"The solution does not affect a user's workflow."
"Threat detection is its key feature, and that's why we use this tool. It gives an alert if a PC is attacked or there is any kind of anomaly, such as there is a spike in sending emails or we see an unauthorized website being accessed. So, it keeps us on our toes. We get to know that there is something wrong, and we can isolate the user and find any issues with it. So, threat detection is very robust in this tool."
"If your business requirements are relatively simple, it can get the job done."
"Everything from Microsoft is integrated. You receive regular reports on them all. You can push your reports, logs, and security alerts, which are all integrated. It is crucial that these solutions work natively together to deliver coordinated detection and response across our environment."
"We have become more aware of what services our users are using, how often they are using them, and what data is being sent out of the organization and to which services. So, it is really a lot about visibility and helping us make decisions based on that. It drives some of our policy decisions for adding extra security controls."
"It is very easy to use, which is what we look for in these types of solutions."
"The most valuable feature of this solution is its monitoring."
"It's very easy to install and it includes the Intune portal from Microsoft where I can control all the devices from one place."
"If some unusual activity happens on the network, such as I open administrator sessions in a short duration of an hour on many computers in the lab, it sends me an alert about my network saying that one user opened three, four, or five sessions in one hour. Similarly, if I try to play with the disk size on a computer, it will send me an alert, and it will also stop the operation."
"Cynet's most valuable features are laptop and server performance, internal network monitoring, and external firewall lock management."
"The product is very easy to use. Customers really appreciate that."
"Advanced detection and protection against ransomware paired with SOC monitoring are the most valuable features. They have 24/7 SOC monitoring and file activity. It is a very robust tool."
"The dashboard is beautiful, overall easy of use, and the UBA and NBA features are valued."
"We are very satisfied with the level of performance we get."
"The visibility it gives is excellent."
"The most valuable feature is the monitored support behind it."
"Trend Micro XDR is stable, scalable, and reasonably priced."
"XDR provided a much more deep view into what is actually happening."
"The telemetric report is the most valuable feature."
"Its detection rate is valuable. It is really an easy product to install and manage. It is quite effective at what it does, and if needed, it can also be co-managed, which means 24 hours and seven days a week monitoring through a SOC."
"I like that it is a comprehensive security solution with a lot of features. You can say XDR is an end-to-end security solution with endpoint security. It includes all your servers, networks, and other devices. The endpoint security solution does not cover this. Plus, machine learning and features like that are the main things in XDR solutions."
"It has the feature to track an attack back. If there is an incident or an attack occurs, you can get a bird's eye view of that attack. You can see how the attackers came in and how they managed the attack. You can trace an attack. If you are giving a presentation to the management, you can easily show it to them in a live environment how the attackers came, which is amazing."
"The solution is stable."
"We've found the pricing to be reasonable."
"The integration with macOS operating systems needs to be better."
"It takes some time to scan and apply the policies when there is some sensitive information. After it applies the policies, it works, but there is a delay. This is something for which we are working with Microsoft."
"There are challenges with detection and there are challenges with false-positive rates."
"I believe it's only set to be integrated with Microsoft Defender for identity and identity protection. I would like to see it available for use with something like Office 365 Defender. I don't think it's integrated with that yet."
"Currently, reporting is not very straightforward and it needs to be enhanced. Specific reports are not included and you need to run a query, drill down, and then export it and share it. I would love to have reports with more fine-tuning or granularity, and more predefined reports."
"There are some features, such as user navigation content filtering, that are disabled by default, and it probably makes sense to enable them by default."
"This service would be better if it had a separate license, only for this service, that could be used to track usage."
"Sometimes the support is actually lacking."
"Its dashboard is not so good. On the dashboard, they don't show the count for client endpoints, which is a failure of this product. This count should be shown on the dashboard. I have 1,000 clients, but I can't see it anywhere on the dashboard."
"The inability to add contact information inside the Cynet is also an issue because it makes things more complicated. I would like to have a simple feature to enter a contact name and number for the person taking care of that unit or that server."
"The solution just needs to keep maturing and they need to keep up with the threat landscape to ensure they're protecting clients well as time passes."
"Sometimes, it is necessary for me to make important changes to a hard drive of a computer, and because Cynet does not allow me to do that, I have to go to the console and remove the computer from the security group just for Cynet. After that, I have to wait for 10 or 15 minutes for that to take effect. I would like to be able to disable Cynet locally. I shouldn’t have to go to the console to find the PC and then take it out of the group and then add it again to the group. I should locally be able to disable Cynet on a computer with a password or something like that, but it is currently not possible."
"Cynet could improve when a reverse proxy is being used to connect to the servers. There could be an easier configuration because it is not plug-and-play."
"Automation could be improved, and orchestration could be added to the features."
"It is an endpoint agent, but they don't have a probe for checking the network traffic. They could improve from this point of view."
"Compliance reports need to improve."
"It should integrate with more tools. There are a lot of tools that can do the PTP dump."
"There isn't a lot I'd do to change it. The web interface could be improved to sort of make it a little easier to manage multiple clients out of one location. It could also be made a bit easier to sort of manage the licensing side of it."
"It would be better if it were more user-friendly. It would also be better if the implementation were more straightforward."
"The agent system is very slow, it needs to improve its performance."
"In new versions I would like to see better implementation of the reporting features, especially in regards to EDR visibility."
"The product needs to have a lot more maturity, and they need to improve the overall technical support framework for getting the value out of XDR."
"Trend Micro doesn't have the next-generation firewall."
"Results were delayed."
Microsoft Defender for Cloud Apps is a cloud access security broker (CASB) that provides multifunction visibility, control over data travel, and sophisticated analytics. With Microsoft Cloud App Security, you can:
- Manage, control, and audit apps to streamline cloud access security
- Mange your access to resources to discover shadow IT and understand your digital information estate
- Use real-time controls to enable threat protection on all the access points that touch your environment
To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.
Cynet has pioneered the security industry’s first all-in-one security platform purposely built for organizations that need the ability to effortlessly identify, block and respond to all types of attacks inside the perimeter - defending endpoints, network, files and users - without the heavy burden of deep cyber expertise and the overhead of integrating and managing multiple products. Our approach converges and brings synergy with technology: endpoint protection, EDR, vulnerability management, deception, threat intelligence and network and end-user analytics, and expertise: a 24/7 cyber SWAT team for incident response, malware analysis, threat hunting and forensics. Cynet deploys in hours and simplifies management with automated monitoring to complement any sized staff.
Cynet Consists Of:
With Cynet You Can:
Four different deployment methods:
Cynet Benefits and Features:
Features Users Find Most Valuable:
Reviews from Real Users
“I have found the continued support and pretty much all the features to be valuable. They all stand out as being positive. It continues to detect unusual activity when it's supposed to, and so far we haven't had any issues.” - Ken S., Director InfoSec and Audit at a manufacturing company
"The feature that I have found most valuable is that the configuration and the usage of the product are not so complicated. For people responsible for using this infrastructure for the first line of workstation monitoring, it's quite easy to use." - Senior Cyber Security Manager at a financial services firm
"The dashboard is beautiful, overall ease of use, and the UBA and NBA features are valued." - Harsh P., Cyber Security Operations Center Analyst at Vincacyber
Trend Micro XDR (extended detection and response) gathers and systematically analyzes data across numerous security layers, such as networks, servers, endpoints, email, cloud workloads, and more. Trend Micro XDR’s security protocol grants faster investigation and response time, and improved detection of risk and threats.
Today’s malicious threats are created to conceal themselves in an organization's network's various security layers. They can easily avoid detection, thrive, and grow in intensity as time goes on. Many times, inundated IT personnel are searching with ineffective tools and very narrow perspectives. Trend Micro XDR uses a next-gen comprehensive automated analysis protocol of response and detection to find issues faster. The solution allows IT personnel to perform more effectively and respond immediately, keeping the organization’s network continuously safe and secure.
Trend Micro XDR hunts deep and wide and creates a data lake for continuous hunting, sweeping, and researching throughout all security layers. With the addition of AI combined with intuitive analytics, Trend Micro XDR greatly reduces the number of alerts going to the organization’s SIEM solution, ensuring that IT personnel can be more focused on what threats and risks are pertinent, critical, and necessitate more thorough investigation.
Trend Micro XDR Benefits
Reviews from Real Users
“I like that it is a comprehensive security solution with a lot of features. You can say XDR is an end-to-end security solution with endpoint security. It includes all your servers, networks, and other devices. The endpoint security solution does not cover this. Plus, machine learning and features like that are the main things in XDR solutions.” - Nadeem S., CEO at Haniya Technologies.
“Its detection rate is valuable. It is really an easy product to install and manage. It is quite effective at what it does, and if needed, it can also be co-managed, which means 24 hours and seven days a week monitoring through a SOC.” - Charles D., Technical Services Manager at Psitech.
Cynet is ranked 4th in Extended Detection and Response (XDR) with 17 reviews while Trend Micro XDR is ranked 7th in Extended Detection and Response (XDR) with 10 reviews. Cynet is rated 8.6, while Trend Micro XDR is rated 7.4. The top reviewer of Cynet writes "A complete, transparent, and centralized solution ". On the other hand, the top reviewer of Trend Micro XDR writes "Good dashboards and easy to navigate but needs more flexibility". Cynet is most compared with SentinelOne, Microsoft Defender for Endpoint, CrowdStrike Falcon, Darktrace and Kaspersky Endpoint Detection and Response, whereas Trend Micro XDR is most compared with CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne, Fortinet FortiEDR and FireEye Endpoint Security. See our Cynet vs. Trend Micro XDR report.
See our list of best Extended Detection and Response (XDR) vendors.
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.