No more typing reviews! Try our Samantha, our new voice AI agent.

Fidelis Elevate vs Tanium comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 18, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Ranking in Endpoint Detection and Response (EDR)
6th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
110
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Extended Detection and Response (XDR) (5th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (1st)
Fidelis Elevate
Ranking in Endpoint Detection and Response (EDR)
58th
Average Rating
8.4
Reviews Sentiment
7.2
Number of Reviews
7
Ranking in other categories
Threat Deception Platforms (8th), SSL/TLS Decryption (4th), Network Detection and Response (NDR) (22nd), Managed Detection and Response (MDR) (31st), Extended Detection and Response (XDR) (40th)
Tanium
Ranking in Endpoint Detection and Response (EDR)
22nd
Average Rating
7.8
Reviews Sentiment
6.2
Number of Reviews
22
Ranking in other categories
Server Monitoring (4th), Vulnerability Management (25th), Endpoint Protection Platform (EPP) (16th), Unified Endpoint Management (UEM) (7th)
 

Mindshare comparison

As of May 2026, in the Endpoint Detection and Response (EDR) category, the mindshare of Cortex XDR by Palo Alto Networks is 3.4%, down from 4.0% compared to the previous year. The mindshare of Fidelis Elevate is 0.9%, up from 0.4% compared to the previous year. The mindshare of Tanium is 1.9%, down from 2.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR) Mindshare Distribution
ProductMindshare (%)
Cortex XDR by Palo Alto Networks3.4%
Tanium1.9%
Fidelis Elevate0.9%
Other93.8%
Endpoint Detection and Response (EDR)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
Mostafa Ameen - PeerSpot reviewer
Information Security Engineer at ICT Misr
Advanced threat detection capabilities with comprehensive incident response features providing robust cybersecurity for organizations
The initial aspect concerns two engines. The first one mentioned is available for searching behaviors directly. The second engine involves the Google Ade tool, which operates on the machine. The challenge arises when attempting to rectify protection rules, causing confusion. It would be beneficial to enhance Rigixs Query. I encounter difficulty removing certain entries in behavior or alerts; likewise, I am unable to add specific calls.
MA
Division Manager, Information Technology at a legal firm with 51-200 employees
Centralized policies have improved remote endpoint control and have simplified data visibility
The integration is not simple and easy. It requires experienced users or people who have done the implementation. When certain policies are applied, they do not immediately push the policies. For example, we manage endpoint device USB access. We set a policy to block it, but it does not come into effect immediately. Sometimes it takes three or four days for it to reflect. That is a pain point. I have raised this issue with support as well, but they said that I need to limit the number of devices in the policy. In terms of application deployment, for us, it was seamless.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We've had a significant increase in blocking with a decrease in false positives, because it's looking at how the files work, not just a list of files that it's been told to look for."
"The most valuable features of this product are the management capabilities, which allow an IT organization to get quite a good picture of attempted cyber attacks, and its out-of-the-box investigation capabilities."
"The interface is easy to use and it is more up to date than our previous solution."
"If you are looking to deploy a security solution as a whole, this is a good option."
"We have a complete overview of all our PCs and it's very easy to handle and to use the interface. It has a lot of benefits for us."
"The most valuable features are incident creation, policy-based protection, IP whitelisting, and device encryption. These are beneficial for endpoint and server security."
"But overall, when we speak about security and protection, they are one of the top providers."
"It is a simple platform to use."
"After rack and stack, devices were up and running base configurations within two hours. As with any IPS, tuning is required to stop false positives. This is no different, but the ease of use of the interface allowed my team to start making adjustments within a few hours."
"It is used as our primary in-line IDS/IPS system, replacing FireEye NX, and it catches more, looks at more ports than FireEye NX, and is a scalable appliance, unlike our NX which was saturated and shut itself down."
"Compared to similar solutions, it's quite scalable. You just need to add more storage to scale-up."
"The initial setup is very straightforward. The deployment of the server doesn't take so long; about a day or two max."
"It has a rating system now so you can rate things up or down, depending on your environment. This means alerting can be customized, yet still pick up anomalies."
"What I like the most about this solution is the complexity; it covers a lot of areas, unlike other solutions."
"Reporting is great, it is easy to do a quick search through 45 days of data for something of interest."
"It ensures the stability of network behavior across various aspects of our network and offers responsive capabilities to address incidents promptly"
"I like the fact that you can create patching campaigns depending on the area of your network that you want to address first."
"When I push a quick update, it's done right away, and I can rescan immediately to confirm completion within minutes."
"When I push a quick update, it's done right away, and I can rescan immediately to confirm completion within minutes."
"Tanium has made the process of detecting threats more proactive with its detection, so the process is easier and more efficient."
"The interrogation piece was the most valuable feature because it was very detailed."
"Tanium has made the process of detecting threats more proactive with its detection. So, the process is easier and more efficient."
"For inventory purposes, it's from one of the best things on the scene, as you can get live inventory."
"Tanium is highly scalable."
 

Cons

"This product has not improved my organization - in fact, we are in the process of moving back to another product as a result of Cortex's horrible impact on system performance."
"Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth."
"The MAC agent is not as robust feature-wise as the PC version."
"For Cortex XDR by Palo Alto Networks, if I had to point out improvements, I would say the UI is still somewhat difficult for beginners."
"Cortex XDR by Palo Alto Networks is a very good product, but financially, it is very expensive, so the company should look into that area."
"Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth."
"Data privacy is a matter of concern. You have to be careful with data privacy, it can be sensitive and Cortex can have most of your access."
"The solution needs better reports. I think they should let the customer go in and customize the reports."
"The interface bug needs to be squashed once and for all."
"I encounter difficulty removing certain entries in behavior or alerts; likewise, I am unable to add specific calls."
"The reports in the endpoint area of Elevate can be improved."
"Configuration, in terms of building the collector and communicating with endpoints, is complex."
"The reports in the endpoint area of Elevate can be improved."
"We position the solution as an antivirus, but this part of the solution needs improvement."
"Configuration, in terms of building the collector and communicating with endpoints, is complex."
"We position the solution as an antivirus, but this part of the solution needs improvement. They need to generally enhance the features that they have, rather than adding anything new."
"The solution can give a lot of false positives."
"The main issues are the network connection because different customers have issues with their networks."
"Most of the time, agent-relative issues have to be more equipped with self-healing features."
"Tanium's limitations should be improved because although it is a great tool, it is limited to only a few classes during a session."
"There are downsides and drawbacks in Tanium, and there is room for improvement from my perspective."
"We set a policy to block USB access. The moment a device is being set up on the network, I apply the policy, but it does not come into effect immediately."
"Tanium’s scalability could be improved."
"There are some bugs in the product. The tool needs to improve in the area of reporting."
 

Pricing and Cost Advice

"The pricing seems fair, and I do like the licensing model. You use wherever they are, and it is elastic."
"The return on investment is from the user side because we have seen the performance of it increase the delivery time of the product if we are using too many web-based and on-premise applications. In indirect ways, we saw the return of investment in terms of performance and user satisfaction increase."
"It is present, but when compared to other competitive products, I would say it is not less expensive; however, when all of the other added values are considered, the price is reasonable."
"We pay about $50,000 USD per year for a bundle that includes Cortex XDR."
"I did PoCs on products called Cylance and CrowdStrike. Although, I consider these products and they were also good, when it come to cost and budgetary factors, Traps has been proven to be better than the other two products. It is quite cost-effective and delivers all the entire solution which we require."
"It is cost-effective compared to similar solutions. It fits for the small businesses through to the big businesses."
"The cost of Cortex XDR by Palo Alto Networks is $55 to $90 USD per endpoint per month."
"It's way too expensive, but security is expensive. You pay for your licensing, and then you pay for someone to monitor the stuff."
"It's quite expensive but we can customize it to reduce the price."
"Fidelis Endpoint is an expensive product. My company makes yearly payments toward the licensing cost of the solution."
"You license by the number of days of logs you need to maintain visibility for. Forty-five days is a good solid number for a company with around a 10k user base."
"It's somehow expensive. From one to ten, I would rate it a five. They need to improve the prices. It's very high."
"It is higher than some competitors in the market."
"The solution offers value for money."
"The solution is expensive but it's a good investment."
"Tanium is a more expensive solution in Latin America than some of the competitors, such as BigFix."
"It's an expensive solution. It would be nice if the cost were lower."
"The product's pricing differs from region to region depending on negotiations and the number of endpoints."
"There is an annual license required to use this solution."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
892,868 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Construction Company
12%
Comms Service Provider
8%
Manufacturing Company
8%
Financial Services Firm
17%
Manufacturing Company
10%
Comms Service Provider
8%
Construction Company
8%
Financial Services Firm
15%
Government
11%
Manufacturing Company
9%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business45
Midsize Enterprise21
Large Enterprise48
By reviewers
Company SizeCount
Small Business6
Large Enterprise2
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise3
Large Enterprise12
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
Ask a question
Earn 20 points
What needs improvement with Tanium?
While there is always room for improvement, I am pleased with Tanium.
What is your primary use case for Tanium?
The primary use case for Tanium ( /products/tanium-reviews ) is compliance, patching, and inventory as part of the co...
What advice do you have for others considering Tanium?
For smaller companies, Tanium is quite a big investment, and one needs to have a considerable setup to make it econom...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Fidelis Elevate Platform, Fidelis Enterprise, Fidelis Cloud, Fidelis Managed Detection and Response, Fidelis Deception, Fidelis Decryption, Fidelis Endpoint, Fidelis Network
Tanium Inc Cloud, Tanium XEM
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
First Midwest Bank
JPMorgan Chase, eBay, Amazon, US Bank, MetLife, pwc, Cerner, Delphi, MGM Grand, New York Life
Find out what your peers are saying about Fidelis Elevate vs. Tanium and other solutions. Updated: April 2026.
892,868 professionals have used our research since 2012.