


Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP).
| Product | Mindshare (%) |
|---|---|
| Intercept X Endpoint | 1.7% |
| Microsoft Defender for Endpoint | 7.0% |
| CrowdStrike Falcon | 6.2% |
| Other | 85.1% |
| Product | Mindshare (%) |
|---|---|
| VMware Carbon Black App Control | 11.0% |
| ThreatLocker Zero Trust Platform | 17.6% |
| Airlock Digital Application Control | 11.8% |
| Other | 59.599999999999994% |

| Company Size | Count |
|---|---|
| Small Business | 46 |
| Midsize Enterprise | 20 |
| Large Enterprise | 49 |
| Company Size | Count |
|---|---|
| Small Business | 76 |
| Midsize Enterprise | 21 |
| Large Enterprise | 22 |
| Company Size | Count |
|---|---|
| Small Business | 4 |
| Large Enterprise | 4 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
Intercept X Endpoint is known for its advanced threat detection, user-friendly interface, and centralized management, alongside powerful cloud-based capabilities that enhance security using AI and machine learning.
Intercept X Endpoint strengthens security posture through AI and machine learning, effectively countering unknown threats. It includes ransomware protection, server lockdown, application control, and synchronized security with Sophos Firewall. Appreciated for preventing data leaks, it ensures superior malware and web filtering, while offering a robust EDR component for managed detection. Highlighted for its scalability and cost-effectiveness, it serves well in endpoint protection, covering antivirus, ransomware, malware, and DLP services across PCs, servers, and mobile devices.
What are the key features of Intercept X Endpoint?Intercept X Endpoint finds usage across industries by protecting endpoints against cyber threats. Deployable through Sophos Central for remote management, it suits entities lacking extensive security expertise. AI algorithms deliver advanced threat protection, making it a smart choice for organizations across different sectors. Aligning with varied technological environments enhances its acceptability, while integration with existing systems is supported.
VMware Carbon Black App Control offers sophisticated application whitelisting, endpoint protection, and security for end-of-life systems through a user-friendly console that supports threat detection and incident response.
Designed for effective application control, VMware Carbon Black App Control strengthens security by preventing unauthorized installations and controlling application execution. It enhances visibility and reporting for comprehensive threat analysis. However, users report frequent false positives, especially with system processes and occasionally with approved software. Integration with Mac OS and reporting features need improvement, and the setup process can be complex without assistance. It utilizes user behavior for identifying files or malware, which some find cumbersome.
What are the key features of VMware Carbon Black App Control?Deployed across industries such as finance, healthcare, and government, VMware Carbon Black App Control is used for securing both virtual and physical servers. It acts as a host-based intrusion detection system, and is ideal for lockdown protection, threat analysis, and controlling application access to protect against attacks. Organizations use it to scan for unauthorized virtual machines, enforcing stricter security protocols.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.