No more typing reviews! Try our Samantha, our new voice AI agent.

Anomali vs WithSecure Elements Endpoint Detection and Response comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Ranking in Extended Detection and Response (XDR)
6th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
108
Ranking in other categories
Endpoint Protection Platform (EPP) (5th), Endpoint Detection and Response (EDR) (7th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (2nd)
Anomali
Ranking in Extended Detection and Response (XDR)
23rd
Average Rating
7.8
Reviews Sentiment
7.2
Number of Reviews
4
Ranking in other categories
Security Information and Event Management (SIEM) (32nd), User Entity Behavior Analytics (UEBA) (12th), Advanced Threat Protection (ATP) (20th), Threat Intelligence Platforms (TIP) (7th)
WithSecure Elements Endpoin...
Ranking in Extended Detection and Response (XDR)
32nd
Average Rating
8.0
Reviews Sentiment
5.6
Number of Reviews
7
Ranking in other categories
Endpoint Detection and Response (EDR) (42nd)
 

Mindshare comparison

As of March 2026, in the Extended Detection and Response (XDR) category, the mindshare of Cortex XDR by Palo Alto Networks is 4.9%, down from 5.6% compared to the previous year. The mindshare of Anomali is 1.8%, up from 0.2% compared to the previous year. The mindshare of WithSecure Elements Endpoint Detection and Response is 0.8%, up from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Extended Detection and Response (XDR) Mindshare Distribution
ProductMindshare (%)
Cortex XDR by Palo Alto Networks4.9%
Anomali1.8%
WithSecure Elements Endpoint Detection and Response0.8%
Other92.5%
Extended Detection and Response (XDR)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
CC
Enterprise Security Architect V at FirstEnergy
Enables automated threat intelligence sorting and enhances proactive threat hunting capabilities
You have to have at least a threat intelligence background or a SOC analyst background to use it, as that's the information you'll dig around with in there. If you don't have that kind of knowledge, it probably can be a little hard to use, but they do provide training. They offer training not only for how to use the platform but also some basic threat intelligence training to explain what these things are and what these terms mean. My company is a customer of Anomali. I would recommend it to other people. I would advise making sure you don't pick it without testing other products and have your use cases well thought out and documented before testing, so you know it will solve the problems you're trying to address. Keep an open mind with it and realize that whatever you can dream of, you can probably do with the platform. Overall, I would rate Anomali an eight out of ten.
Mark Feldman - PeerSpot reviewer
IT-Manager at MKF-Schimanski-ERGIS GmbH
Dashboard offers comprehensive views with efficient system updates and integration
There is one significant issue with WithSecure Elements Endpoint Detection and Response. For computers with limited RAM, such as 16 gigabytes, the software is not optimal as it requires between four to six gigabytes of RAM to run. I don't use the Threat Intelligence feature from WithSecure Elements Endpoint Detection and Response as it requires extra activation, which I have not implemented.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Has great threat detection capabilities."
"Being a cloud solution it is very flexible in serving internal and external connections and a broad range of devices."
"It integrates well into the environment."
"The policy configuration is great, the granularity of policies that are available is very helpful, it is straightforward to set up, and it has pretty much everything we need and works well within the Palo Alto ecosystem."
"One thing that I like about Cortex XDR is its ability to detect all the suspicious or malicious binaries, and it can integrate with Palo Alto Firewall."
"I like the centralized console and the predictive analysis it does of malware. It is very stable and also scalable."
"We can visualize and control the activities in the environment from anywhere."
"My advice for others looking into using Cortex is that it is very easy to use and very useful for the customer environment, whether it's a public or private one."
"I have found Cyber threat intelligence (CTI) very useful and concise. The solution is easy to use."
"The most valuable aspect of Anomali is the threat modeling capability."
"I have found Cyber threat intelligence (CTI) very useful and concise. The solution is easy to use."
"The feature I have found most valuable is credential monitoring. This feature is easy and quick."
"We now have a very robust collection of threat intelligence based on the capabilities that Anomali provides."
"We've been very pleased with its capabilities."
"I use the solution to protect our infrastructure. The tool has special frames for banking. There is an additional secure filter for banking-related pages. It protects me from viruses, malware, and attacks."
"It offers good scalability."
"The product is stable."
"WithSecure includes an encrypted drive that stores a key for accessing the encrypted data."
"It is a scalable solution."
"The only issue that we have today is with false positives. We have too many false positives with the solution."
"The integration and user interface of WithSecure Elements Endpoint Detection and Response are effective, with a comprehensive dashboard that allows users to quickly identify and address problems, add computers, and send system updates."
 

Cons

"The onboarding process could be better."
"It would be good to have a better way to search for a file within the UI."
"I would like to see them include NDR (Network Detection Response)."
"There is a severe gap in functionality between Windows, Linux, and Mac versions."
"However, if you do not have Palo Alto in your environment, you are paying these additional services just for Cortex XDR by Palo Alto Networks, so it is not a cost-effective solution."
"It is not easy to sell Cortex XDR, not because it isn't a good tool. Its marketing needs to be improved."
"The downside to the solution is that there are a large number of false positives."
"There are a large number of false positives."
"A lot of tools can give you many features, such as CTI intelligence and a tax service reduction. However, many people are combining different tools together to have more capabilities. It is up to the consumer whether they want to have multiple tools or have one tool that serves the purpose. Anomali Enterprise could improve by combining all the other tools' features into one solution."
"An area for improvement is the intelligence sharing within the Anomali community. The tagging system can be inconsistent, as any company can use any tags for their reporting."
"Support in the past has been top-notch, but recent trends indicate that it has taken a back seat, as we often don't get answers for days."
"Anomali Enterprise could improve by combining all the other tools' features into one solution."
"Less code in integration would be nice when building blocks."
"The only issue that we have today is with false positives; we have too many false positives with the solution."
"Its automated functionality could be better."
"The initial setup is very straightforward."
"The monthly reporting feature of WithSecure can be improved."
"WithSecure Elements Endpoint Detection and Response is scalable. My company has 800-1000 customers."
"The tool’s mobile version needs to be improved."
"The website rules are too complicated."
 

Pricing and Cost Advice

"The price was fine."
"It has reasonable pricing for the use cases it provides to the company."
"It's about $55 per license on a yearly basis."
"The pricing is a little high. It is per user per year."
"Our customers have expressed that the price is high."
"This is an expensive solution."
"Every customer has to pay for a license because it doesn't work with what you get from a managed services provider."
"When we first bought it, it was a bit expensive, but it was worth it. The licensing was straightforward."
"When comparing the price of Anomali Enterprise to other solutions it is in the medium to high range. However, I am satisfied with the price."
"WithSecure Elements Endpoint Detection and Response's licensing costs are yearly."
"I rate WithSecure a four out of ten because it's quite economical."
"The solution's price is moderate."
"I would rate the tool’s pricing a three out of ten. Its pricing is competitive."
report
Use our free recommendation engine to learn which Extended Detection and Response (XDR) solutions are best for your needs.
885,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
13%
Manufacturing Company
8%
Computer Software Company
8%
Financial Services Firm
8%
Financial Services Firm
15%
Manufacturing Company
7%
Computer Software Company
6%
Healthcare Company
6%
Comms Service Provider
13%
Computer Software Company
9%
Manufacturing Company
7%
Outsourcing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business44
Midsize Enterprise20
Large Enterprise47
By reviewers
Company SizeCount
Small Business2
Midsize Enterprise1
Large Enterprise5
By reviewers
Company SizeCount
Small Business6
Large Enterprise1
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
What needs improvement with Anomali ThreatStream?
An area for improvement is the intelligence sharing within the Anomali community. The tagging system can be inconsist...
What is your primary use case for Anomali ThreatStream?
I use Anomali ( /products/anomali-reviews ) for threat hunting, threat collection, operationalization of intelligence...
What advice do you have for others considering Anomali ThreatStream?
For new users, I recommend taking the training provided by Anomali as it is very well articulated. I advise reading t...
What needs improvement with F-Secure Elements Endpoint Detection and Response?
There is one significant issue with WithSecure Elements Endpoint Detection and Response. For computers with limited R...
What is your primary use case for F-Secure Elements Endpoint Detection and Response?
We work with WithSecure Elements Endpoint Detection and Response EDR products. We use the EDR products from WithSecur...
What advice do you have for others considering F-Secure Elements Endpoint Detection and Response?
The system is simple to use with WithSecure Elements Endpoint Detection and Response. The automated reporting feature...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Match, Lens, ThreatStream, STAXX, Anomali Security Analytics
F-Secure Elements Endpoint Detection and Response, F-Secure Rapid Detection and Response, F-Secure RDR
 

Interactive Demo

Demo not available
Demo not available
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Bank of England, First Energy, UBISOFT, Bank of Hope, Blackhawk Network
Information Not Available
Find out what your peers are saying about Anomali vs. WithSecure Elements Endpoint Detection and Response and other solutions. Updated: February 2026.
885,311 professionals have used our research since 2012.