Listing Thumbnail

    Cisco XDR

     Info
    Deployed on AWS
    Cisco XDR, an eXtended Detection and Response security solution, collects and correlates data across email, endpoints, servers, cloud workloads, and networks, enabling visibility and context into advanced, multi-vector threats. Cisco XDR integrates with AWS services and has 53 AWS-specific threat detections with new detections being introduced all the time. Threats can then be analyzed, prioritized, hunted, and remediated to prevent data loss and security breaches. Cisco XDR quickly identifies and stops the most complex attacks on AWS with an open XDR approach.
    4.3

    Overview

    Cisco XDR integrates data from multiple security technologies and leverages AI for enhanced threat detection, streamlined security operations, and improved efficiency to provide a unified defense approach. Designed to address the challenges faced by security practitioners, it offers a cloud-native, open approach that integrates data and telemetry generated from security tools across your stack and applies AI and analytics to arrive at correlated detections.

    Cisco XDR has developed an AWS-specific threat detection library to help users quickly identify attacks and remediate threats. Cisco XDR is the core component of Cisco Breach Protection Suite, which helps secure your business with simplified security operations and accelerated response through AI-powered defense.

    With Cisco XDR, security teams can detect threats across the environment by correlating multiple security vectors, including vital network, email, endpoint, application, and cloud insights. Cisco XDR provides unified threat detection and response by integrating the broad Cisco portfolio of solutions, along with several third-party vendor solutions (for the complete list, see Cisco XDR integrations). It enriches incidents with added context and asset insights using the underlying threat intelligence from Cisco Talos®, one of the most trusted private threat intelligence organizations in the world, as well as dozens of third-party threat intelligence tools. Through clear prioritization of incidents, Cisco XDR reduces false positives and provides the shortest path from detection to response.

    Highlights

    • Identify and stop even the most complex attacks, whether they originate on-premises or in AWS, with a network-centric open XDR approach powered by a simple, built-in Network Detection and Response (NDR) to gain comprehensive visibility.
    • Natively integrate network data from Meraki MX devices to gain clear visibility beyond what EDR-based tools provide, so defenders can take more informed and timely actions.
    • Remediate threats quickly and decisively with AI-guided response and automation that levels up the performance and effectiveness of your security operations team.

    Details

    Categories

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. Request a private offer to receive a custom quote. Sign in to view any offers that have been extended to you.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    You can reach for the Cisco XDR support at

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    4.3
    18 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    56%
    44%
    0%
    0%
    0%
    2 AWS reviews
    |
    16 external reviews
    External reviews are from G2  and PeerSpot .
    Fred Parks

    Centralized visibility has transformed incident investigations and now cuts response time dramatically

    Reviewed on Apr 03, 2026
    Review from a verified AWS customer

    What is our primary use case?

    We integrated Cisco XDR  into customer environments and I completed multiple deployments with the product.

    What is most valuable?

    The investigative ability of Cisco XDR  is amazing to me. Once all the data is in Cisco XDR  and it flags an incident when it sees something that is notable, important, and of concern, it will raise an incident. The ability to look at one screen about this incident and get data from multiple different sources is a very great capability for incident responders to obtain the information they need. Cisco has AI built into the product where it actually translates some of this log data. Professionals typically have to spend a huge amount of time looking through logs trying to figure out what the log data means, and this is done for you automatically.

    The number one thing was getting visibility from customer environments into one console. Customers would have network telemetry from NetFlow, Secure Network Analytics, or the Cisco Telemetry Broker. They would have an endpoint product, a firewall product, and cloud resources, but they needed to correlate all of that data into one location and be able to respond to it instead of having to go into all of these separate security products. By integrating all of these products with Cisco XDR , this allowed them to have a single pane of glass and respond more effectively and quickly to security threats and know what they needed to respond to with that intelligence.

    What needs improvement?

    Workflows could definitely be easier to work with. Workflows are automated tasks that can be kicked off inside of a playbook. When someone is responding to something, they can click a button and it will perform automated tasks for them inside of these other products. The product can actually control the behavior of a firewall and you can write a rule in a firewall from Cisco XDR without having to go into the firewall software. However, if it is not a native workflow automation, it is very difficult to create your own. It is not intuitive and you almost have to be a developer and get really good with the API. This could definitely be improved on, particularly the custom workflow automation.

    Another thing that could be improved is Cisco documenting how it makes decisions, because there are certain factors or criteria that it uses from the source products. Cisco XDR gets all of its data from the integrations, so if you do not integrate anything, it is not going to do anything. Sometimes in these integration products, such as Secure Network Analytics or Cisco Security Exposure, they could be generating some type of alert and you do not necessarily see that in Cisco XDR. This is because it knows, maybe because of these other products, it is not really a big deal and is not big enough to raise an incident. However, I do not think Cisco does a great job in explaining what those rules are, such as why this happens and how this happens. This can cause some questions and some concern. I think it is doing the right thing, but I think it would be better if they had a rule set to say, based on this data, this is how the product actually works.

    For how long have I used the solution?

    I have been using the solution since twenty twenty four, for about two years and a half.

    What do I think about the stability of the solution?

    I have never run into any type of scalability issue. I have deployed Cisco XDR in really small environments and with really large environments, and there was never a point where we could not process the data. Most of the time, Cisco already has a lot of the data, especially if it is Cisco native products. I am not aware of any scalability issues where we were deploying it and said that if it is an environment over a certain size, then we cannot do it or we have to do something different.

    If I had to give it a rating out of five, I would probably say about four out of five. Every now and then something weird happens in the console, the web console. This typically is because the developers seem to be making lots of changes and you have to clear your cache and clear your browser cache, and then it will eventually work. Sometimes that is a little bit annoying. There are some back-end things that may take a little bit of time to process. When you first set up the integrations, it is not immediate. There are some things on some timers and some scheduled activities such as batch processing. This goes back to people needing to understand that, and Cisco does not do a great job of explaining that. You may think that something is broken, but it just has not run yet. So on the initial integration sometimes, it does take a little bit for data to start showing up and it can cause some confusion.

    How are customer service and support?

    I occasionally contact customer service, though not too often. I would say probably in the earlier days there were more support cases because Cisco XDR came into existence later in 2024 and the product was evolving a lot in the early days. Later on, it has gotten a lot better, and I have not had to open up much support cases.

    Which solution did I use previously and why did I switch?

    I never saw a false positive. I think it is very accurate. There were some times where it actually flagged some behavior that would have been malicious if I had not known very specific things about it. For example, it was custom code that was written by developers that did not use very good coding methodologies, so it was doing crazy things, but in this exact instance, it was not malicious. However, if I had not had that special knowledge already, I would need to respond to that. It identified that they do not need to be doing this in the first place, so that required a code change. I would say it is highly accurate. It runs everything through the MITRE Framework and it uses Cisco's intelligence where they are getting threat intelligence from Talos and all of the products that people have deployed, even if they do not have Cisco XDR. If you have Cisco security products deployed out in the world, all that data is feeding the back end. Therefore, you are taking advantage of the millions of customers out there and the environments that are running Cisco. Even if they do not have Cisco XDR, they are feeding data into your Cisco XDR solution and it is making it more intelligent.

    How was the initial setup?

    It is all about getting the data into the product because technically there is not really anything to install in the environment. It is about connecting what is in the environment out to Cisco XDR. I would always focus on the network traffic, getting either Secure Network Analytics data out there or deploying the Cisco Telemetry Broker to get network data. We need network telemetry and then focus on the endpoint. The endpoint is probably one of the more difficult ones because it does touch all of the hosts in that customer, so they are typically more concerned with changes because they do not want to affect that environment. So we are integrating that, network, endpoint telemetry, email integration, and then cloud. If we can get the cloud data, that is typically what we would do. I have not had any issues on the Cisco XDR side. It is typically things in the customer environment that are already not working correctly and therefore we have to fix it to get the data out. However, it is typically a straightforward process as long as the underlying products are in good shape. That is where you really run into a problem, but those are not part of a Cisco XDR problem. They are just normal life in IT.

    What about the implementation team?

    The implementation team is very professional, very helpful, and willing to help. We always had a good experience.

    What was our ROI?

    Cisco XDR absolutely can provide ROI. It has some default tasks that it thinks probably everybody should use, but then you can make those work. For example, if you do not have this type of product, you can take that out and not focus your time on incident response on that. You can focus your time on incident response on your email, endpoint security, and cloud.

    Which other solutions did I evaluate?

    Cisco XDR totally supports third-party integrations and it works as long as the third party already has an API. If they have an API that allows changes to be made and data to be written, then it typically works really well. If it is a closed-off system, it is not going to work well. The cloud integrations work really well getting data from AWS  and getting data from Azure , and getting that network data. This is a great part of it and it does not really require much of an integration. It is just reading that data that is already there. However, it kind of depends on the third party, but it does work. When I have done it before, it has worked well.

    What other advice do I have?

    It is difficult to say because it depends on how many products a customer would have. But if they had an endpoint product, a firewall product, a network product, and a cloud product, and they had an incident, they would have to get into each one of those and then do research, potentially an hour per product. Whereas now, they are in Cisco XDR and they are able to get the answer to this in less than thirty minutes. This is a huge time savings to me personally.

    Getting the endpoint data is absolutely critical and Cisco XDR does a great job. Getting endpoint data from something such as CrowdStrike or from Cisco Secure Endpoint  and then taking in data from the network with NetFlow logs or data from Secure Network Analytics or something that does IPFIX, and then the cloud logs and then also being able to do email integration for email threats, all of that data is available to investigate, to make decisions, and to see if one host ever talked to another host. When investigating an incident, that is extremely beneficial. The integration of that data and merging it into one screen where I do not have to look at different solutions is a great benefit. The merging of all of that data into one display is probably the best benefit of Cisco XDR.

    There is the concept of playbooks where, if an incident is raised and there is a problem, it allows companies to build out how they want their incident response staff to operate. What is the first step? What is the second step? What do we investigate first? Who do we notify about this? It allows them to customize that response process to align with the company's own written IT security policy. This helps focus incident responders on the tasks that they need to do for that specific environment and focus on the things that are important to them, not just what Cisco thinks.

    I would rate this product a nine out of ten overall.

    KarthikB

    Unified logs have improved threat hunting and response workflows yet still need richer automation

    Reviewed on Mar 27, 2026
    Review provided by PeerSpot

    What is our primary use case?

    My main use case for Cisco XDR  is to collect all the logs from the use cases of how users try to explore and perform their tasks. We are threat hunting to prevent, detect, and respond to threats, collecting from different systems such as M365 and others, correlating them into one central location, and trying to correlate between different kinds of logs to provide whether the alert is a true positive or not.

    A simple example of how I used Cisco XDR  to connect all these logs and coordinate between different systems is that we have M365 connected to Cisco XDR , as well as browser security connected. Many users use client applications including Outlook, but many use cases go wrong when they are using it via a browser. So what we did was correlate all the source logs from the browser and XDR  and try to correlate them with the user's reactions as well as their daily usage. This helps us understand their daily perspective of how they are behaving. Behavioral analysis was easier when we connected all these systems.

    What is most valuable?

    From the malware detection perspective, Cisco XDR can actually find out if there is any malware present, and we can lock down the system as well, which we call isolation. That is a great add-on for me.

    From the SOC perspective, the best features Cisco XDR offers are the ease of use and the ability to understand the logs and log aggregation. It is one of a kind. What stands out for me about the log analysis and the user interface in Cisco XDR is that Cisco has an AI assistant that we can utilize to understand the correlation. The main intent of the integration architecture allows us to integrate easily without any cumbersome processes. We can simply specify what should be integrated with what. They have an open integration architecture already present with third-party tools such as CrowdStrike, Palo Alto Networks, and AWS . Additionally, the automated response workflow can actually automate the flows and tell me the response automatically, indicating whether something is an issue or not. All these features make my daily work and log analysis easier.

    Cisco XDR has positively impacted my organization because instead of ten people working on one event, Cisco XDR can do many things an analyst can do, reducing the human effort required and coordinating everything. The mean time to respond has improved for the company, and we have automated many processes. A severe incident would typically take my engineer one or two days to solve, but Cisco XDR would have already completed almost half of that work. The engineer can then review the incident and understand whatever analysis has already been provided.

    The features of Cisco XDR are a great add-on for the SOC team, and the security has increased by using Cisco XDR.

    What needs improvement?

    There are no significant improvements needed for Cisco XDR. The inclusion of new incident mechanisms and the ability to automate them automatically would make things easier.

    For how long have I used the solution?

    I have been using Cisco XDR for almost one year.

    What do I think about the stability of the solution?

    In my experience, Cisco XDR is stable.

    What do I think about the scalability of the solution?

    Since Cisco XDR is on a cloud-native architecture, I believe it is significantly scalable.

    How are customer service and support?

    Customer support for Cisco XDR is a bit slow in the initial stages, but I believe it has improved nowadays.

    Which solution did I use previously and why did I switch?

    Before Cisco XDR, I previously used SecureWorks and switched due to problems.

    What was our ROI?

    I have seen a return on investment with Cisco XDR. I can share that I save time and people. For money saved, I do not see much improvement, but time saved is significant.

    What's my experience with pricing, setup cost, and licensing?

    My experience with pricing, setup cost, and licensing for Cisco XDR was good.

    Which other solutions did I evaluate?

    Before choosing Cisco XDR, I evaluated options including SecureWorks and SentinelOne.

    What other advice do I have?

    With the functionality and support Cisco XDR provides, I advise others to go for Cisco XDR, whether for a small company or a large company. I rate this product 7 out of 10.

    Bolaji Kazeem

    Early threat detection has improved incident response and prevents data exfiltration

    Reviewed on Mar 21, 2026
    Review provided by PeerSpot

    What is our primary use case?

    I have used Cisco XDR  to detect and respond to malicious activities on my client's endpoint. For instance, the last time I used it was when a client downloaded a malicious executable file, and when the endpoint picked it up as suspicious activity, I investigated and discovered using a threat intelligence platform, VirusTotal , that the hash of the executable file is malicious. I quarantined the endpoint and deleted the malicious executable file afterward, using it to block the malware.

    It has positively affected our incident management process because Cisco XDR  helps with early detection and does not allow room for escalation of malicious activities before remediation starts.

    One function that Cisco XDR  streamlines incident response through is its containment feature, which speeds up response time and demonstrates how it is useful in incident response.

    For data loss prevention, I find it really helpful because it monitors email activities for some clients and reports suspicious data exfiltration activities, capturing and reporting instances when there is communication to a public IP suspicious for data exfiltration, allowing me to verify legitimacy with the client.

    What is most valuable?

    I find Cisco XDR really useful and interesting, and I believe that with time, it is going to get even better.

    I appreciate the fact that Cisco XDR detects malicious activity as fast as it can and notifies me when suspicious executable files are downloaded in the client's environment, providing all the information needed for investigation, which is a feature I really enjoy.

    When the alerts come in, they bring context, which is helpful. The alert comes in with context such as the file hash, sometimes with the source IP address or the destination IP address, and this context helps bring a suspicious activity to resolution quickly.

    Before using Cisco XDR, I sometimes did not detect malicious activities in my client's environment, but since implementing this solution, my mean time to detect has actually reduced, and my mean time to respond has fallen within the acceptable threshold, positively impacting my organization as I can detect and respond to threats in time.

    What needs improvement?

    At the moment, I am still exploring Cisco XDR, and while it seems well built and the team has done good work on it, I cannot point out any specific errors or make generic suggestions for now, but I believe in six months I will be able to detail improvements.

    For now, I really cannot think of anything that needs improvement because what I need for investigation comes with the alert, and I perform remediation activities on the solution.

    The interface of Cisco XDR can be improved. I can navigate it, but I am still exploring and believe it can be made easier to interact with.

    For how long have I used the solution?

    I have been using Cisco XDR for about close to eight months.

    What do I think about the stability of the solution?

    Cisco XDR is stable in my experience.

    What do I think about the scalability of the solution?

    Cisco XDR is really scalable. For example, you can start with less than 10 endpoints and expand as results appear, and it is applicable not only to endpoints but can also be used on servers.

    How are customer service and support?

    The customer support for Cisco XDR is fantastic. I have not had a reason to call them, but based on client information, they seem readily available whenever needed.

    Which solution did I use previously and why did I switch?

    For this specific client, they have not used an XDR before, so Cisco XDR is the first one they are using in their environment.

    They were convinced to try Cisco XDR due to the value they received from other Cisco products, such as Cisco ISE  and Cisco ASA  Firewall.

    What's my experience with pricing, setup cost, and licensing?

    Regarding pricing, setup cost, and licensing for Cisco XDR, it was my client that did the licensing and costing, so I cannot speak much about that as I only manage the solution on their behalf.

    What other advice do I have?

    Based on feedback from my client, they seem very satisfied with the output of Cisco XDR solution, so I assume they are content.

    I recommend Cisco XDR to any client that may be interested because I have used a number of Cisco products and have no negative reservations at this point.

    I would rate this product an 8 out of 10.

    Mohamed Fouad

    Centralized incident insights have saved investigation time and improved security coverage

    Reviewed on Mar 12, 2026
    Review provided by PeerSpot

    What is our primary use case?

    I use Cisco XDR  for detection and response. I have an Insight license from Cisco XDR , which provides me with a powerful GUI on the cloud where I can see comprehensive insights from my machines. I also have an MDR service license from Cisco.

    I use Cisco XDR  for prioritizing incidents across multiple security controls. The second-best technical feature is incident correlation, which provides me centralized visibility and a single place to review incidents and investigate IPs, URLs, and domains. All log data is visible on one dashboard for managing incidents and taking actions with integrations and connectors to other products in my organization.

    I have not yet run the DLP  feature in Cisco XDR , but the XDR forensics capability provides evidence collection and forensics visibility, which works very well with incident correlation. Regarding DLP , I run an endpoint from Kaspersky, not Cisco. The integrations are strong, and I have purchased integrations from Cisco.

    I have used the automation feature in Cisco XDR to improve workflows. I have connectors and direct integrations that allow Cisco to integrate with my firewalls using predefined integrations. I enable collectors and have connected firewalls, endpoints, and email systems, which allows me to take actions. For example, during a phishing incident, I run automations to investigate domains that trigger a phishing email, and I can block this domain on my email system through integration with Cisco XDR.

    Cisco XDR has helped expose gaps in my security coverage. Since implementing it, I did not have NDR, and I opened a conversation with Cisco to implement the Cisco NDR module, which will be very useful to integrate with Cisco XDR. I receive detailed reports on traffic flow, so I can see on the Cisco XDR dashboard when user X attempts to connect to a malicious domain, for example.

    What is most valuable?

    The best feature of Cisco XDR, on which I based my decision to purchase it, is that Cisco XDR does not require an endpoint from Cisco. It can work with any endpoint. In my situation, I have an endpoint from Kaspersky, and Cisco XDR can integrate with it. It has predefined integrations based on the licensing model, so there is no need to have a Cisco endpoint to use Cisco XDR. This is not the typical use case for other XDR solutions like Trend Micro or Palo Alto Cortex , where you must obtain the endpoint from the same vendor.

    In just four months, I have seen a good return on investment with Cisco XDR. I have reduced incidents and saved time because previously, if I encountered any incident, I would have spent considerably more time and effort reaching out to every security control on my network and checking logs across multiple systems. With Cisco XDR, I gain visibility on one dashboard where I can see extensive logs, resulting in time saved and reduced security incidents, which provides a strong return on my investment.

    What needs improvement?

    I believe the advanced insights module in Cisco XDR has room for improvement because it requires a separate license. If Cisco allowed me to access full data with a basic license, it would benefit many customers.

    For how long have I used the solution?

    I have used Cisco XDR for four months.

    What do I think about the stability of the solution?

    I assess the stability of Cisco XDR as ten out of ten.

    What do I think about the scalability of the solution?

    Although I have not yet tested scalability, I can say that theoretically it appears to support scalability, so I would rate it as ten out of ten.

    How are customer service and support?

    I rate the technical support from Cisco as very professional with a strong support team. It is Cisco TAC, so I would rate it as ten out of ten.

    How was the initial setup?

    The deployment of Cisco XDR is very simple and straightforward. I access the service, check the service, configure it, and I obtain the dashboard to begin configuring integrations. I receive logs and can take actions based on incidents easily.

    What was our ROI?

    In just four months, I have seen a good return on investment with Cisco XDR. I have reduced incidents and saved time because previously, if I encountered any incident, I would have spent considerably more time and effort reaching out to every security control on my network and checking logs across multiple systems. With Cisco XDR, I gain visibility on one dashboard where I can see extensive logs, resulting in time saved and reduced security incidents, which provides a strong return on my investment.

    What's my experience with pricing, setup cost, and licensing?

    I believe the pricing of Cisco XDR is affordable compared to other solutions.

    Which other solutions did I evaluate?

    I believe Cisco XDR compares favorably with other XDR solutions such as Cortex XDR  and Trend Micro Vision One . The best feature, as I mentioned earlier, is that Cisco XDR does not require its own endpoint. I have a Kaspersky endpoint, and I did not need an endpoint from Cisco to use Cisco XDR. In contrast, with other vendors such as Cortex  or Trend Micro, you must obtain the same vendor endpoint.

    What other advice do I have?

    My advice for others looking to implement Cisco XDR is to establish licensing agreements beforehand and list your products for integration with Cisco XDR. You need to know which email systems, DLP solutions, firewalls, and vendors you will use, as this helps identify the best licensing for your needs.

    Regarding how many people use the solution, I can say that we are running it on our SOC, which has multiple shifts and approximately eight SOC analysts.

    Cisco XDR does not require any maintenance, as this is provided by Cisco. My overall rating for Cisco XDR is ten out of ten.

    Ananda Deb

    Security operations have strengthened data center protection and build lasting client confidence

    Reviewed on Mar 06, 2026
    Review provided by PeerSpot

    What is our primary use case?

    We are system integrators working in a consultancy mode with a team of implementation engineers. Over the last two years, we have worked on several Cisco XDR  cases. In data centers, Cisco XDR  is definitely the primary requirement. Our first choice is always Cisco, and while one or two other solutions have come our way, Cisco cases primarily come to us. In a certain segment, Cisco XDR  is definitely the first priority. I would say that about 80% of my customer base relies on Cisco XDR . We are partners of Cisco and we focus particularly on the implementation aspect, while also taking care of services.

    What is most valuable?

    Cisco XDR is one of the most matured systems available. It is quite user-friendly. The system has been very effective, and our customers receive sufficient reports demonstrating visible benefits. This helps maintain customer confidence, particularly in secure data center implementations. With the implementation we have deployed, our customers gain confidence in having their data center secure. The reporting capabilities are pretty extensive. Cisco XDR is keeping our customers protected.

    What needs improvement?

    It would be difficult for me to identify specific improvements at this moment. We have not really foreseen exactly what additional benefits might be needed. Given more thought, something could potentially come out, but we have not found any requirements for additional features.

    For how long have I used the solution?

    The solution is working well for our needs.

    What do I think about the stability of the solution?

    There were some challenges initially, but with the technical support provided, we were able to resolve them and move forward successfully.

    What do I think about the scalability of the solution?

    Scalability has been a consideration for our implementations.

    How are customer service and support?

    The technical support has been very helpful. During implementation, we receive assistance from the technical support team and have obtained proper support from their side.

    How was the initial setup?

    In a certain segment, Cisco XDR is definitely the first priority. I would say that about 80% of my customer base relies on Cisco XDR as the way to go.

    What about the implementation team?

    We are partners of Cisco and focus particularly on the implementation aspect. We also take care of the services.

    What was our ROI?

    Cisco XDR has helped our customers achieve positive returns on their investment.

    Which other solutions did I evaluate?

    I strongly feel that Cisco XDR is more proactive rather than reactive compared to alternate solutions.

    What other advice do I have?

    It would be difficult for me to provide additional advice at this moment. I would give Cisco XDR a nine out of ten. I would definitely recommend it. I

    View all reviews