Try our new research platform with insights from 80,000+ expert users

Comodo MDR vs Fidelis Elevate comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Comodo MDR
Ranking in Managed Detection and Response (MDR)
42nd
Average Rating
10.0
Reviews Sentiment
6.8
Number of Reviews
3
Ranking in other categories
No ranking in other categories
Fidelis Elevate
Ranking in Managed Detection and Response (MDR)
33rd
Average Rating
8.4
Reviews Sentiment
7.2
Number of Reviews
7
Ranking in other categories
Endpoint Detection and Response (EDR) (59th), Threat Deception Platforms (9th), SSL/TLS Decryption (4th), Network Detection and Response (NDR) (22nd), Extended Detection and Response (XDR) (37th)
 

Mindshare comparison

As of January 2026, in the Managed Detection and Response (MDR) category, the mindshare of Comodo MDR is 0.6%, up from 0.2% compared to the previous year. The mindshare of Fidelis Elevate is 1.0%, up from 0.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Managed Detection and Response (MDR) Market Share Distribution
ProductMarket Share (%)
Fidelis Elevate1.0%
Comodo MDR0.6%
Other98.4%
Managed Detection and Response (MDR)
 

Featured Reviews

Navin Mohinani - PeerSpot reviewer
CEO at Forte IT Solutions
Have faced integration challenges but continue to benefit from strong security and proactive response features
The biggest advantage of the product, as I see it as a reseller, is its security and reporting. The automated incident response feature in Comodo MDR works fantastic. When customers install custom tailor-made software which is not recognized by Comodo MDR endpoint detection response tool, it runs in an isolated environment, virtual environment, sandbox environment. If it determines that this software is not secure, not verified, or not approved by system admin, it blocks the software immediately. The software will not run, and it sends a report to the admin email instantly. If there is any issue with the software or if any incident such as a malware attack or ransomware attack is happening, or something is trying to make changes to the system files, it immediately blocks the software tool and reports back to the admin. As a reseller partner and secondary admin for the customers, my team and I directly receive a mail, and we take control of that machine. It even blocks complete network access to that machine. On the hardware side, if there is a hard disk full or RAM 90% usage or CPU 90% usage or any of these incidents, we set up an alert notification option for it. The moment these incidents occur, it sends an alert so we can recommend customers upgrade their hardware or check if there is any malfunctioning software consuming too much RAM and CPU. This incident response use case helps us keep customer machines' performance to the maximum. The 24/7 monitoring capability supports a lot in contributing to our cybersecurity strategy. It is very much compatible with our goal.
Mostafa Ameen - PeerSpot reviewer
Information Security Engineer at ICT Misr
Advanced threat detection capabilities with comprehensive incident response features providing robust cybersecurity for organizations
The initial aspect concerns two engines. The first one mentioned is available for searching behaviors directly. The second engine involves the Google Ade tool, which operates on the machine. The challenge arises when attempting to rectify protection rules, causing confusion. It would be beneficial to enhance Rigixs Query. I encounter difficulty removing certain entries in behavior or alerts; likewise, I am unable to add specific calls.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The product is fairly new compared to others like Trend Micro or Symantec. However, it offers sophisticated features, especially in scanning and analyzing activities on workstations or servers. It can prevent malicious operations from spreading to other applications or the network. This feature is particularly effective because it operates at the IO level, unlike behavior or signature analysis used by other products. It contains threats and alerts administrators about whether they are false positives or real threats that need immediate action or support recommendations."
"The automated incident response feature in Comodo MDR works fantastic; when customers install custom tailor-made software which is not recognized by Comodo MDR, it runs in an isolated environment, and if it determines the software is not secure, it blocks it immediately and sends a report to the admin."
"One of the most valuable features is its around-the-clock, 365-day-a-year online technical support."
"It has a rating system now so you can rate things up or down, depending on your environment. This means alerting can be customized, yet still pick up anomalies."
"Reporting is great, it is easy to do a quick search through 45 days of data for something of interest."
"The initial setup is very straightforward. The deployment of the server doesn't take so long; about a day or two max."
"There are many valuable features. The NDR gives very good network visibility, and the endpoint module has a great feature called "Live Connect" for remote connections. They also have "Tasks" that can be run on endpoints to gather specific information or retrieve logs."
"It has also improved our hunt ability with quick search tools, to zone in on malware or other anomalies. It is able to link items to incidents from other consoles, and works natively with the SIEM."
"Compared to similar solutions, it's quite scalable. You just need to add more storage to scale-up."
"It ensures the stability of network behavior across various aspects of our network and offers responsive capabilities to address incidents promptly"
"After rack and stack, devices were up and running base configurations within two hours. As with any IPS, tuning is required to stop false positives. This is no different, but the ease of use of the interface allowed my team to start making adjustments within a few hours."
 

Cons

"Users pay $60 per user per year, and in case there is an issue, support tickets take nearly three days or sometimes even more for a clear resolution or an answer."
"They should consider adopting the desktop version as a solution."
"I think having a higher level of MDR would be beneficial, although it's quite expensive. This would involve not just monitoring the network but also taking actions to stop and detect threats. We haven't implemented this yet, but we're considering it for our organization's plans."
"Configuration, in terms of building the collector and communicating with endpoints, is complex."
"The interface bug needs to be squashed once and for all. This has been the predominant issue with an otherwise stellar product. It reboots itself unscheduled, about once a month, due to a memory buffer flaw in the interface."
"There is room for improvement in email security. It's a security issue. If you're aiming for XDR, covering the entire threat landscape is crucial."
"We position the solution as an antivirus, but this part of the solution needs improvement. They need to generally enhance the features that they have, rather than adding anything new."
"I encounter difficulty removing certain entries in behavior or alerts; likewise, I am unable to add specific calls."
"The reports in the endpoint area of Elevate can be improved."
"Fidelis Endpoint is an expensive product making it one of its shortcomings that needs improvement."
 

Pricing and Cost Advice

"The tool's pricing is high compared to other products. If you want to target a certain quantity, it should provide discounts to enterprises."
"The pricing falls within the moderate range."
"It's quite expensive but we can customize it to reduce the price."
"You license by the number of days of logs you need to maintain visibility for. Forty-five days is a good solid number for a company with around a 10k user base."
"Fidelis Endpoint is an expensive product. My company makes yearly payments toward the licensing cost of the solution."
"It's somehow expensive. From one to ten, I would rate it a five. They need to improve the prices. It's very high."
report
Use our free recommendation engine to learn which Managed Detection and Response (MDR) solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Computer Software Company
12%
Financial Services Firm
11%
Manufacturing Company
10%
Government
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business6
Large Enterprise2
 

Questions from the Community

What is your experience regarding pricing and costs for Comodo MDR?
The tool's pricing is high compared to other products. If you want to target a certain quantity, it should provide discounts to enterprises.
What needs improvement with Comodo MDR?
Areas for improvement are mainly on the software side. They are trying to integrate some functionalities, but their API integration with some CRM and invoicing tools is not appropriate or 100% comp...
What is your primary use case for Comodo MDR?
The major use case for the product is mainly for endpoint security and endpoint management.
Ask a question
Earn 20 points
 

Also Known As

Comodo Managed Detection and Response
Fidelis Elevate Platform, Fidelis Enterprise, Fidelis Cloud, Fidelis Managed Detection and Response, Fidelis Deception, Fidelis Decryption, Fidelis Endpoint, Fidelis Network
 

Overview

 

Sample Customers

Information Not Available
First Midwest Bank
Find out what your peers are saying about Comodo MDR vs. Fidelis Elevate and other solutions. Updated: January 2026.
881,082 professionals have used our research since 2012.