Try our new research platform with insights from 80,000+ expert users

Cynet vs Sangfor Cyber Command comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
108
Ranking in other categories
Endpoint Protection Platform (EPP) (5th), Endpoint Detection and Response (EDR) (7th), Extended Detection and Response (XDR) (6th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (2nd)
Cynet
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
45
Ranking in other categories
Security Information and Event Management (SIEM) (11th), Endpoint Protection Platform (EPP) (13th), User Entity Behavior Analytics (UEBA) (3rd), Endpoint Detection and Response (EDR) (12th), Threat Deception Platforms (2nd), Network Detection and Response (NDR) (4th), Extended Detection and Response (XDR) (9th), Ransomware Protection (3rd)
Sangfor Cyber Command
Average Rating
8.6
Reviews Sentiment
7.1
Number of Reviews
2
Ranking in other categories
Network Detection and Response (NDR) (15th)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
Roshan Jadhav - PeerSpot reviewer
Technical Consultant at Vincacyber
Has improved threat detection and streamlined incident analysis through centralized control and AI-driven insights
People are looking for Cynet because it has next-generation threat protection that detects zero-day threats. It has UEBA (user entity behavior analysis), threat hunting features, and storage device control where we can create profiles and block unauthorized USB storage devices. We can also create threat protection policies to detect malware, ransomware, and many other threats. The most valuable feature is the UBA (User behavior analysis). It has integration with SIEM solutions, allowing us to share our logs to third-party SIEM servers. Cynet has AI integration which showcases complete forensic data about threats, making it very easy to understand what happened with the system and what type of incident was detected. Autonomous breach protection is a feature of Cynet which can detect and mitigate known and unknown threats based on signatures. If there are any signature-less files, malware, or ransomware, it will detect them based on autonomous breach protection capabilities. The centralized management console provides a dashboard where we can see four types of attack vectors and incident counts in real-time. It continuously scans the radar and shows open alerts related to files, hosts, users, or networks. We can easily export these alerts and send reports via email.
Zaid Farooqui - PeerSpot reviewer
CIO at Indus Motor Company
Helped our organization by providing a comprehensive picture of our cyber posture in terms of threat intelligence
The most valuable feature is the capability to correlate all the vulnerabilities or threats detected from different sources. It does a very good job in correlating and identifying threat actors. Its integration with other products such as HCI, Firewall, and VDI solution for native control and detection also adds significant value.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature of Cortex XDR by Palo Alto Networks is its machine-learning capabilities. Additionally, there is full integration with other solutions."
"The most valuable feature of Cortex XDR by Palo Alto Networks is the low consumption of system resources. The solution uses a lot of AI and machine learning."
"Cortex XDR by Palo Alto Networks has helped lighten the load of our security analysts because it was the major tool that we were using and the one we utilized most."
"The user interface of the solution is sophisticated and straightforward."
"Monitoring is most valuable."
"The main benefit of using Cortex XDR by Palo Alto Networks while employing Palo Alto Firewall at the internet edge is that it improves security on our endpoint devices, integrating seamlessly with Palo Alto Firewalls to deliver comprehensive network, analyst, and security details all in a single dashboard, which allows us to manage everything from our network devices."
"Based on my experience, I would recommend Cortex XDR by Palo Alto Networks to other people."
"Automation and playbooks have helped me significantly, as Cortex Xnor's playbooks predefine the workflow of the automation, such as response processes, alert triggering, and enriching the context, efficiently detecting and blocking malicious attacks with firewalls while eliminating workload and speeding responses for next-generation operations."
"The initial setup is very fast and very easy."
"My clients have used Cynet since it is a very automated solution with excellent detection capabilities."
"The most valuable aspect of this solution is that it is a complete solution, which makes cyber security very free and almost perfect. There is no such thing as perfect cyber security, but as far as it can go, sign it comes close to being perfect and holistic. Cynet is always comprehensive from the perspective of functionality, as well as from the standpoint that it encompasses not only technology but also processes and people. The triad of people, processes, and technology is crucial and should always be in place. To my knowledge, no other product or platform combines all three components into one, but Cynet does."
"It is a very stable solution...It is a very scalable solution...The initial setup of Cynet was easy."
"As a reseller, I believe the best functions in Cynet's product are the lightweight agent and good detection performance."
"The product did not utilize much memory or resources from the background, which was a significant advantage."
"Cynet is light and transparent when downloaded. The product's data aggregation is also valuable since you can see everything you need on a page."
"The EDR, as well as the XDR features, are very valuable."
"The most valuable feature is the capability to correlate all the vulnerabilities or threats detected from different sources."
"The tool is a good product in the NDR market. Its valuable features are ease of management and breach of response features. It is an easy-to-learn solution."
"Sangfor Cyber Command has helped our organization by providing a comprehensive picture of our cyber posture in terms of threat intelligence."
 

Cons

"The product's pricing could be better."
"There are some false positives. What our guys would have liked is that it would have been easier to manipulate as soon as they found a false positive that they knew was a false positive. How to do so was not obvious. Some people complained about it. The interface, the ESM, is not user-friendly."
"The solution can never really be an on-premises solution based simply on the way it is set up. It needs metadata to run and improve. Having an on-premises solution would cut it off from making improvements."
"We had a problem with getting our older endpoints up to date, but their newest updates have been really good. I've been pleased with it in terms of what our needs are. It's doing what we want it to do."
"I feel that it should not be a licensed activity because a feature should allow us to see applications running on end devices."
"The solution should add unwanted malicious hash values to a block list so that whenever the action is triggered, it will automatically prevent the malicious content."
"There are some third-party solutions that are difficult to integrate with, which is something that can be improved."
"I have seen lagging with Cortex XDR by Palo Alto Networks. There was one time when we faced a threat actor trying to gain access to our system. When our team utilized the tool, we were all on the same dashboard and we faced a lag issue at that time of around five minutes, which was quite significant."
"One area where Cynet needs improvement is tamper protection for Mac and Linux agents."
"Cynet should include complete Single Sign-On (SSO) services."
"They have automated response capability, and they're moving more and more into SOAR capability. They have built-in deception technology with host-file users, phantoms, etc. We used to call them honeypots. So, they're on target. They're doing a really good job, and they should continue to improve with SOAR."
"I would like to see more emphasis on building the data lake and storing all endpoint data in the enterprise data lake so that data mining can be performed"
"One thing to note is that I highly recommend adding a deep learning-based prevention environment as an additional layer to Cynet. However, I always advise my customers to start with Cynet or XDR, for example, and then focus on the people, technology, and processes involved. This is the best approach to ensure that you are not breached with ransomware. While Cynet can prevent most attacks, there have been cases where ransomware has been quicker than Cynet's detection capabilities. In these situations, an additional tool is necessary to ensure complete protection, and that is what I sell as well."
"Their deployment needs some work, especially with integration with remote monitoring management systems like Datto AutoTask or ConnectWise Automate."
"Its dashboard is not so good. On the dashboard, they don't show the count for client endpoints, which is a failure of this product. This count should be shown on the dashboard. I have 1,000 clients, but I can't see it anywhere on the dashboard."
"Linux servers are not supported."
"The product needs to improve its dashboard. Integration with existing systems has been challenging. When comparing it with Trend Micro, which offers an all-in-one NDR solution, the tool's integration process can be difficult."
"The solution could improve by incorporating email security."
"Technical support could be improved, and I rate them a seven. The support team has fewer cybersecurity resources capable of managing Cyber Command compared to other solutions."
 

Pricing and Cost Advice

"It has reasonable pricing for the use cases it provides to the company."
"Every customer has to pay for a license because it doesn't work with what you get from a managed services provider."
"The solution is expensive. It's pricing is on a yearly-basis."
"I don't have any issues with the pricing. We are satisfied with the price."
"The cost of Cortex XDR by Palo Alto Networks is $55 to $90 USD per endpoint per month."
"We pay about $50,000 USD per year for a bundle that includes Cortex XDR."
"I feel it is fairly priced."
"It's way too expensive, but security is expensive. You pay for your licensing, and then you pay for someone to monitor the stuff."
"Cynet is cheaper than other solutions in the market."
"I don't have specific information about integration capabilities or licensing costs."
"My company's customers have to make yearly payments towards the licensing costs of the solution. Cynet is not expensive."
"The licensing for Cynet is yearly. The solution pricing depends on the customer, but it is not very expensive."
"The price is very competitive."
"Our billing is on a quarterly basis, but they have monthly or annual billing availability."
"Cynet is very affordable."
"The price should not be less than $100 which is quite reasonable for this solution because you are getting multiple components."
Information not available
report
Use our free recommendation engine to learn which Network Detection and Response (NDR) solutions are best for your needs.
884,933 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
9%
Manufacturing Company
9%
Financial Services Firm
9%
Comms Service Provider
7%
Manufacturing Company
10%
Financial Services Firm
9%
Computer Software Company
9%
Comms Service Provider
9%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business44
Midsize Enterprise20
Large Enterprise47
By reviewers
Company SizeCount
Small Business29
Midsize Enterprise7
Large Enterprise12
No data available
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
When evaluating User Activity Monitoring, what aspect do you think is the most important to look for?
The support team that stands behind the detection and response. Is there adequate expertise and are they behind you ...
What do you like most about Cynet?
In terms of incident response, Cynet can contain attacks, offer a trial period to customers, and uninstall if not con...
What is your experience regarding pricing and costs for Cynet?
Cynet is not very costly. We can refer it to other customers because Cynet does not ask for additional costs for add-...
What do you like most about Sangfor Cyber Command?
The tool is a good product in the NDR market. Its valuable features are ease of management and breach of response fea...
What needs improvement with Sangfor Cyber Command?
The solution could improve by incorporating email security. Additionally, there is room for improvement in the techni...
What is your primary use case for Sangfor Cyber Command?
The primary use case for Sangfor Cyber Command is threat hunting. It correlates vulnerabilities and threats detected ...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
No data available
No data available
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Meuhedet, East Boston Neighborhood Health Center
Information Not Available
Find out what your peers are saying about Cynet vs. Sangfor Cyber Command and other solutions. Updated: March 2026.
884,933 professionals have used our research since 2012.