



Find out what your peers are saying about CrowdStrike, SentinelOne, Microsoft and others in Endpoint Detection and Response (EDR).
They appreciate the rich telemetry data from the solution, as it provides in-depth threat identification.
Cortex XDR by Palo Alto Networks helps to reduce my total cost of ownership significantly.
In Cortex XDR by Palo Alto Networks, most of the remediation is automated and the accuracy is quite good.
There is a 60 to 70 percent reduction in false positives, allowing us to disregard those.
Based on our experience and industry benchmarks, I can say that we have seen around a thirty to forty percent improvement in time spent on endpoint security operations.
CrowdStrike Falcon saves time and offers good value for money, especially for enterprise companies, because it can stop breaches.
The technical support from Palo Alto deserves a mark of ten because they reach out within an hour whenever assistance is needed.
There is no back and forth, and they know what we are asking for and come up with the best resolution for a solution.
If any of these services are missed, it becomes a problem in terms of support tickets, follow-up, or special configuration that needs to be done in the system.
I would rate customer service and support as nine out of ten.
I have heard that their response time is pretty good, usually under 24 hours.
They are candid and straightforward in their communication.
On a scale of one to ten, I would rate the technical support as a 10 because they resolve many issues for us.
The CrowdStrike team is very efficient; I would rate them ten out of ten.
They could improve by initiating calls for high-priority cases instead of just opening tickets.
Regarding the technical support of Broadcom, they are responsive and helpful.
You can onboard 10,000 endpoints in just hours, which demonstrates the excellent scalability of this product.
Activating the newly purchased licenses is instantaneous, allowing installations without adjustments since it's cloud-based.
Cortex XDR by Palo Alto Networks can be expanded anytime by purchasing another license without any issues related to scalability.
Mac is not supported.
I rate the scalability of Bitdefender GravityZone EDR at a nine because it performs well, but as an advanced technical user, I do not see much detail regarding the breakdowns of the detected malwares.
I would rate the scalability of Bitdefender EDR as nine out of ten.
It has adequate coverage and is easy to deploy.
In terms of scalability, I find CrowdStrike to be stable, and I have not encountered any limitations with it.
There's no scalability limitation from CrowdStrike itself, as it just requires agent deployment.
Cortex remains fast and responsive, even with increasing data and alerts.
The thresholds we've seen on our firewall boxes at some instances reached 80% to 85%, but even at that level of utilization, we don't observe any latency or any issues reported with respect to accessing the application.
Cortex XDR is stable, offering high quality and reliable performance.
If it were not stable, it could lead to inaccuracies in asset management data and increase incident response times if I cannot access the console during ongoing investigations.
I rate the stability and reliability of Bitdefender GravityZone EDR as a ten.
I have never seen instability in the CrowdStrike tool.
We are following N-1 versions across our environment, which is stable.
The biggest issue occurred when every computer worldwide experienced a blue screen.
Improving reporting and dashboard customization, along with the addition of real-time and exportable reports, would help SOC teams greatly.
The inclusion of this feature would allow the application of DLP policies alongside antivirus policies via a single agent and console, making it more competitive as other OEMs often offer DLP solutions as part of their antivirus products.
If the per GB data could be provided at a certain level free of cost or at the same cost which the customer is taking for the entire bundle, that would be better.
The QUIC protocol, which is UDP-based and used by Facebook and WhatsApp, is a common demand from many clients.
I would like to optimize the incident response area as well, especially when comparing my experience with CrowdStrike, which is relatively more responsive and easier to navigate when there are multiple hosts involved.
Bitdefender GravityZone EDR consumes a lot of resources over time; although not initially, we have noticed that some machines use significant memory just to keep Bitdefender GravityZone EDR functions operational.
Simplifying the querying process, such as using double quote queries or directly obtaining logs based on IP addresses or usernames, would be beneficial.
Another concern is CrowdStrike's GUI. It changes annually, making it hard to work and find options.
Threat prevention should be their first priority.
The pricing on SentinelOne is far more reasonable and cheaper than Cortex XDR by Palo Alto Networks.
I would say it is definitely not a cheap product, considering how mature it is and how scalable all Palo Alto products are together.
Cortex XDR is perceived as expensive by some customers, yet offers dynamic pricing.
The cost is reasonable, with the license costing approximately six to eight dollars per user.
For example, the basic plan starts at a certain price per endpoint per year, while advanced plans with more features cost higher.
It is expensive compared to SentinelOne, but as the market leader, it is worth it.
The licensing cost and setup costs are affordable.
It incorporates AI for normal behavior detection, distinguishing unusual operations.
The product provides automation responses in case of a threat attack, severity assessments, centralized manageability, and comprehensive compliance features, resulting in reduced costs.
It includes machine learning to easily analyze data and detect complex threats across endpoints, networks, or clouds.
We have blocked and isolated a lot of malware that could potentially take this data away from us, resulting in no data breaches in the last three years.
Real-time monitoring has helped our organization by providing 24/7 oversight, which is handled by the monitoring team.
The features I find most effective for threat detection include centralized control policy distribution.
I can investigate by accessing the customer's host based on the RTR environment and utilize host search to know details for the past seven days, including logins, processes, file installations, malicious processes, and network connections.
The real-time analytics aspect of CrowdStrike performs well because we get all logs in real-time, with no delay, allowing us to take action immediately.
Being an EDR solution, it helps us identify attacks in real-time.
I assess VMware Carbon Black Endpoint's machine learning capabilities in detecting unknown threats as fantastic.
| Product | Mindshare (%) |
|---|---|
| CrowdStrike Falcon | 7.8% |
| Cortex XDR by Palo Alto Networks | 3.4% |
| Bitdefender GravityZone EDR | 1.8% |
| VMware Carbon Black Endpoint | 1.8% |
| Other | 85.2% |



| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 20 |
| Large Enterprise | 48 |
| Company Size | Count |
|---|---|
| Small Business | 47 |
| Midsize Enterprise | 9 |
| Large Enterprise | 11 |
| Company Size | Count |
|---|---|
| Small Business | 56 |
| Midsize Enterprise | 33 |
| Large Enterprise | 63 |
| Company Size | Count |
|---|---|
| Small Business | 31 |
| Midsize Enterprise | 9 |
| Large Enterprise | 31 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
Bitdefender GravityZone EDR offers rapid deployment and cloud-based control with advanced threat detection and comprehensive device management, ensuring minimal system impact and real-time updates, suitable for those seeking efficient endpoint security management.
This robust solution integrates with the MITRE ATT&CK framework, providing HyperDetect and behavior-based analysis for enhanced threat identification. It facilitates centralized policy administration and seamless integration into networks and endpoints. While its interface is user-friendly, improvements are needed in real-time reporting, ease of uninstallation, and Mac device support. Users benefit from centralized control, enabling efficient client updates and protection across operating systems.
What are the most important features of Bitdefender GravityZone EDR?Bitdefender GravityZone EDR is implemented in industries focused on endpoint protection to prevent malware and ransomware. Its encryption capabilities support compliance goals and managing network integrations. Users employ it for anomaly detection, patch management, and policy enforcement, benefiting from its cloud-based centralized control for client updates and protection across operating systems.
CrowdStrike Falcon provides cutting-edge endpoint detection with automatic alerts, real-time monitoring, and seamless integration capabilities. Cloud-native architecture and AI-driven processes ensure scalable protection and efficient threat remediation.
CrowdStrike Falcon is recognized for its robust EDR and threat intelligence features that enhance security and streamline operations. Its lightweight agent minimizes system impact while offering real-time monitoring and detailed reporting. This platform uses cloud-native architecture for scalable, consistent protection, significantly reducing administrative demands. AI and machine learning empower precise threat hunting and behavioral analysis, which mitigates false positives and boosts cybersecurity efficiency. Users seek improvements in integration with other systems, reporting functions, and compatibility with specific operating systems. While the solution handles malware mitigation and threat response efficiently, suggestions for on-demand scanning, enhanced visibility, and better dashboard features are noted.
What are the key features of CrowdStrike Falcon?In technology sectors, CrowdStrike Falcon commonly supports endpoint protection and threat response initiatives, allowing companies to replace traditional antivirus systems with more advanced solutions. In finance, it secures sensitive data across multiple platforms, ensuring compliance. In healthcare, real-time security analysis protects patient data on critical devices like servers and laptops, utilizing AI to enhance cybersecurity defenses.
VMware Carbon Black Endpoint enhances endpoint security with its robust EDR, threat detection, and live response features. The cloud-based architecture supports remote management and easy setup while behavioral monitoring and dynamic grouping minimize security risks.
VMware Carbon Black Endpoint is designed for those seeking comprehensive endpoint protection. With its cloud-based deployment, organizations experience streamlined remote control and simplified rollout processes. Its behavioral monitoring, incident response capabilities, and firewall integration deliver advanced security measures. Although it addresses many security challenges, areas like manual alert management, on-demand scanning, and integration with systems like AlienVault USM require refinement. Improved UI, EDR components, and flexible pricing models would enhance user satisfaction. On-premise deployment infrastructure and compatibility issues with some operating systems need attention. Enhanced reporting, container security, and multi-tenancy support are also essential for fulfilling industry needs. AI-driven analysis and threat isolation empower companies by fostering proactive management.
What are the key features of VMware Carbon Black Endpoint?
What benefits should users look for when evaluating VMware Carbon Black Endpoint?
VMware Carbon Black Endpoint finds extensive application in industries focused on stringent security requirements. Managed security service providers leverage its capabilities to deliver comprehensive protection to multiple clients worldwide. Organizations use it primarily for antivirus protection and incident management, integrating it with their existing security frameworks to strengthen endpoint visibility and real-time threat prevention. Its advanced detection and application control features make it a preferred choice in industries that prioritize robust security measures. However, it requires improvements in terms of system compatibility and customization flexibility to better serve diverse industry environments.