


Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP).
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 3.6% |
| Comodo Internet Security for Business | 0.3% |
| Veritas Desktop and Laptop Option | 0.2% |
| Other | 95.9% |

| Company Size | Count |
|---|---|
| Small Business | 47 |
| Midsize Enterprise | 20 |
| Large Enterprise | 51 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
Comodo Internet Security for Business is used to safeguard against malware, viruses, and cyber threats. It offers robust protection, easy deployment, and security policy management.
Businesses use Comodo Internet Security for Business for its effective firewall, real-time monitoring, and comprehensive threat detection capabilities, which ensure that networks stay secure. Features like remote management and customizable settings cater to unique security needs, making it essential for maintaining a secure IT environment. Users appreciate its robust malware detection, customizable firewall settings, and user-friendly management console. Highlights include automatic updates, detailed reports, and endpoint protection. Users value the ease of deployment and efficient technical support.
What are the most important features?Many industries implement Comodo Internet Security for Business to maintain robust protection against cyber threats. It is particularly beneficial for companies with extensive networks and those requiring strict security policy management, such as finance, healthcare, and IT services. Customizable settings and remote management features help meet specific industry needs and regulatory requirements. Some note its complexities in installation and configuration, with opportunities for better platform integration and detailed documentation.
Veritas Desktop and Laptop Option is utilized for automated data backup, ensuring critical files are securely stored with reliable performance in protecting data from potential loss due to device failure or accidents.
Users of Veritas Desktop and Laptop Option find it reliable for data backup with easy deployment across multiple devices. It integrates seamlessly with existing systems and offers centralized management, ensuring consistent backups. This tool is highly valued for its capability to store and retrieve data efficiently while maintaining data integrity. Users also note the flexible scheduling options, robust security features, minimal system impact during operation, and detailed reporting. High levels of support further enhance user experience, though there are suggestions for faster customer support response times and improved performance with large data sets.
What are the key features of Veritas Desktop and Laptop Option?Veritas Desktop and Laptop Option is employed in various industries to ensure critical data backup and security. Educational institutions rely on it to protect academic records and research data. Healthcare providers use it to safeguard patient information and comply with regulations. Financial organizations depend on it to secure transaction records and sensitive data, while law firms use it to protect confidential client information. Its versatility and robust features make it suitable for any industry where data integrity and security are paramount.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.