



Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP).
They appreciate the rich telemetry data from the solution, as it provides in-depth threat identification.
Cortex XDR by Palo Alto Networks helps to reduce my total cost of ownership significantly.
In Cortex XDR by Palo Alto Networks, most of the remediation is automated and the accuracy is quite good.
The technical support from Palo Alto deserves a mark of ten because they reach out within an hour whenever assistance is needed.
There is no back and forth, and they know what we are asking for and come up with the best resolution for a solution.
If any of these services are missed, it becomes a problem in terms of support tickets, follow-up, or special configuration that needs to be done in the system.
Cisco has good technical support, especially considering these are newer solutions compared to traditional routing and switching products.
Improvements could be made in response time or quality as all of them can be rated a seven.
They are very responsive and very good.
You can onboard 10,000 endpoints in just hours, which demonstrates the excellent scalability of this product.
Activating the newly purchased licenses is instantaneous, allowing installations without adjustments since it's cloud-based.
Cortex XDR by Palo Alto Networks can be expanded anytime by purchasing another license without any issues related to scalability.
Cisco Secure Endpoint is definitely scalable.
Cortex remains fast and responsive, even with increasing data and alerts.
The thresholds we've seen on our firewall boxes at some instances reached 80% to 85%, but even at that level of utilization, we don't observe any latency or any issues reported with respect to accessing the application.
Cortex XDR is stable, offering high quality and reliable performance.
We have not encountered any problems.
Sometimes there are some issues in the product itself; whenever they release a new version, vulnerabilities come into the picture, and we need to update the product to mitigate such issues.
Improving reporting and dashboard customization, along with the addition of real-time and exportable reports, would help SOC teams greatly.
The inclusion of this feature would allow the application of DLP policies alongside antivirus policies via a single agent and console, making it more competitive as other OEMs often offer DLP solutions as part of their antivirus products.
If the per GB data could be provided at a certain level free of cost or at the same cost which the customer is taking for the entire bundle, that would be better.
The forensic capabilities need enhancement, especially for deep forensic data collection.
Sometimes there are some issues in the product itself; whenever they release a new version, vulnerabilities come into the picture, and we need to update the product to mitigate such issues.
I see enhancement in reporting for McAfee Total Protection for Data Loss Prevention as a potential area of improvement to think from a data asset perspective, not from a policy perspective, and do more analysis regarding the user's perspective rather than the policy's perspective.
I recommend Microsoft BitLocker for people who do not have the money for other solutions, such as Kaspersky.
The system requires secure boot to function properly.
The pricing on SentinelOne is far more reasonable and cheaper than Cortex XDR by Palo Alto Networks.
I would say it is definitely not a cheap product, considering how mature it is and how scalable all Palo Alto products are together.
Cortex XDR is perceived as expensive by some customers, yet offers dynamic pricing.
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdStrike, Microsoft Defender, or SentinelOne.
I rate the pricing for McAfee as competitive compared to other companies; they are in the same range, not a cheap product and not an expensive product.
I think the price for Microsoft BitLocker is very good based on our experience with our customers.
It incorporates AI for normal behavior detection, distinguishing unusual operations.
The product provides automation responses in case of a threat attack, severity assessments, centralized manageability, and comprehensive compliance features, resulting in reduced costs.
It includes machine learning to easily analyze data and detect complex threats across endpoints, networks, or clouds.
Cisco Secure Endpoint is very good in machine learning, which allows it to secure offline contents even if not connected to the internet.
We are just restricting data to be uploaded, which is the best option that allows us to control organizational data, making it the biggest benefit for us in McAfee Total Protection for Data Loss Prevention.
I find unique value in McAfee Total Protection for Data Loss Prevention specifically in controlling the application from a DLP perspective; when a computer downloads a package, you can understand where it downloaded this package from, and you can create a policy regarding the source of the download.
Since BIOS updates are necessary periodically, it is crucial that whoever implements Microsoft BitLocker knows how to recover the key, especially when dealing with important devices such as a CEO's laptop.
When a user asks for a recovery key, it consists of 32 numbers to unlock their PC.
| Product | Mindshare (%) |
|---|---|
| Cisco Secure Endpoint | 1.3% |
| Microsoft Defender for Endpoint | 7.2% |
| CrowdStrike Falcon | 6.3% |
| Other | 85.2% |
| Product | Mindshare (%) |
|---|---|
| McAfee Total Protection for Data Loss Prevention | 1.0% |
| Microsoft Purview Data Loss Prevention | 6.9% |
| Cyera | 5.3% |
| Other | 86.8% |
| Product | Mindshare (%) |
|---|---|
| Microsoft BitLocker | 17.8% |
| ESET Endpoint Encryption | 8.0% |
| Symantec Endpoint Encryption | 7.9% |
| Other | 66.3% |



| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 20 |
| Large Enterprise | 48 |
| Company Size | Count |
|---|---|
| Small Business | 21 |
| Midsize Enterprise | 14 |
| Large Enterprise | 21 |
| Company Size | Count |
|---|---|
| Small Business | 18 |
| Midsize Enterprise | 4 |
| Large Enterprise | 8 |
| Company Size | Count |
|---|---|
| Small Business | 35 |
| Midsize Enterprise | 10 |
| Large Enterprise | 25 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
Cisco Secure Endpoint offers robust endpoint security with real-time threat prevention and cloud-based management. It is designed for seamless integration with Cisco products, delivering comprehensive protection and ease of use.
Cisco Secure Endpoint provides real-time threat detection, analytics, and rapid response capabilities. Its ease of use, integrated features like sandboxing and Device and File Trajectory, and its incorporation with Talos make it effective for threat hunting and endpoint protection. With strong machine learning and seamless integration with other tools, it addresses threat prevention and network visibility. However, there is room for improvement in AI features, SIEM API integration, user interface simplification, and cost reduction. Enhanced dashboards, reporting, and support are also areas for potential enhancement.
What are the primary features of Cisco Secure Endpoint?In industries such as finance, healthcare, and manufacturing, Cisco Secure Endpoint is vital for maintaining endpoint security and malware protection. Organizations use it within managed security services, integrating with tools like Umbrella for DNS security. It provides visibility into malware activities and supports threat hunting for devices beyond corporate networks. Deployed on workstations, servers, and laptops, it efficiently logs and blocks malicious actions, ensuring a secure environment.
McAfee Total Protection for Data Loss Prevention provides comprehensive security through robust data loss prevention, USB control, and endpoint protection. It is valued for its stability, scalability, and ease of management, offering significant policy customization and integration capabilities.
McAfee Total Protection for Data Loss Prevention addresses compliance issues, human error, and unauthorized data sharing. It integrates well with ePO, offering virtual desktop security and affordability, which contributes to comprehensive threat monitoring. While praised for its stability, it faces challenges with pricing, resource consumption, and UI complexity. Users report slow customer support and desire advanced AI features, enhanced protection against sophisticated attacks, and better policy flexibility.
What are the key features of McAfee Total Protection for Data Loss Prevention?Organizations deploy McAfee Total Protection for Data Loss Prevention to secure sensitive data, prevent unauthorized leaks, and improve endpoint protection. It is commonly used by banks, consulting firms, and service providers for monitoring, controlling data flows, enforcing security policies, encrypting data, and ensuring compliance, often integrating into existing infrastructures to protect against external threats while maintaining internal data integrity.
Microsoft BitLocker provides full-disk encryption, integrating seamlessly with Windows security features for enhanced data protection. Its deployment across diverse hardware ensures secure encryption, making it a reliable choice for businesses prioritizing data security.
BitLocker offers robust disk encryption capabilities, appealing to organizations needing secure data protection. While it integrates well with System Center Configuration Manager and uses TPM for added security, areas like slow encryption and setup complexity require improvement. Despite these challenges, BitLocker's ability to encrypt internal, external drives and provide secure storage for recovery keys positions it as an effective tool for protecting endpoints and ensuring the safety of data on potentially lost devices.
What are Microsoft BitLocker’s key features?Many industries deploy Microsoft BitLocker for endpoint security, encrypting devices ranging from legacy systems to modern laptops. Centralized key management through Active Directory or leveraging TPM is common, allowing organizations to secure data efficiently. Companies implement it to protect sensitive information on devices used in transit, ensuring robust management of data both onsite and offsite.