No more typing reviews! Try our Samantha, our new voice AI agent.

Fidelis Elevate vs Symantec SSL Visibility Appliance comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
110
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Endpoint Detection and Response (EDR) (6th), Extended Detection and Response (XDR) (5th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (1st)
Fidelis Elevate
Average Rating
8.4
Reviews Sentiment
7.2
Number of Reviews
7
Ranking in other categories
Endpoint Detection and Response (EDR) (58th), Threat Deception Platforms (8th), SSL/TLS Decryption (4th), Network Detection and Response (NDR) (22nd), Managed Detection and Response (MDR) (31st), Extended Detection and Response (XDR) (40th)
Symantec SSL Visibility App...
Average Rating
7.0
Number of Reviews
3
Ranking in other categories
SSL/TLS Decryption (1st)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
Mostafa Ameen - PeerSpot reviewer
Information Security Engineer at ICT Misr
Advanced threat detection capabilities with comprehensive incident response features providing robust cybersecurity for organizations
The initial aspect concerns two engines. The first one mentioned is available for searching behaviors directly. The second engine involves the Google Ade tool, which operates on the machine. The challenge arises when attempting to rectify protection rules, causing confusion. It would be beneficial to enhance Rigixs Query. I encounter difficulty removing certain entries in behavior or alerts; likewise, I am unable to add specific calls.
cto543714 - PeerSpot reviewer
CTO at a tech services company with 11-50 employees
Feature-rich, works as advertised, and sends decrypted traffic at close-to-line speed to products that can't decrypt
The ability to do SSL chaining is most valuable. It provides the ability to send decrypted traffic at close-to-line speed to products that can't decrypt. So, it can take the decrypted traffic and send it to your IPS or your other tools to be able to see what's inside of that traffic for DLP or malicious content detection. That's the whole beauty of it. It was probably the elephant in the room for the longest in terms of SSL decryption. It can get the high band, especially for places that had a lot of decryption to do, such as big finance companies, big telcos, etc. It is a really good product. It has different features and things built into it. Feature-wise, they're the elephant in the room.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"They did what they said, and this solution could apply to any scenario."
"They have a new GUI which is just fantastic."
"The dashboard is customizable."
"It's very stable. I've never experienced downtime for the ASM console or ASM core."
"The solution's most valuable feature is the user interface."
"If you are looking to deploy a security solution as a whole, this is a good option."
"We have a complete overview of all our PCs and it's very easy to handle and to use the interface. It has a lot of benefits for us."
"The most valuable for us is the correlation feature."
"There are many valuable features. The NDR gives very good network visibility, and the endpoint module has a great feature called "Live Connect" for remote connections. They also have "Tasks" that can be run on endpoints to gather specific information or retrieve logs."
"The technical support is very helpful."
"The initial setup is very straightforward. The deployment of the server doesn't take so long; about a day or two max."
"It has a rating system now so you can rate things up or down, depending on your environment. This means alerting can be customized, yet still pick up anomalies."
"The solution's technical support is perfect, so I rate the technical support a ten out of ten"
"What I like the most about this solution is the complexity. It covers a lot of areas, unlike other solutions."
"It is used as our primary in-line IDS/IPS system, replacing FireEye NX, and it catches more, looks at more ports than FireEye NX, and is a scalable appliance, unlike our NX which was saturated and shut itself down."
"It has also improved our hunt ability with quick search tools, to zone in on malware or other anomalies. It is able to link items to incidents from other consoles, and works natively with the SIEM."
"Since implementing this solution, we have enhanced our detection rates and our proxy."
"The most valuable feature is the Fail-to-Network (FTN) option, which means that if for any reason the appliance goes down then there is no interruption in traffic."
"The ability to do SSL chaining is most valuable. It provides the ability to send decrypted traffic at close-to-line speed to products that can't decrypt. So, it can take the decrypted traffic and send it to your IPS or your other tools to be able to see what's inside of that traffic for DLP or malicious content detection. That's the whole beauty of it. It was probably the elephant in the room for the longest in terms of SSL decryption. It can get the high band, especially for places that had a lot of decryption to do, such as big finance companies, big telcos, etc."
"The most valuable feature is the Fail-to-Network (FTN) option, which means that if for any reason the appliance goes down then there is no interruption in traffic."
"One of the most valuable aspects of this solution is that it's easy to deploy without a lot of complications."
"This is the easiest solution and I did a little bit of research before and I could not find another solution that does this."
"It is a really good product, and I don't have any problems with it."
 

Cons

"In general, the price could be more competitive."
"There's an overall lack of features."
"This product has not improved my organization - in fact, we are in the process of moving back to another product as a result of Cortex's horrible impact on system performance."
"Every 30 or 40 days, there's a new version and we need to go and make sure our customer's laptops are upgraded."
"While using Cortex, I noticed some aspects that could be improved, such as increasing the synchronization speed between XDR and Xnor."
"The solution needs better reports. I think they should let the customer go in and customize the reports."
"Previously, the endpoint would leave the environment, not being on our VPN, essentially unable to interact with the server to upload files. It was unable to retrieve new file verdicts. It was using a thing called "local analysis" to determine if something was a malicious file or not. There was no dynamic analysis."
"The only issues that we have are, one the cost, two the dashboard is not very intuitive, even though you can drill down within the dashboard, we usually have to gather information from other sources to determine locations and if its a false positive."
"The interface bug needs to be squashed once and for all. This has been the predominant issue with an otherwise stellar product. It reboots itself unscheduled, about once a month, due to a memory buffer flaw in the interface."
"We position the solution as an antivirus, but this part of the solution needs improvement."
"The reports in the endpoint area of Elevate can be improved."
"The reports in the endpoint area of Elevate can be improved."
"There is room for improvement in email security. It's a security issue. If you're aiming for XDR, covering the entire threat landscape is crucial."
"I encounter difficulty removing certain entries in behavior or alerts; likewise, I am unable to add specific calls."
"We position the solution as an antivirus, but this part of the solution needs improvement. They need to generally enhance the features that they have, rather than adding anything new."
"Configuration, in terms of building the collector and communicating with endpoints, is complex."
"When it comes to tech support, they have challenges everywhere."
"Technical support needs to be improved."
"From the operations perspective, they have to come up with easier ways so that the operational guys can easily manage it."
"These days, I have not been happy with technical support."
"They're working on being able to handle more traffic. They're working on bigger boxes full of throughput because now networks are going to 40 gigs and 100 gigs. So, trying to keep up with the bandwidth demands is where things are being pushed."
"We haven't been satisfied with their support for around two months now."
 

Pricing and Cost Advice

"The price was fine."
"The pricing is a little high. It is per user per year."
"We didn't have to pay any additional fee for the cloud instance. It just came with the renewal, which was nice."
"Our license will require renewal in August, after which the maintenance will continue as usual."
"Traps pays for itself within the first 16 months of a three-year subscription. This is attributed to OPEX savings, as security teams spent less time trying to identify and isolate malware for analysis as a result of a reduction in malware incidents, false positives, and breach avoidance."
"The price is on the higher side, but it's okay."
"It's about $55 per license on a yearly basis."
"Compared to CrowdStrike, Cortex XDR is an expensive solution."
"Fidelis Endpoint is an expensive product. My company makes yearly payments toward the licensing cost of the solution."
"It's quite expensive but we can customize it to reduce the price."
"It's somehow expensive. From one to ten, I would rate it a five. They need to improve the prices. It's very high."
"You license by the number of days of logs you need to maintain visibility for. Forty-five days is a good solid number for a company with around a 10k user base."
"Licensing fees are billed annually and we purchased a three-year license."
report
Use our free recommendation engine to learn which SSL/TLS Decryption solutions are best for your needs.
893,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Construction Company
12%
Comms Service Provider
9%
Manufacturing Company
8%
Financial Services Firm
16%
Manufacturing Company
10%
Comms Service Provider
10%
Construction Company
8%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business46
Midsize Enterprise20
Large Enterprise49
By reviewers
Company SizeCount
Small Business6
Large Enterprise2
No data available
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
Ask a question
Earn 20 points
Ask a question
Earn 20 points
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Fidelis Elevate Platform, Fidelis Enterprise, Fidelis Cloud, Fidelis Managed Detection and Response, Fidelis Deception, Fidelis Decryption, Fidelis Endpoint, Fidelis Network
No data available
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
First Midwest Bank
Information Not Available
Find out what your peers are saying about Fidelis Elevate vs. Symantec SSL Visibility Appliance and other solutions. Updated: April 2026.
893,311 professionals have used our research since 2012.