OpenText Behavioral Signals and Cortex XSIAM are competing in the enterprise security space. Cortex XSIAM is generally seen as superior due to its comprehensive features that justify its higher cost.
Features: OpenText Behavioral Signals focuses on emotional context and behavior analysis, offering actionable insights and solid security intelligence. Its standout features include detection enrichment capabilities, SOAR, and an intuitive interface. Cortex XSIAM excels in advanced threat detection, AI-driven automation, and providing integration with third-party vendors, securing endpoints even if they aren't exposed to the internet.
Room for Improvement: OpenText Behavioral Signals could enhance its depth of integration with other security solutions and improve initial user training to optimize understanding. Further customization in alert generation based on varied environments and seamless real-time data processing would increase its appeal. Cortex XSIAM would benefit from simplifying its complex environment setup, reducing the time needed for users to become proficient, and minimizing the learning curve associated with its deployment. Enhancing the system to process and refine more extensive data sets without bogging down operations would also be beneficial.
Ease of Deployment and Customer Service: OpenText Behavioral Signals offers a streamlined deployment with responsive support, making it accessible for organizations with varying technical expertise. Cortex XSIAM, while offering a high-quality deployment and support model, has a steeper learning curve. This is compensated by expert-led assistance and hands-on support during the implementation phase.
Pricing and ROI: OpenText Behavioral Signals is noted for lower setup costs, yielding quicker ROI with its cost-effectiveness and solid performance. Cortex XSIAM requires a higher initial investment, but its extensive features provide substantial security improvements, making the cost justified over time. While OpenText lowers financial barriers, Cortex provides advanced capabilities that add significant value to its users.
Premium support provides direct access, while distributor support quality can vary.
It is ineffective in terms of responding to basic queries and addressing future requirements.
I would rate the support of Palo Alto a nine out of ten.
Without proper integration, scaling up with more servers is meaningless.
Cortex XSIAM is highly scalable.
The product was easy to install and set up and worked right.
Overall, Cortex XSIAM is stable.
It works really nice and performs really efficiently after configuration.
Cortex XSIAM is on the expensive side and requires substantial improvement in pricing.
In terms of incident response automation, it is quite poor due to the lack of integration with all security tools, making manual intervention necessary.
Cortex XSIAM needs improvements in terms of data onboarding, parsers, and third-party integration supports.
The product is very expensive.
The first impression is that XSIAM would be more expensive than others we tried.
Cortex XSIAM is pretty expensive, and the licensing process is not very comfortable.
The advanced visualization capabilities of the product are important for understanding security trends in an organization.
One of the valued aspects of the product is its use of artificial intelligence to detect security vulnerabilities.
The flexibility for creating manual workflows stands out.
Product | Market Share (%) |
---|---|
Cortex XSIAM | 3.0% |
OpenText Behavioral Signals | 0.5% |
Other | 96.5% |
Company Size | Count |
---|---|
Small Business | 9 |
Midsize Enterprise | 2 |
Large Enterprise | 4 |
Cortex XSIAM acts as a critical element for SOC foundations, integrating SIEM and EDR capabilities, valued for threat detection and seamless security orchestration with Palo Alto Networks products.
Organizations find Cortex XSIAM beneficial for SOC foundations due to its capability to integrate SIEM and EDR tools, facilitating data collection, detection, and response. It connects with third-party data sources while reducing management effort and offering cost-effective alternatives to competitors like CrowdStrike and Trend Micro. Featuring automation and integration with Palo Alto Networks products, Cortex XSIAM enhances threat detection. Unified architecture allows a comprehensive view of attacks, further supported by machine learning and integration with existing vendor solutions, ensuring that users gain insights without significant manual log analysis.
What are Cortex XSIAM's key features?
What benefits are evident in Cortex XSIAM reviews?
Industries implement Cortex XSIAM mainly in technology-driven sectors where centralized endpoint protection and automation of forensic investigation are paramount. By integrating several third-party systems for incident response, companies in competitive markets leverage its attributes for heightened operational security efficiency. However, users note areas for improvement, such as Attack Surface Management and integration enhancements, to better suit tech-heavy industries needing extensive connectivity with cybersecurity solutions.
OpenText Behavioral Signals enhances organizational security monitoring with its robust correlation engine and streamlined dashboard, offering customization to suit different environments like airports or banks.
OpenText Behavioral Signals effectively integrates device logs through its strong correlation engine. The platform's customization options enable tailored alerts to match specific use cases, such as airports or banks. Although it needs more frequent updates to stay aligned with global incidents, it provides a centralized dashboard that ensures comprehensive visibility across networks. Users find the interface intuitive, making rule writing and report access easy, aiding in a comprehensive understanding of the network environment.
What are the key features of OpenText Behavioral Signals?In industries like banking and airports, OpenText Behavioral Signals is implemented for gathering global intelligence from the cloud. It notifies organizations about global attacks and updates its correlation engines. These industries utilize the platform for monitoring and analyzing logs from network devices, security log management, and addressing network challenges like link failures and unauthorized login attempts, ensuring better security posture with behavioral analytics and log integration using Unix and Microsoft-based connectors.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.