



Find out what your peers are saying about CrowdStrike, Palo Alto Networks, TrendAI and others in AI-Powered Cybersecurity Platforms.
They appreciate the rich telemetry data from the solution, as it provides in-depth threat identification.
Cortex XDR by Palo Alto Networks helps to reduce my total cost of ownership significantly.
In Cortex XDR by Palo Alto Networks, most of the remediation is automated and the accuracy is quite good.
When I use different Check Point tools, I save support time overall.
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
I would say we can save about 90% of our budget with Check Point Infinity.
The VPN performance has a substantial impact on our remote workforce.
The service generates a low rate of false positives, reducing the overhead of managing false positive events.
The technical support from Palo Alto deserves a mark of ten because they reach out within an hour whenever assistance is needed.
There is no back and forth, and they know what we are asking for and come up with the best resolution for a solution.
If any of these services are missed, it becomes a problem in terms of support tickets, follow-up, or special configuration that needs to be done in the system.
As soon as we raise a ticket, they engage promptly, indicating strong vendor support.
The technical support is excellent with quick response times.
Check Point support is very responsive.
They initiate the troubleshooting process quickly and resolve issues in a timely manner.
In 99% of cases, we do not have to do configurations on our own as they are normally handled by their service providers.
They provide very good support, and an issue I had was resolved quickly over the phone.
There is a lack of SLA adherence, and third-party partners do not provide prompt responses.
We have had some open tickets for months, maybe half a year, and there is no real answer.
The service response times are aligned with standards, responding within a few hours based on the problem's criticality.
You can onboard 10,000 endpoints in just hours, which demonstrates the excellent scalability of this product.
Cortex XDR by Palo Alto Networks can be expanded anytime by purchasing another license without any issues related to scalability.
I think scalability for Cortex XDR by Palo Alto Networks is good.
The Infinity Portal lets us manage on-premises, cloud and edge environments from a single elastic console.
We have not faced any issues with scalability.
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
We normally take into consideration while installing the product that it can scale up to approximately 20%, but not more than that.
Most of our clients are using the free version rather than the paid version due to the high range of maximum users available for the free version.
I hope Fortinet will start an insider developer program where professionals can provide feedback on new releases to ensure improvements.
Wildfire is highly scalable.
Palo Alto Networks WildFire is scalable, and I give it a nine for scalability.
The on-premises version is expensive to scale as it might need an additional device to be installed in the setup.
Cortex remains fast and responsive, even with increasing data and alerts.
The thresholds we've seen on our firewall boxes at some instances reached 80% to 85%, but even at that level of utilization, we don't observe any latency or any issues reported with respect to accessing the application.
Cortex XDR is stable, offering high quality and reliable performance.
Check Point Infinity is a very stable solution; I don't remember experiencing any downtime.
Check Point Infinity is very stable for our company.
Check Point Infinity has achieved a 99.9% block rate on zero-day malware in the 2025 Miercom test.
Its stability level is excellent.
I normally get a call within 15-20 minutes after logging a complaint.
Fortinet FortiClient is a stable product with no glitches or latency issues.
It performs filtering, malware blocking, and scanning.
The solution is scalable and stable.
Improving reporting and dashboard customization, along with the addition of real-time and exportable reports, would help SOC teams greatly.
The inclusion of this feature would allow the application of DLP policies alongside antivirus policies via a single agent and console, making it more competitive as other OEMs often offer DLP solutions as part of their antivirus products.
If the per GB data could be provided at a certain level free of cost or at the same cost which the customer is taking for the entire bundle, that would be better.
A more guided setup process or contextual help within the dashboard would make it easier for new team members to get up to speed.
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
I would improve Check Point Infinity by embedding some sort of analytics that indicates which attacks are coming from specific IP addresses very often so that we can block those IP addresses.
FortiClient needs improvement in restricting user information and ensuring more secure customer data to better protect source code and reduce the risk of security breaches.
There are advanced features like Zero Trust that I currently do not use but could be beneficial for security.
Fortinet frequently releases updates without thorough testing.
It should be easier to establish the Palo Alto Networks WildFire cluster between the devices.
The dashboard should provide better visibility, especially in showing how many files are sent to Wildfire and their findings.
It is a very good product.
The pricing on SentinelOne is far more reasonable and cheaper than Cortex XDR by Palo Alto Networks.
I would say it is definitely not a cheap product, considering how mature it is and how scalable all Palo Alto products are together.
Cortex XDR is perceived as expensive by some customers, yet offers dynamic pricing.
In terms of pricing, I find Check Point Infinity to be an expensive product.
The setup cost or license is very high.
We received a relative discount for this.
FortiClient is a value-for-money product and is not considered expensive compared to similar products on the market.
Justifying the price to clients can be difficult.
FortiClient is included in a package with the UTM features, so there is no separate cost for it.
I would rate it an eight out of ten in terms of affordability.
It incorporates AI for normal behavior detection, distinguishing unusual operations.
The product provides automation responses in case of a threat attack, severity assessments, centralized manageability, and comprehensive compliance features, resulting in reduced costs.
It includes machine learning to easily analyze data and detect complex threats across endpoints, networks, or clouds.
Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
Check Point Infinity has positively impacted my organization by making everything better, including the speed of the network and the security.
We have seen a faster response time and reduced effort from the network and security engineers while going through logs.
The most valuable feature of FortiClient is its high security level.
We appreciate its VPN capabilities and the features that offer extra security functionalities like antivirus and malware scanning.
I strongly recommend this solution, especially for Fortinet customers who use FortiGate or other Fortinet products, as they can easily integrate these features and exchange information seamlessly.
Integrating Palo Alto Networks WildFire with various security protocols similar to a firewall has significantly improved the overall threat detection capabilities in our organization.
The most valuable feature of Wildfire is its sandboxing capability for examining suspicious files or locations.
The integration and working with third-party solutions was very seamless and smooth.
| Product | Mindshare (%) |
|---|---|
| Check Point Infinity | 2.8% |
| CrowdStrike Falcon | 17.1% |
| Darktrace | 14.1% |
| Other | 66.0% |
| Product | Mindshare (%) |
|---|---|
| Fortinet FortiClient | 1.8% |
| Microsoft Defender for Endpoint | 7.8% |
| CrowdStrike Falcon | 6.6% |
| Other | 83.8% |
| Product | Mindshare (%) |
|---|---|
| Palo Alto Networks WildFire | 7.5% |
| Microsoft Defender for Office 365 | 7.6% |
| Microsoft Defender for Endpoint | 5.5% |
| Other | 79.4% |


| Company Size | Count |
|---|---|
| Small Business | 44 |
| Midsize Enterprise | 20 |
| Large Enterprise | 48 |
| Company Size | Count |
|---|---|
| Small Business | 40 |
| Midsize Enterprise | 9 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 59 |
| Midsize Enterprise | 23 |
| Large Enterprise | 25 |
| Company Size | Count |
|---|---|
| Small Business | 37 |
| Midsize Enterprise | 16 |
| Large Enterprise | 29 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
FortiClient is a fabric agent that delivers endpoint protection, endpoint compliance, and secure access in a single, lightweight, lightweight client, providing visibility, information, and control to your endpoints. In addition, it enables secure, remote connectivity to the security fabric. It also integrates network and endpoint with segmentation and automation. FortiClient enables unified endpoint awareness by sharing endpoint telemetry with the security fabric. It is compatible with third-party EDR (endpoint detection and response and anti-malware solutions.
The FortiClient fabric agent can:
• Report on the status of a device, including firmware version and applications running.
• Send all suspicious files to a fabric sandbox.
• Enforce USB control, application control, URL filtering, and firmware upgrade policies.
• Provide application firewall service and malware protection.
• Enable devices to connect securely to the security fabric over either ZTNA tunnels or VPN (IPsec or SSL), both encrypted. The connection to the security fabric can be either a SASE service or a FortiGate next-generation firewall.
You can purchase FortiClient with one of three levels of capability:
Zero Trust security - The ZTNA edition enables both VPN and ZTNA encrypted tunnels, as well as USB device control and URL filtering.
Endpoint security - The EPP/APT edition adds AI-based NGAV (next-generation antivirus), application firewall, endpoint quarantine, and support for cloud sandbox.
Cloud-based endpoint security
Benefits and Features
• Fabric agent leverages integrations and provides telemetry information to the rest of the Fortinet security fabric.
• SAAS control and web/content filtering
• Dynamic access control helps with automation and simplifies compliance.
• Software inventory management enables visibility as well as management of licenses.
• Automated response detects and isolates any endpoints that may be compromised.
• ZTNA delivers better remote access and consistent application access policies
• Managed endpoint security services remotely assist with setup, configuration, deployment, vulnerability monitoring, and overall monitoring of endpoint security.
Reviews from Real Users:
PeerSpot users like that FortiClient is easy to use and integrates well with other solutions. They also appreciate the richness of its features and find it to be inexpensive in comparison to other products that require separate purchases for separate features.
Palo Alto Networks WildFire is a highly effective cloud-based advanced threat protection (ATP) solution that organizations in a wide variety of fields trust to help them keep safe from digital threats. It is designed to enable businesses to confront even the most evasive threats and resolve them. It combines many techniques to maximize the level of threat protection available to users.
Palo Alto Networks WildFire Benefits
Some of the ways that organizations can benefit by choosing to deploy WildFire include:
Proactive real-time threat prevention. Organizations that utilize WildFire can take a proactive approach to their network security. Wildfire’s security scanning software is supported by powerful automation that enables it to run 180 times faster than other similar solutions. It also leverages machine learning to spot and address two times more malware monthly than its competitors. Users can solve issues as they arise, which prevents them from suffering severe harm.
A holistic approach to security. WildFire leverages many of the security features and characteristics that can be found in some of the most effective security solutions in a way that provides users with a powerful protective blanket. It combines such things as machine learning, dynamic and static analysis, and a custom-built analysis environment, and enables users to cover many different potential avenues of attack. In this way, organizations can easily detect and prevent even the most sophisticated threats from harming them.
Reduce overhead costs. Using WildFire cuts the expenses that a business incurs. Its architecture is based in the cloud and, as a result, users do not have to purchase hardware to run it. Additionally, those users do not have to pay anything more than a product subscription fee. They can scale it up as they wish and incur no additional costs.
Palo Alto Networks WildFire Features
Some of the many features WildFire offers include:
Third-party integrations. WildFire gives users access to integrations that can enable them to combine Wildfire’s security suite with outside tools. If an organization thinks that they are missing something, they can easily use Wildfire’s third-party integrations to bolster their capabilities. These integrations can connect to many different types of tools, like security information or event management systems.
URL filtering. Organizations can use a URL filtering feature to safeguard themselves against known threats. When this feature is active, it will scan for traffic coming from specific URLs that are known to be malicious. This keeps them one step ahead of those threats that they know about.
Deep analytics. Wildfire comes with the ability to provide users with a detailed analysis of any threat that it finds across all of their network environments. It gives users insight into everything from their natures to the actions that they have performed.
Reviews from Real Users
WildFire is a solution that stands out when compared to its primary competitors. Two major advantages that it offers are the high speeds at which it can analyze network traffic for threats and the accuracy with which it can pick out genuine threats from false positives.
Ahmad Z., the principal consultant at Securelytics, writes, “The analysis is very fast. The intermittent is a millisecond and has a speedy response time.”
Christopher B., the senior systems administrator at a government agency, says, “It gives a more accurate assessment of a virus in terms of whether it's truly a virus, malware, or a false positive. We have some legacy software that could pop up as being something that is malware. WildFire goes through and inspects it, and then it comes back and lets us know if it's a false positive. Usually, when it finds out that it's not a virus, it lets us know that it's benign, and it can exclude it from that scan, which means I don't even have to worry about that one popping up anymore.”