Prices can vary greatly based on features needed, support and customization requests. Knowing what you're after helps vendors give you the most fair price.
Network Security
Data Security
Cloud Security
Web Security
Email Security
Gateway Security
Server Security
Wireless Security
Workload Security
Runtime Security
API Security
Endpoint Detection and Response (EDR)
Extended Detection and Response (XDR)
Firewall
Encryption
Filtering
IP Black/White List
Attack Surface Monitoring
Threat Hunting
Threat Intelligence
Threat Library
Incident Triage
Incident Response & Remediation
Security Awareness Training
Cloud Access Security Broker (CASB)
Security Information and Event Management (SIEM)
Security Orchestration and Automation Response (SOAR)
Security Operations Center (SOC)
Antivirus
Anti-Malware
Anti-Ransomware
Anti-Spyware
Anti-Phishing
Anti-Spam
DDoS Protection
Exfiltration Prevention
Bot Mitigation
Network Performance Monitoring (NPM)
Infrastructure Monitoring
Incident Tracking
Audit Trail
Vulnerability Assessments
Dashboard
Compliance Reports
Breach Assessments
Perimeter Assessments
Threat Analytics
File Integrity Monitoring
Risk Assessments
Device Analytics
Behavioral Analytics
Policy Assessments
Server Assessments
Wireless Assessments
IoT Assessments
API Assessments
VPN Assessments
Privacy Assessments
Traffic Analysis
Threat Modeling
Network Discovery
Network Control
Network Isolation
Network Tunnels
Split Tunneling
Virtual Private Network (VPN)
Application Discovery
Application Control
Application Isolation
Application Lifecycle Management
Application Automation
Incident Automation
Update/Patch Automation
Data Backup & Recovery
Device Discovery
Device Control
Device Isolation
Device Lockdown
Device Lifecycle Management
Data Retention
Role Based Access Control (RBAC)
Multi-Factor Authentication (MFA)
Contextual Authentication
Password Strength Check
Playbooks
Threat Alerts
Update/Patch Management
Segmentation/Grouping
Device Sync
APIs
Phone Support
Email Support
Chat Support
Forum
Product Guide/Manual
Training/Tutorial
Have you used Cisco Secure in the past?
Help other people find the right software by sharing your Cisco Secure experience.