No more typing reviews! Try our Samantha, our new voice AI agent.

Corelight Open NDR vs Cynet comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Apr 22, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
110
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Endpoint Detection and Response (EDR) (6th), Extended Detection and Response (XDR) (5th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (1st)
Corelight Open NDR
Average Rating
8.8
Reviews Sentiment
7.6
Number of Reviews
7
Ranking in other categories
Network Traffic Analysis (NTA) (3rd), Network Detection and Response (NDR) (7th)
Cynet
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
45
Ranking in other categories
Security Information and Event Management (SIEM) (21st), Endpoint Protection Platform (EPP) (18th), User Entity Behavior Analytics (UEBA) (7th), Endpoint Detection and Response (EDR) (18th), Threat Deception Platforms (2nd), Network Detection and Response (NDR) (9th), Extended Detection and Response (XDR) (13th), Ransomware Protection (4th)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
reviewer2834367 - PeerSpot reviewer
Growth And Strategy Lead at a computer software company with 51-200 employees
Network visibility has transformed how we detect nation state threats and protect critical industry
Before Corelight recently started pushing some of the agentic features, querying at times could be a little difficult, depending on your mastery of log scale. However, I think with a lot of the artificial intelligence that they are building in, it is getting a lot easier to query in the platform. I would definitely encourage them to continue down that path where anybody can hop into the platform and start running queries, whether it is a simple instruction like I want this, and an artificial intelligence process can actually build the query and do it. I think that would be super powerful. Cyber skill sets are in high demand, and there is a huge backlog in cyber talent. We cannot fill all the positions we need. The easier we can make these cyber systems for people to pick up and be effective on, I think is really key. Explainability of data is hyper important. In the past few artificial intelligence related updates we have gotten from Corelight, that has been one of the first questions our team has asked every time or that I have asked: show me what the model is doing, show me how it came to this analysis. Within Investigator platform, they are able to walk through and see exactly what data the artificial intelligence pulled from where and why it did what it did as far as making its suggestions. They have definitely built their system with artificial intelligence in mind up front, and having that openness as one of the key features of any of their artificial intelligence and machine learning processes in the platform is important. The issue with black boxes is obviously hallucinations from artificial intelligence and just not being able to trace to ground truth. When we are talking about these cyber incidents and being able to do forensics, you need to be able to pinpoint and tie everything together, and black boxes really obscure that and prevent you from doing so. Corelight has done a really good job of making sure that everything is explainable and everything is mapped when it comes to leveraging any of their artificial intelligence features.
Roshan Jadhav - PeerSpot reviewer
Technical Consultant at Vincacyber
Has improved threat detection and streamlined incident analysis through centralized control and AI-driven insights
People are looking for Cynet because it has next-generation threat protection that detects zero-day threats. It has UEBA (user entity behavior analysis), threat hunting features, and storage device control where we can create profiles and block unauthorized USB storage devices. We can also create threat protection policies to detect malware, ransomware, and many other threats. The most valuable feature is the UBA (User behavior analysis). It has integration with SIEM solutions, allowing us to share our logs to third-party SIEM servers. Cynet has AI integration which showcases complete forensic data about threats, making it very easy to understand what happened with the system and what type of incident was detected. Autonomous breach protection is a feature of Cynet which can detect and mitigate known and unknown threats based on signatures. If there are any signature-less files, malware, or ransomware, it will detect them based on autonomous breach protection capabilities. The centralized management console provides a dashboard where we can see four types of attack vectors and incident counts in real-time. It continuously scans the radar and shows open alerts related to files, hosts, users, or networks. We can easily export these alerts and send reports via email.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Best solution for avoiding security breaches, malware attacks, and other kinds of security issues."
"The most valuable feature of Cortex XDR by Palo Alto Networks is its machine-learning capabilities. Additionally, there is full integration with other solutions."
"The multi-layered approach to the product gives you confidence that it will stop exploits, ransomware, worms, or viruses from compromising endpoints, essentially providing peace of mind."
"The most valuable feature of Cortex XDR by Palo Alto Networks is the low consumption of system resources. The solution uses a lot of AI and machine learning."
"The protection offered by this product is good, as is the endpoint reporting."
"Stability is a primary factor, and then there's the ease of distribution and policy management; Cortex XDR by Palo Alto Networks is very easy to work with, and we're quite happy with them."
"The solution allows us to gain remote access without the user's knowledge and take the necessary actions on the device."
"The initial setup is pretty easy."
"Corelight makes much easier the remediation of cyber attacks; instead of facing a chaotic amount of logs, Corelight provides correlated metrics that allow pivoting to find, in seconds, all the data related to an alert, detection, or asset."
"The most valuable feature is the embedded IDS from Suricata."
"It is easy to deploy and easy to handle."
"It's easy to create additional dashboards specific to supporting specific tasks."
"Corelight Open NDR has had a positive impact on my company, providing visibility as the Suricata engine can scan huge volumes of traffic, including north-south and east-west, revealing signatures and exposures I was not expecting and enabling me to catch them with Suricata alerts."
"Technical support seems to be good."
"It is easy to deploy and easy to handle."
"Corelight is easy to use."
"Advanced detection and protection against ransomware paired with SOC monitoring are the most valuable features. They have 24/7 SOC monitoring and file activity. It is a very robust tool."
"Cynet's most valuable features are laptop and server performance, internal network monitoring, and external firewall lock management."
"As a reseller, I believe the best functions in Cynet's product are the lightweight agent and good detection performance."
"We have definitely seen an ROI because we have very sensitive information, and we never had any viruses."
"I like that it is possible to use the solution to check more information about the users' devices."
"It is quite stable. I would rate the stability of the solution a nine out of ten."
"The feature I find most valuable is the reality graphical user interface, which I think is really different from the others on the market."
"The solution provided an immediate return on investment; we've stopped several cyberattacks within hours, and we stopped one ongoing cyberattack within one day of deploying to a new client."
 

Cons

"Cortex XDR could improve its sales support team, including better commission structures and referral programs."
"While using Cortex, I noticed some aspects that could be improved, such as increasing the synchronization speed between XDR and Xnor."
"It would be good to have a better way to search for a file within the UI."
"I think sometimes Cortex XDR agent automatically stops event capturing from the device, and then even the dashboard does not get any notifications from the agent."
"Cortex XDR is trickier to configure than other Palo Alto products. This is one area where we are not so satisfied."
"Every 30 or 40 days, there's a new version and we need to go and make sure our customer's laptops are upgraded."
"The solution should force customers to integrate with network traffic to see the full benefits of XDR."
"Managing the product should be easier."
"They can enhance the interface of the product. They can make it more interactive and also easier to use for feature access."
"Machine learning could be a good improvement, but it's very costly."
"Corelight hasn’t added features in a long time."
"It's an expensive solution and the price could be reduced."
"In the next release, building a graphical user interface would be helpful."
"They can enhance the interface of the product. They can make it more interactive and also easier to use for feature access."
"Machine learning could be a good improvement, but it's very costly."
"Before Corelight recently started pushing some of the agentic features, querying at times could be a little difficult, depending on your mastery of log scale."
"Their support for issues related to the portal or feature problems isn't great."
"One client said that they faced an issue with Cynet's vulnerability assessment feature."
"The solution just needs to keep maturing and they need to keep up with the threat landscape to ensure they're protecting clients well as time passes."
"Automation could be improved, and orchestration could be added to the features."
"Functions-wise, at present the times for events are not a user's local time, but we assume that will be corrected soon."
"Their deployment needs some work, especially with integration with remote monitoring management systems like Datto AutoTask or ConnectWise Automate."
"Having a DLP feature would add value"
"The only downside of Cynet is the reporting."
 

Pricing and Cost Advice

"The pricing is okay, although direct support can be expensive."
"In terms of the cost Cortex XDR by Palo Alto Networks is very expensive because we are a Mexican company and when you translate dollars to pesos the cost is very high. The solution is very expensive for Mexican companies. I understand that they have international prices, but I do not think it offsets the price enough for many companies in countries, such as Mexico. The amount it is reduced is not a massive percentage."
"I feel it is fairly priced."
"It's the most expensive solution, but features-wise, it's quite strong. It's very good for protection, so the results are very good in the case of protection. I would rate it a two out of ten in terms of pricing."
"It has a yearly renewal."
"It is present, but when compared to other competitive products, I would say it is not less expensive; however, when all of the other added values are considered, the price is reasonable."
"Compared to CrowdStrike, Cortex XDR is an expensive solution."
"The tool's price is moderate."
"It's a yearly fee and depends on what you are looking for."
"Pricing wise, Cynet seems to be very competitive. The cost is probably lower than that offered by many of its competitors for all the functions and features it offers."
"Cynet is cheap."
"It is extremely affordable. I'll give it a five out of five in terms of price. It was half the cost of the next closest competitor, and the competitor didn't provide SOC services."
"It gives you a high level of protection at a very good price."
"Cynet has a pay-as-you-go pricing model."
"I don't have specific information about integration capabilities or licensing costs."
"There is an extra cost if you want the support of Cynet."
"Cynet is very affordable."
report
Use our free recommendation engine to learn which Network Detection and Response (NDR) solutions are best for your needs.
894,738 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Construction Company
12%
Comms Service Provider
9%
Manufacturing Company
8%
Financial Services Firm
12%
Government
12%
Computer Software Company
8%
Real Estate/Law Firm
8%
Manufacturing Company
10%
Financial Services Firm
10%
Comms Service Provider
9%
Computer Software Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business46
Midsize Enterprise20
Large Enterprise49
By reviewers
Company SizeCount
Small Business4
Midsize Enterprise2
Large Enterprise1
By reviewers
Company SizeCount
Small Business30
Midsize Enterprise7
Large Enterprise12
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
Ask a question
Earn 20 points
When evaluating User Activity Monitoring, what aspect do you think is the most important to look for?
The support team that stands behind the detection and response. Is there adequate expertise and are they behind you ...
What is your experience regarding pricing and costs for Cynet?
Cynet is not very costly. We can refer it to other customers because Cynet does not ask for additional costs for add-...
What needs improvement with Cynet?
One area where Cynet needs improvement is tamper protection for Mac and Linux agents. It currently has tamper protect...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Corelight Open NDR
No data available
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
CarrefourEdnonGrand Canyon EducationSektorCERTTietoevryVolkswagen Financial Services
Meuhedet, East Boston Neighborhood Health Center
Find out what your peers are saying about Corelight Open NDR vs. Cynet and other solutions. Updated: April 2026.
894,738 professionals have used our research since 2012.