisco","EDR comparison","endpoint detection and response","FireEye"],"articleSection":["Products"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/","url":"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/","name":"FireEye vs Cisco: Top EDR Solutions Compared","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/fireeye-vs-cisco-top-edr-solutions-compared_5facc054be5d2.png","datePublished":"2019-03-21T00:00:00+00:00","dateModified":"2022-05-30T01:36:49+00:00","description":"We examine strengths and weaknesses and key features of endpoint detection and response solutions from FireEye and Cisco.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/#primaryimage","url":"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/fireeye-vs-cisco-top-edr-solutions-compared_5facc054be5d2.png","contentUrl":"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/fireeye-vs-cisco-top-edr-solutions-compared_5facc054be5d2.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/fireeye-vs-cisco\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"FireEye vs Cisco: Top EDR Solutions Compared"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795","name":"Jeff Goldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","caption":"Jeff Goldman"},"description":"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.","url":"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/4553"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=4553"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/4553\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=4553"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=4553"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=4553"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=4553"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=4553"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=4553"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}