No more typing reviews! Try our Samantha, our new voice AI agent.

Dell Trusted Device powered by CrowdStrike Falcon and Intel vPro vs Elastic Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on May 17, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Ranking in Endpoint Detection and Response (EDR)
6th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
112
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Extended Detection and Response (XDR) (5th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (1st)
Dell Trusted Device powered...
Ranking in Endpoint Detection and Response (EDR)
80th
Average Rating
9.6
Reviews Sentiment
5.2
Number of Reviews
4
Ranking in other categories
No ranking in other categories
Elastic Security
Ranking in Endpoint Detection and Response (EDR)
20th
Average Rating
7.8
Reviews Sentiment
6.8
Number of Reviews
66
Ranking in other categories
Log Management (12th), Security Information and Event Management (SIEM) (8th), Security Orchestration Automation and Response (SOAR) (10th), Extended Detection and Response (XDR) (12th)
 

Mindshare comparison

As of May 2026, in the Endpoint Detection and Response (EDR) category, the mindshare of Cortex XDR by Palo Alto Networks is 3.4%, down from 4.0% compared to the previous year. The mindshare of Dell Trusted Device powered by CrowdStrike Falcon and Intel vPro is 0.3%, up from 0.0% compared to the previous year. The mindshare of Elastic Security is 2.3%, up from 2.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR) Mindshare Distribution
ProductMindshare (%)
Cortex XDR by Palo Alto Networks3.4%
Elastic Security2.3%
Dell Endpoint Security powered by CrowdStrike Falcon0.3%
Other94.0%
Endpoint Detection and Response (EDR)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
TC
System Engineer at a healthcare company with 501-1,000 employees
Integrated device protection has secured bios-level threats and preserves user performance
The features of Dell Trusted Device powered by CrowdStrike Falcon and Intel vPro that I appreciate most are the real-time analytics in CrowdStrike and the ability to detect anomalies in the computer at the BIOS level, which is excellent to have. You would not normally see that with standard antivirus or regular security software; it would not integrate with the BIOS, but the fact that it does means that you get an enhanced layer of protection with CrowdStrike, more than you would see with another product. My perception of chip-level recovery is that it is a beautiful thing. Normally you are dependent on the OS for recovery actions, but in this case, you do not need that because it happens at the chip level. It happens out of band, before the OS is booted; you can make recovery choices, and that is extremely important. You always need an out of band solution, and on end user devices especially, if that is possible, that changes the whole landscape. Normally out of band is only for server-level devices, but this changes that; this adds an extra layer of protection that you would not normally see. I view the critical feature of Advanced Memory Scanning by CrowdStrike as incredible; the fact that it can actively scan memory without any performance hit on the PC or server devices is remarkable. Previously, in years before 2020, we would see a performance hit from this type of software, but the fact that CrowdStrike integrated with Dell does not cause any performance hit on the end user or the overall performance of the computer is an amazing thing. It is probably the best performing antivirus software I have actually seen.
Laurentiu Popescu - PeerSpot reviewer
Chief Product Officer at ClusterPower
Has improved threat detection with deep log analysis and streamlined investigation workflows
The most useful features I find in Elastic Security are the forensic ones that allow us to carry deeper analysis into the logs for in-depth investigations, and the dashboards, with the reporting dashboard being quite user-friendly. Elastic Security is quite good at identifying threats, as it is part of the deep investigation tool that I mentioned before. Unless we need to look further into a certain log, we can carry out a deeper analysis and forensics on those particular logs. I can assess the impact of Elastic Security's real-time data analysis on our threat response efficiency as working pretty good. We are looking for real-time analysis because we have a continuous inflow of logs from different sources: from our cloud, from Active Directory, from our network. So it works pretty well.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It collects and caches and the knowledge of machine learning from different customers to take to the cloud. It makes it better to use for everybody. It allows for quick learning and updates and can, therefore, offer zero-day malware security. This sharing of metadata helps make the solution very safe."
"The initial setup isn't too bad."
"They did what they said. This solution could apply to any scenario."
"Traps pays for itself within the first 16 months of a three-year subscription."
"Cortex XDR by Palo Alto Networks has helped lighten the load of our security analysts because it was the major tool that we were using and the one we utilized most."
"We think that this product will help us grow, as it meets our needs currently and we can grow with it over time."
"It blocks malicious files. It prevents attacks. It doesn't require many updates, it's a very light application."
"It is easy to use."
"If you are considering protecting your Dell endpoints and your Dell infrastructure with CrowdStrike, it is a no-brainer."
"The fact that CrowdStrike and Dell have gotten to a point where it has no user effect, or virtually zero user effect, is absolutely game-changing."
"Dell Trusted Device powered by CrowdStrike Falcon and Intel vPro has helped us immensely."
"The features of Dell Trusted Device powered by CrowdStrike Falcon and Intel vPro that I like the most include its ability to recover quickly."
"The intelligence of the system has been very impressive; it's pretty accurate and gives you good details to create an intelligence report and present that to your C-level management."
"Elastic Security actually has a very good cost-benefit ratio compared to other vendors in the market."
"It is scalable."
"The most valuable features are the speed, detail, and visualization."
"The scalability is good. It can be scaled easily in the production environment."
"Its flexibility is most valuable. We can have a number of scenarios, and we can get logs from anything. If we know how to use Logstash, we can tweak it in many ways. This makes the logging search on Elastic very easy."
"Anyone who wants to do IT log monitoring, realtime and who wants to do the anomaly detection, should go with this solution."
"The feature that we have found the most valuable is scalability."
 

Cons

"Cortex XDR is trickier to configure than other Palo Alto products. This is one area where we are not so satisfied."
"Cortex XDR by Palo Alto Networks is not only pricey; it is extremely expensive."
"Product might have some bugs."
"I have seen lagging with Cortex XDR by Palo Alto Networks. There was one time when we faced a threat actor trying to gain access to our system. When our team utilized the tool, we were all on the same dashboard and we faced a lag issue at that time of around five minutes, which was quite significant."
"There are some false positives. What our guys would have liked is that it would have been easier to manipulate as soon as they found a false positive that they knew was a false positive. How to do so was not obvious. Some people complained about it. The interface, the ESM, is not user-friendly."
"The tool needs to be improved in terms of integration and interface."
"I recommend adding a data loss prevention (DLP) solution to Cortex XDR by Palo Alto Networks. The inclusion of this feature would allow the application of DLP policies alongside antivirus policies via a single agent and console, making it more competitive as other OEMs often offer DLP solutions as part of their antivirus products."
"Every 30 or 40 days, there's a new version and we need to go and make sure our customer's laptops are upgraded."
"The biggest thing I would do to improve Dell Trusted Device powered by CrowdStrike Falcon and Intel vPro is add that agentic AI to it at the highest level and allow it to start to deploy and do things ourselves."
"The room for improvement that I would recommend to make it a 10 is that it might be beneficial to scale out to include servers."
"I would like more ways to manage permissions and restrict access to certain users."
"The initial configuration and setup are complicated and not straightforward."
"We are paying dearly for the guy who is working on the ELK Stack. That knowledge is quite rare and hard to come by. For difficulty and availability of resources, I would rate it a five out of 10."
"The tool should improve its scalability."
"Sometimes, the solution isn't the easiest to use."
"I'm not satisfied with technical support because whenever you raise a case, it goes to some random support person who asks questions about the architecture."
"An area for improvement in Elastic Security is the pricing. It could be better. Right now, when you increase the volume of logs to be collected, the price also increases a lot."
"It's a little bit of a learning curve to understand the logic of searching for things and trying to find what you're looking for in Elastic Security."
 

Pricing and Cost Advice

"We pay about $50,000 USD per year for a bundle that includes Cortex XDR."
"It has a yearly renewal."
"The price of the product is not very economical."
"The pricing seems fair, and I do like the licensing model. You use wherever they are, and it is elastic."
"Cortex XDR by Palo Alto Networks is quite an expensive solution."
"Its pricing is kind of in line with its competitors and everybody else out there."
"I am using the Community edition."
"I don't recall what the cost was, but it wasn't really that expensive."
Information not available
"Compared to other products such as Dynatrace, this is one of the cheaper options."
"The solution is not expensive and costs around ten dollars a month."
"When compared to other products, the price is average or on the low side."
"The tool's pricing is flexible and comes at unit cost. You don't have to pay for everything."
"It's a monthly cost with Elastic SIEM, but I am not sure of the exact cost."
"I can say that the product is cheaply priced."
"The base product is open-source but if you need advanced security features then you need to pay for the subscription. Elastic Security's price is reasonable in some cases and in other cases it's not."
"Elastic Security is free to use."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
895,990 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Construction Company
12%
Comms Service Provider
9%
Manufacturing Company
8%
No data available
Comms Service Provider
9%
Computer Software Company
9%
Government
8%
Financial Services Firm
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business47
Midsize Enterprise20
Large Enterprise51
No data available
By reviewers
Company SizeCount
Small Business40
Midsize Enterprise12
Large Enterprise15
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
Ask a question
Earn 20 points
Datadog vs ELK: which one is good in terms of performance, cost and efficiency?
With Datadog, we have near-live visibility across our entire platform. We have seen APM metrics impacted several time...
What do you like most about Elastic Security?
Elastic provides the capability to index quickly due to the reverse indexes it offers. This data is crucial as it con...
What is your experience regarding pricing and costs for Elastic Security?
I am satisfied with the pricing, setup cost, and licensing cost. It is a pure 10.
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
No data available
Elastic SIEM, ELK Logstash
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Information Not Available
Texas A&M, U.S. Air Force, NuScale Power, Martin's Point Health Care
Find out what your peers are saying about CrowdStrike, SentinelOne, Microsoft and others in Endpoint Detection and Response (EDR). Updated: May 2026.
895,990 professionals have used our research since 2012.