Cortex XDR by Palo Alto Networks and Check Point Infinity are advanced security solutions competing in the cybersecurity category. Cortex XDR appears to have the upper hand due to its advanced detection capabilities and feature set, making it appealing to organizations focused on minimizing operational disruptions.
Features: Cortex XDR offers comprehensive endpoint security with features such as WildFire for threat detection and behavior-based detection. It integrates well with firewalls, providing multiple protection layers using AI. Check Point Infinity is known for its unified security architecture supporting Zero Trust principles, offering granular policy enforcement, and effectively integrating various components.
Room for Improvement: Cortex XDR could improve its reporting capabilities, better integrate with third-party solutions, and address functionality gaps between versions. Some users wish for easier malware removal and refined false-positive management. Check Point Infinity struggles with clarity in licensing, outdated documentation, and scalability issues impacting usability and support responsiveness, requiring enhancements in technical guides and licensing models.
Ease of Deployment and Customer Service: Cortex XDR supports various deployment models, including strong public cloud options. However, technical support feedback is mixed regarding responsiveness. Check Point Infinity is appreciated for its robust hybrid cloud deployment options and generally well-regarded customer service, though an increase in technical support efficiency could further improve user experiences.
Pricing and ROI: Both Cortex XDR and Check Point Infinity are premium solutions. Cortex XDR is considered higher in cost, justified by its advanced features and breach prevention effectiveness, providing peace of mind. Check Point Infinity is seen as cost-effective given its comprehensive approach, with some concerns about licensing fees. Both emphasize strong ROI through reduced security incidents and efficient resource use.
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
They appreciate the rich telemetry data from the solution, as it provides in-depth threat identification.
The technical support is excellent with quick response times.
As soon as we raise a ticket, they engage promptly, indicating strong vendor support.
Their support is efficient and responsive whenever I raise a ticket through my portal.
Every vendor has similar support; it depends on how the case is handled and raised.
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
Cortex XDR is stable, offering high quality and reliable performance.
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
If Check Point continues reforms of AI and takes more information from different origins, not only from its database but also from other brands, it can complete this information and make it stronger.
The inclusion of this feature would allow the application of DLP policies alongside antivirus policies via a single agent and console, making it more competitive as other OEMs often offer DLP solutions as part of their antivirus products.
Cortex XDR could improve its sales support team, including better commission structures and referral programs.
The pricing is good as Check Point Infinity includes many tools and details that others might not have.
The product, as supported by Check Point, offers invaluable assistance for ease of deployment.
Cortex XDR is perceived as expensive by some customers, yet offers dynamic pricing.
Compared to competitors such as CrowdStrike and Sophos, the pricing of Cortex XDR by Palo Alto Networks is similar to CrowdStrike but more expensive than Sophos.
Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
Check Point Infinity offers a multi-layered security approach that enhances our IT security environment.
It incorporates AI for normal behavior detection, distinguishing unusual operations.
The product provides automation responses in case of a threat attack, severity assessments, centralized manageability, and comprehensive compliance features, resulting in reduced costs.
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
Cortex XDR by Palo Alto Networks delivers comprehensive endpoint security, integrating well with other systems to offer robust threat detection and real-time protection through AI-driven analytics.
Cortex XDR by Palo Alto Networks offers advanced endpoint protection and threat detection through AI and behavior-based analytics. Its user-friendly design simplifies integration with firewalls, delivering multi-layered protection with low resource consumption. Valued for policy management, USB control, and incident correlation, Cortex XDR enhances threat management and real-time threat hunting capabilities. However, users note challenges with third-party integration, reporting, and dashboard automation. Agent performance across operating systems and memory consumption are areas for improvement, alongside reducing false positives and simplifying endpoint management and setup.
What features does Cortex XDR offer?Cortex XDR is crucial in industries requiring robust endpoint protection, such as finance, healthcare, and technology. It supports malware detection, behavioral analysis, and ransomware mitigation across endpoints, including remote work environments, providing comprehensive threat visibility and security policy management. The solution's integration with firewalls and specialized industry requirements enhances security posture in diverse operational settings.
We monitor all AI-Powered Cybersecurity Platforms reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.