



Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP).
They appreciate the rich telemetry data from the solution, as it provides in-depth threat identification.
Cortex XDR by Palo Alto Networks helps to reduce my total cost of ownership significantly.
In Cortex XDR by Palo Alto Networks, most of the remediation is automated and the accuracy is quite good.
SentinelOne Singularity Complete has helped reduce my organization's mean time to detect by fifty percent.
If I engage five engineers for this project and implement SentinelOne, then only one resource is needed to manage the dashboard and criticality alerts.
Since then, I have not faced any intrusions, which is one reason I chose SentinelOne over ESET.
The technical support from Palo Alto deserves a mark of ten because they reach out within an hour whenever assistance is needed.
There is no back and forth, and they know what we are asking for and come up with the best resolution for a solution.
If any of these services are missed, it becomes a problem in terms of support tickets, follow-up, or special configuration that needs to be done in the system.
Technical support from Deep Instinct Prevention Platform is fantastic.
The support needs to be more granular, and perhaps they can consider using AI to help us ask questions instead of searching for specific keywords.
If we get stuck at midnight, any other TAC team will be in GMT or Europe or America, and they will assign our support engineer and suddenly schedule a call for us and resolve the issue.
For the support team of SentinelOne Singularity Endpoint, I would rate them nine out of ten because there is a human voice there, so they are listening and responsive.
We are using the automated email process for support, and they respond within an hour or two hours sometimes.
Regarding the technical support of Broadcom, they are responsive and helpful.
You can onboard 10,000 endpoints in just hours, which demonstrates the excellent scalability of this product.
Activating the newly purchased licenses is instantaneous, allowing installations without adjustments since it's cloud-based.
Cortex XDR by Palo Alto Networks can be expanded anytime by purchasing another license without any issues related to scalability.
The biggest customer has 50,000 instances, so it scales very well.
The platform is designed to handle thousands of endpoints without significant performance degradation.
The system can scale any number of times, and only the license for each endpoint is needed.
It's all auto-scale and auto-categorized, configuring automatically.
Cortex remains fast and responsive, even with increasing data and alerts.
The thresholds we've seen on our firewall boxes at some instances reached 80% to 85%, but even at that level of utilization, we don't observe any latency or any issues reported with respect to accessing the application.
Cortex XDR is stable, offering high quality and reliable performance.
If I have to rate the stability level of Singularity Platform from one to ten, I would say it would be a strong nine.
The automation helps a lot, and once implemented, we face no further issues regarding stability or scalability; everything works absolutely fine.
Even if the agent disconnects from our console, it will still protect the desktop or laptop.
Improving reporting and dashboard customization, along with the addition of real-time and exportable reports, would help SOC teams greatly.
The inclusion of this feature would allow the application of DLP policies alongside antivirus policies via a single agent and console, making it more competitive as other OEMs often offer DLP solutions as part of their antivirus products.
If the per GB data could be provided at a certain level free of cost or at the same cost which the customer is taking for the entire bundle, that would be better.
Deep Instinct Prevention Platform detects malicious scripts but it needs better measures, perhaps signing scripts, so we can be sure that a script is created by a client, not by some malware.
The only thing that prevented the attack from succeeding was a free version of Malwarebytes.
When I find a log suspicious, if it automatically points out that a particular point in the log at a specific timing or frame is looking malicious, it would be easier for me.
SentinelOne Singularity Complete doesn't have data security solutions such as Forcepoint DLP or 48 layer; SentinelOne Singularity Complete doesn't have that DLP solution.
The pricing on SentinelOne is far more reasonable and cheaper than Cortex XDR by Palo Alto Networks.
I would say it is definitely not a cheap product, considering how mature it is and how scalable all Palo Alto products are together.
Cortex XDR is perceived as expensive by some customers, yet offers dynamic pricing.
The licensing is very competitively priced, better than all other solutions.
It is about the same price as any other antivirus.
If you want protection, you have to pay the price.
There are other products that are less expensive, but I tell my clients that in security, they cannot cut corners or look for the cheapest solution.
Reputation and quality are important, but especially in today’s economy, price is a significant factor.
It incorporates AI for normal behavior detection, distinguishing unusual operations.
The product provides automation responses in case of a threat attack, severity assessments, centralized manageability, and comprehensive compliance features, resulting in reduced costs.
It includes machine learning to easily analyze data and detect complex threats across endpoints, networks, or clouds.
Deep Instinct Prevention Platform stops all malware, including zero-days in 20 milliseconds.
I have an advanced app providing visibility of all my endpoints, which was not the case before.
SentinelOne has a feature to decommission automatically, which has been fantastic.
There's also automation that gives my team free time, preventing them from having to look for every alert.
I assess VMware Carbon Black Endpoint's machine learning capabilities in detecting unknown threats as fantastic.
| Product | Mindshare (%) |
|---|---|
| SentinelOne Singularity Endpoint | 4.5% |
| Cortex XDR by Palo Alto Networks | 3.6% |
| Deep Instinct Prevention Platform | 1.0% |
| VMware Carbon Black Endpoint | 2.0% |
| Other | 88.9% |



| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 20 |
| Large Enterprise | 48 |
| Company Size | Count |
|---|---|
| Small Business | 11 |
| Midsize Enterprise | 4 |
| Large Enterprise | 5 |
| Company Size | Count |
|---|---|
| Small Business | 107 |
| Midsize Enterprise | 59 |
| Large Enterprise | 79 |
| Company Size | Count |
|---|---|
| Small Business | 31 |
| Midsize Enterprise | 9 |
| Large Enterprise | 31 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
Deep Instinct Prevention Platform offers a prevent-first solution with a focus on detecting zero-day threats, featuring user-friendly deployment and robust cross-platform functionality. It integrates well with other security tools to enhance threat detection capabilities.
Deep Instinct leverages deep learning for advanced malware and ransomware prevention. Its lightweight design and easy deployment make it a favored choice for endpoint protection. While praised for its compatibility and minimal updates, challenges exist with Linux support, high resource use in ransomware detection, and the need for better control in administration. Organizations implementing Deep Instinct enjoy real-time prevention against threats like phishing and zero-day exploits.
What are the key features?Deep Instinct finds implementation in industries needing robust endpoint protection, adopted by security consultants and resellers for client solutions. It serves managed services aiming to replace traditional antiviruses and safeguards against malware and phishing attacks.
SentinelOne Singularity Complete is an advanced endpoint security platform featuring centralized management across multiple locations. It leverages AI-driven behavior detection, threat prioritization, and ransomware rollback for enhanced protection and streamlined operations.
With a focus on endpoint protection, threat detection, and automated response, SentinelOne Singularity Complete provides comprehensive security through AI-powered behavioral analysis and real-time threat detection. The centralized console simplifies management, offering seamless integration and minimal system impact. Its robust reporting capabilities facilitate compliance with audit-ready reports. Lightweight agents operate across diverse environments, improving visibility and performance while curbing manual efforts. To optimize its utility, faster console load times and improved customizability in reports and dashboards are recommended. Users may benefit from smoother integration with IT tools and enhanced policy management flexibility, as well as upgraded agent processes and simplified endpoint deployment. Expanding built-in analytics and refining alert management can further heighten platform efficacy.
What are the key features of SentinelOne Singularity Complete?In various industries, SentinelOne Singularity Complete is implemented for endpoint protection and incident management. Companies rely on it for its real-time threat detection and automated response capabilities, ensuring compliance and reduced manual intervention. Its adaptive nature supports diverse environments, enhancing operational efficiency.
VMware Carbon Black Endpoint enhances endpoint security with its robust EDR, threat detection, and live response features. The cloud-based architecture supports remote management and easy setup while behavioral monitoring and dynamic grouping minimize security risks.
VMware Carbon Black Endpoint is designed for those seeking comprehensive endpoint protection. With its cloud-based deployment, organizations experience streamlined remote control and simplified rollout processes. Its behavioral monitoring, incident response capabilities, and firewall integration deliver advanced security measures. Although it addresses many security challenges, areas like manual alert management, on-demand scanning, and integration with systems like AlienVault USM require refinement. Improved UI, EDR components, and flexible pricing models would enhance user satisfaction. On-premise deployment infrastructure and compatibility issues with some operating systems need attention. Enhanced reporting, container security, and multi-tenancy support are also essential for fulfilling industry needs. AI-driven analysis and threat isolation empower companies by fostering proactive management.
What are the key features of VMware Carbon Black Endpoint?
What benefits should users look for when evaluating VMware Carbon Black Endpoint?
VMware Carbon Black Endpoint finds extensive application in industries focused on stringent security requirements. Managed security service providers leverage its capabilities to deliver comprehensive protection to multiple clients worldwide. Organizations use it primarily for antivirus protection and incident management, integrating it with their existing security frameworks to strengthen endpoint visibility and real-time threat prevention. Its advanced detection and application control features make it a preferred choice in industries that prioritize robust security measures. However, it requires improvements in terms of system compatibility and customization flexibility to better serve diverse industry environments.