No more typing reviews! Try our Samantha, our new voice AI agent.

Anomali vs ESET PROTECT Enterprise comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 18, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Ranking in Extended Detection and Response (XDR)
5th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
110
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Endpoint Detection and Response (EDR) (6th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (1st)
Anomali
Ranking in Extended Detection and Response (XDR)
22nd
Average Rating
7.8
Reviews Sentiment
7.2
Number of Reviews
4
Ranking in other categories
Security Information and Event Management (SIEM) (32nd), User Entity Behavior Analytics (UEBA) (12th), Advanced Threat Protection (ATP) (21st), Threat Intelligence Platforms (TIP) (8th)
ESET PROTECT Enterprise
Ranking in Extended Detection and Response (XDR)
18th
Average Rating
8.8
Reviews Sentiment
7.0
Number of Reviews
16
Ranking in other categories
Anti-Malware Tools (11th)
 

Mindshare comparison

As of May 2026, in the Extended Detection and Response (XDR) category, the mindshare of Cortex XDR by Palo Alto Networks is 4.7%, down from 5.1% compared to the previous year. The mindshare of Anomali is 2.2%, up from 0.2% compared to the previous year. The mindshare of ESET PROTECT Enterprise is 1.3%, up from 0.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Extended Detection and Response (XDR) Mindshare Distribution
ProductMindshare (%)
Cortex XDR by Palo Alto Networks4.7%
ESET PROTECT Enterprise1.3%
Anomali2.2%
Other91.8%
Extended Detection and Response (XDR)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
CC
Enterprise Security Architect V at FirstEnergy
Enables automated threat intelligence sorting and enhances proactive threat hunting capabilities
You have to have at least a threat intelligence background or a SOC analyst background to use it, as that's the information you'll dig around with in there. If you don't have that kind of knowledge, it probably can be a little hard to use, but they do provide training. They offer training not only for how to use the platform but also some basic threat intelligence training to explain what these things are and what these terms mean. My company is a customer of Anomali. I would recommend it to other people. I would advise making sure you don't pick it without testing other products and have your use cases well thought out and documented before testing, so you know it will solve the problems you're trying to address. Keep an open mind with it and realize that whatever you can dream of, you can probably do with the platform. Overall, I would rate Anomali an eight out of ten.
Manikumar David - PeerSpot reviewer
IT Manager at R K Khanna and Associates
Provides comprehensive monitoring and policy implementation with room for memory optimization
ESET PROTECT Enterprise makes the system a little slow sometimes and updates occur at startup. Sometimes unwanted pop-ups appear to users, and they are unable to disable them. The user-friendliness is lacking in some areas. When users are using any computer, ESET PROTECT Enterprise should work in the background without consuming much memory, and any updates should proceed in the background without disturbing the user.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I like that the product has behavior-based detection which offers many benefits over signature-based detection."
"Traps has drastically reduced our endpoint attack surface via advanced detection capabilities, sandboxing of never before seen programs, and by drastically limiting where executables can launch in the first place."
"The good thing about the product is that it's always scanning."
"The positive impacts I see from Cortex XDR by Palo Alto Networks include a complete 360-degree view of our security posture altogether, being a uniform platform where we are ingesting logs from multiple resources."
"I can highlight that we have not faced any security incidents with Cortex XDR by Palo Alto Networks, and even though our environment is quite dynamic, we have not faced any security incident with Cortex XDR by Palo Alto Networks until now."
"The product's most valuable features are massive user and feature intelligence exploit detection."
"Automation and playbooks have helped me significantly, as Cortex Xnor's playbooks predefine the workflow of the automation, such as response processes, alert triggering, and enriching the context, efficiently detecting and blocking malicious attacks with firewalls while eliminating workload and speeding responses for next-generation operations."
"The policy configuration is great, the granularity of policies that are available is very helpful, it is straightforward to set up, and it has pretty much everything we need and works well within the Palo Alto ecosystem."
"We now have a very robust collection of threat intelligence based on the capabilities that Anomali provides."
"I have found Cyber threat intelligence (CTI) very useful and concise. The solution is easy to use."
"I have found Cyber threat intelligence (CTI) very useful and concise. The solution is easy to use."
"The most valuable aspect of Anomali is the threat modeling capability."
"The feature I have found most valuable is credential monitoring. This feature is easy and quick."
"The solution doesn't have high memory usage."
"Regarding real-time analytics and threat detection capabilities in ESET PROTECT Enterprise, I find them excellent."
"It does everything we need it to do and it's easy to use."
"The solution provides EDR. You can customize how you prepare the endpoint for clients and the dashboard alerts."
"The technical support of ESET is very good."
"The solution provides EDR. You can customize how you prepare the endpoint for clients and the dashboard alerts."
"It's helped us with restrictions and knowing which users we can provide permissions to and which users we need to restrict."
"The most valuable feature of ESET Protect is the security while accessing any transaction, such as online banking systems. When I access a banking website a new browser opens which is more secure, which I find very useful."
 

Cons

"In an upcoming release, the solution could improve by proving hard disk encryption. If it could support this it would be a complete solution."
"It would be good if they could make an exception for applications."
"When it comes to core analysis and security analysis, Cortex needs to provide more information."
"In general, the price could be more competitive."
"It'll help if customization was easier."
"It is not a suitable solution if you are looking for a single product with multiple features such as DLP, encryption, rollback, etc."
"Managing the product should be easier."
"Technology evolves every day, so it would be nice if it gets more secure. It can also have more integration with other platforms."
"A lot of tools can give you many features, such as CTI intelligence and a tax service reduction. However, many people are combining different tools together to have more capabilities. It is up to the consumer whether they want to have multiple tools or have one tool that serves the purpose. Anomali Enterprise could improve by combining all the other tools' features into one solution."
"Support in the past has been top-notch, but recent trends indicate that it has taken a back seat, as we often don't get answers for days."
"Anomali Enterprise could improve by combining all the other tools' features into one solution."
"An area for improvement is the intelligence sharing within the Anomali community. The tagging system can be inconsistent, as any company can use any tags for their reporting."
"Less code in integration would be nice when building blocks."
"When it first starts up, it takes a lot of processing power when the machine is initially booted. Improving the startup side could be beneficial."
"The solution can be quite technical and therefore is challenging for new users."
"Certain updates prompt the computer to restart automatically. Users have complained that it initiates computer restarts during their work without intervention."
"I would like to see more in managing mobile devices in an on-premise solution. The latest news I've heard is that ESET drops mobile management module development for the on-prem version. It's moving to the cloud. Like in endpoint client protection, I would also like to see more of the vulnerability management features and additional app control functionality in ESET Protect."
"In the current version of ESET File Security, you cannot download a file, it always wants the real-time upload which you have to wait until the file is ready. This is annoying."
"ESET Protect could improve the performance. The performance of the home computers and laptops becomes slow due to their heavy software load. It would be a benefit to make a lighter version of the software which does not have any impact on the performance of the computer's hardware."
"They need to reduce the number of notifications on the endpoints."
"The management console could be improved. Sometimes, agents lose connection with the management console, and the administration team needs to reinstall the agents on the computers."
 

Pricing and Cost Advice

"The solution is expensive. It's pricing is on a yearly-basis."
"I don't recall what the cost was, but it wasn't really that expensive."
"The pricing is okay, although direct support can be expensive."
"When we first bought it, it was a bit expensive, but it was worth it. The licensing was straightforward."
"It has reasonable pricing for the use cases it provides to the company."
"The price of the solution is high for the license and in general."
"The price was fine."
"The price is on the higher side, but it's okay."
"When comparing the price of Anomali Enterprise to other solutions it is in the medium to high range. However, I am satisfied with the price."
"There is a license needed to use ESET Protect. The licensing cost is very low, it is approximately $10 per license."
"The product is cost-effective compared to one of its competitors."
"ESET PROTECT Enterprise is affordable."
report
Use our free recommendation engine to learn which Extended Detection and Response (XDR) solutions are best for your needs.
894,738 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Construction Company
12%
Comms Service Provider
9%
Manufacturing Company
8%
Financial Services Firm
14%
Manufacturing Company
7%
Computer Software Company
7%
Construction Company
7%
Comms Service Provider
13%
Financial Services Firm
11%
Computer Software Company
10%
Manufacturing Company
10%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business46
Midsize Enterprise20
Large Enterprise49
By reviewers
Company SizeCount
Small Business2
Midsize Enterprise1
Large Enterprise5
By reviewers
Company SizeCount
Small Business11
Midsize Enterprise2
Large Enterprise2
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
What needs improvement with Anomali ThreatStream?
An area for improvement is the intelligence sharing within the Anomali community. The tagging system can be inconsist...
What is your primary use case for Anomali ThreatStream?
I use Anomali ( /products/anomali-reviews ) for threat hunting, threat collection, operationalization of intelligence...
What advice do you have for others considering Anomali ThreatStream?
For new users, I recommend taking the training provided by Anomali as it is very well articulated. I advise reading t...
What needs improvement with ESET Protect?
One area for improvement in ESET PROTECT Enterprise is its capabilities on Mac devices, which are less functional com...
What is your primary use case for ESET Protect?
My customers use ESET PROTECT Enterprise to secure all their operating systems; we have a lot of customers who rely o...
What advice do you have for others considering ESET Protect?
I suggest that other users considering ESET PROTECT Enterprise utilize this platform to manage all their laptops and ...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Match, Lens, ThreatStream, STAXX, Anomali Security Analytics
ESET Protect, ESET File Security
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Bank of England, First Energy, UBISOFT, Bank of Hope, Blackhawk Network
Information Not Available
Find out what your peers are saying about Anomali vs. ESET PROTECT Enterprise and other solutions. Updated: April 2026.
894,738 professionals have used our research since 2012.