Try our new research platform with insights from 80,000+ expert users
Secureworks Taegis XDR Logo

Secureworks Taegis XDR Reviews

Vendor: Secureworks
3.0 out of 5

What is Secureworks Taegis XDR?

Secureworks Taegis XDR mindshare

Product category:
As of August 2025, the mindshare of Secureworks Taegis XDR in the Extended Detection and Response (XDR) category stands at 1.4%, up from 0.7% compared to the previous year, according to calculations based on PeerSpot user engagement data.
Extended Detection and Response (XDR) Market Share Distribution
ProductMarket Share (%)
Secureworks Taegis XDR1.4%
CrowdStrike Falcon14.0%
Wazuh11.1%
Other73.5%
Extended Detection and Response (XDR)
 
 
Key learnings from peers

Valuable Features

Room for Improvement

Pricing

Top industries

By visitors reading reviews
Computer Software Company
22%
Manufacturing Company
12%
Financial Services Firm
8%
Performing Arts
6%
Government
5%
Retailer
4%
Healthcare Company
4%
Educational Organization
4%
University
4%
Insurance Company
3%
Wholesaler/Distributor
3%
Marketing Services Firm
3%
Non Profit
3%
Real Estate/Law Firm
2%
Comms Service Provider
2%
Construction Company
2%
Media Company
1%
Legal Firm
1%
Energy/Utilities Company
1%
Transportation Company
1%
Paper And Forest Products
1%
Aerospace/Defense Firm
1%
Outsourcing Company
1%
Recreational Facilities/Services Company
1%
Logistics Company
1%

Compare Secureworks Taegis XDR with alternative products

Learn more about Secureworks Taegis XDR

Related questions

 
Secureworks Taegis XDR Reviews Summary
Author infoRatingReview Summary
Senior Manager, Services at International Turnkey Systems - ITS4.0I find Secureworks Taegis XDR to be a comprehensive solution from a SOC perspective, effectively covering all cybersecurity aspects on a single platform.
WPS Security Engineer at a tech services company with 201-500 employees3.0We used Secureworks Taegis XDR primarily as a secondary alerting system, but encountered limitations with its detection capabilities, including challenges with customized detection, log parsing rules, and importing Syslog data, resulting in a visibility gap.