



Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP).
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 3.6% |
| VMware Carbon Black Endpoint | 2.0% |
| Cybereason Endpoint Detection & Response | 1.0% |
| Morphisec | 0.9% |
| Other | 92.5% |



| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 20 |
| Large Enterprise | 48 |
| Company Size | Count |
|---|---|
| Small Business | 5 |
| Midsize Enterprise | 4 |
| Large Enterprise | 13 |
| Company Size | Count |
|---|---|
| Small Business | 5 |
| Midsize Enterprise | 8 |
| Large Enterprise | 8 |
| Company Size | Count |
|---|---|
| Small Business | 31 |
| Midsize Enterprise | 9 |
| Large Enterprise | 31 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
Cybereason Endpoint Detection & Response offers advanced threat hunting, investigation, and malicious operation visualization. Its intuitive interface and AI-driven Malop engine enhance threat detection efficiency across multiple platforms.
Focused on providing detailed real-time insights, Cybereason Endpoint Detection & Response is crucial for cybersecurity operations by offering comprehensive dashboards and managed detection and response services. It ensures efficient threat isolation, supports Windows, Linux, and Mac environments, and improves network activity visibility. While its AI engine enhances threat analysis clarity, technical support and deployment complexity can be improved, particularly for smaller organizations. Some challenges include integration with Microsoft, high CPU usage, minimal dashboards, and graphics. Additionally, deployment processes need refinement for stability with new OS versions.
What are the key features of Cybereason Endpoint Detection & Response?Cybereason Endpoint Detection & Response is widely implemented to safeguard endpoints, particularly in fields requiring rigorous security measures. Many employ it for its robust incident response capabilities in finance, healthcare, and government sectors to tackle malware, malicious operations, and unusual process detection, supporting security operations centers with powerful monitoring tools.
Morphisec enhances security with its signatureless attack prevention, integrating smoothly with Microsoft Defender. Users benefit from real-time threat detection and seamless system integration, protecting against zero-day threats and ransomware across networks.
Morphisec's security solution focuses on preventing cyber threats without requiring threat signatures or user action. Its integration with Microsoft Defender offers simplified visibility and management while delivering quick responses. Lightweight in nature, Morphisec ensures zero performance degradation and employs in-memory protection along with Moving Target Defense. This approach effectively counters zero-day threats and ransomware, maintaining a user-centric dashboard that eases administrative workloads. Morphisec's easy deployment also enables small teams to manage risks and uphold robust security measures efficiently.
What are Morphisec's key features?Morphisec is widely used across industries like financial services, healthcare, and manufacturing to bolster defenses against malware and ransomware. Its deployment spans workstations and servers, integrating efficiently into existing infrastructures. Industries value real-time threat detection, ease of deployment, and cloud-based updates, noting its ability to identify threats missed by other antivirus solutions.
VMware Carbon Black Endpoint enhances endpoint security with its robust EDR, threat detection, and live response features. The cloud-based architecture supports remote management and easy setup while behavioral monitoring and dynamic grouping minimize security risks.
VMware Carbon Black Endpoint is designed for those seeking comprehensive endpoint protection. With its cloud-based deployment, organizations experience streamlined remote control and simplified rollout processes. Its behavioral monitoring, incident response capabilities, and firewall integration deliver advanced security measures. Although it addresses many security challenges, areas like manual alert management, on-demand scanning, and integration with systems like AlienVault USM require refinement. Improved UI, EDR components, and flexible pricing models would enhance user satisfaction. On-premise deployment infrastructure and compatibility issues with some operating systems need attention. Enhanced reporting, container security, and multi-tenancy support are also essential for fulfilling industry needs. AI-driven analysis and threat isolation empower companies by fostering proactive management.
What are the key features of VMware Carbon Black Endpoint?
What benefits should users look for when evaluating VMware Carbon Black Endpoint?
VMware Carbon Black Endpoint finds extensive application in industries focused on stringent security requirements. Managed security service providers leverage its capabilities to deliver comprehensive protection to multiple clients worldwide. Organizations use it primarily for antivirus protection and incident management, integrating it with their existing security frameworks to strengthen endpoint visibility and real-time threat prevention. Its advanced detection and application control features make it a preferred choice in industries that prioritize robust security measures. However, it requires improvements in terms of system compatibility and customization flexibility to better serve diverse industry environments.