Find out in this report how the two Endpoint Detection and Response (EDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
They appreciate the rich telemetry data from the solution, as it provides in-depth threat identification.
Cortex XDR by Palo Alto Networks helps to reduce my total cost of ownership significantly.
In Cortex XDR by Palo Alto Networks, most of the remediation is automated and the accuracy is quite good.
The time saved includes processes such as software installation, as previously we needed to take a user device remotely, but with Kandji, we can initiate software installation from the back end, which is a significant time saver.
We went from one hour for resolution time per device to 15 minutes, allowing us to save more than 50 hours of support time in a year.
I have seen a return on investment with Kandji, estimating that time saved is at least 20 to 30%, as individuals do not have to figure out which security updates to carry out themselves since the notification is pushed for them to review and install.
The technical support from Palo Alto deserves a mark of ten because they reach out within an hour whenever assistance is needed.
There is no back and forth, and they know what we are asking for and come up with the best resolution for a solution.
If any of these services are missed, it becomes a problem in terms of support tickets, follow-up, or special configuration that needs to be done in the system.
The customer support at Kandji is phenomenal and is the best I have experienced from any vendor.
The customer support is the best I have ever seen.
You just go to the help section and can chat directly to get instant support.
Logpoint's customer support is not sufficient with only one engineer in the US.
The technical support for Logpoint is very good, and I would rate it as nine out of ten.
I recommend a submission to Logpoint because I worked with it before.
You can onboard 10,000 endpoints in just hours, which demonstrates the excellent scalability of this product.
Activating the newly purchased licenses is instantaneous, allowing installations without adjustments since it's cloud-based.
Cortex XDR by Palo Alto Networks can be expanded anytime by purchasing another license without any issues related to scalability.
Kandji's scalability is quite good, though I do see a concern once organizations start getting really large and need more flexibility.
I think Kandji is a perfect choice for growing small companies that become medium-sized or even bigger.
Kandji's scalability is perfect, as my organization grew from 180 to almost 300 devices with no bottlenecks.
It is web-based and accommodates the expansion of our organization.
Logpoint is scalable and capable of expanding.
Cortex remains fast and responsive, even with increasing data and alerts.
The thresholds we've seen on our firewall boxes at some instances reached 80% to 85%, but even at that level of utilization, we don't observe any latency or any issues reported with respect to accessing the application.
Cortex XDR is stable, offering high quality and reliable performance.
I have received reports indicating glitches and downtimes with Logpoint.
Improving reporting and dashboard customization, along with the addition of real-time and exportable reports, would help SOC teams greatly.
The inclusion of this feature would allow the application of DLP policies alongside antivirus policies via a single agent and console, making it more competitive as other OEMs often offer DLP solutions as part of their antivirus products.
If the per GB data could be provided at a certain level free of cost or at the same cost which the customer is taking for the entire bundle, that would be better.
The simplicity and straightforwardness are its strongest attributes.
However, it often takes more than thirty minutes to execute the command, and sometimes it fails.
I hope there is an easier way to sandbox people's bring your own device devices because when we're doing SOC 2, it really wants us to sandbox things so that if someone were to take a device that is not ours, we could delete just our data off there and not theirs.
Dealing with foreign entities for support was a challenge, leading us to switch providers due to lack of adequate support.
Logpoint needs to be cloud-native, as currently, it is not.
Logpoint's UEBA is a weak point, while Exabeam's UEBA has extra AI through automation.
The pricing on SentinelOne is far more reasonable and cheaper than Cortex XDR by Palo Alto Networks.
I would say it is definitely not a cheap product, considering how mature it is and how scalable all Palo Alto products are together.
Cortex XDR is perceived as expensive by some customers, yet offers dynamic pricing.
It is cheap.
The pricing is not published publicly, requiring interaction with sales representatives for details.
While it might be on the expensive side compared to Jamf Pro, it is closer in pricing to other MDMs such as Microsoft Intune, which comes with the EMS E3 license.
I rate the pricing at eight, suggesting it's relatively good or affordable.
It incorporates AI for normal behavior detection, distinguishing unusual operations.
The product provides automation responses in case of a threat attack, severity assessments, centralized manageability, and comprehensive compliance features, resulting in reduced costs.
It includes machine learning to easily analyze data and detect complex threats across endpoints, networks, or clouds.
Kandji has impacted my organization positively by definitely increasing security because it notifies you when an update is ready to be installed, and if you do not install it within a reasonable time frame, it would automatically install it.
It is reliable, a modern approach to managing Apple devices, and with features in blueprints, smart apps, and consistently reliable performance, I do not think Jamf really comes close.
The Auto Apps function is brilliant. It takes 20 seconds to push out a new app, and it automatically updates. This function really saves time.
The UEBA enables us to monitor at the device level, and SOAR provides playbooks and templates that we can modify and incorporate into the platform.
It effectively facilitates logging and log storage and assists in security event management by ingesting security events.
The most valuable feature, which is endpoint security, is included in Logpoint, and an extra feature is the integration.
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 3.4% |
| Kandji | 0.5% |
| Logpoint | 1.0% |
| Other | 95.1% |


| Company Size | Count |
|---|---|
| Small Business | 46 |
| Midsize Enterprise | 20 |
| Large Enterprise | 49 |
| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 5 |
| Large Enterprise | 6 |
| Company Size | Count |
|---|---|
| Small Business | 18 |
| Midsize Enterprise | 3 |
| Large Enterprise | 4 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
Kandji offers a comprehensive device management platform, ideal for managing Apple devices. Its intuitive interface and automation streamline device workflows, enhancing security and ease of use.
Kandji stands out with its efficient administration of iOS and Mac devices, featuring a user-friendly interface, exceptional support, and reliable management capabilities. The intuitive blueprinting aids in remote device management, while automated functions streamline workflows. Users benefit from time-saving features like app deployment and updates. Although it could improve its application suite, flexibility, and support for Windows and Android, it remains a favored choice for its ability to manage large-scale environments efficiently, automating updates and securing endpoints. Users appreciate the seamless setup and impactful operational management.
What are the standout features of Kandji?In industries focusing on Apple devices, Kandji proves invaluable. Its application in device administration, app deployment, policy enforcement, and endpoint security makes it a preferred MDM platform, offering solutions tailored to manage device enrollments and enhance security, thus supporting businesses in maintaining streamlined operations.
Logpoint offers a robust SIEM system tailored for compliance with regulations like PCI DSS and GDPR, enhancing security monitoring and enabling efficient incident response.
Logpoint strengthens cybersecurity by offering essential tools for log collection, security monitoring, and forensic analysis. Its features include an intuitive dashboard, a powerful correlation engine, and extensive third-party integrations, making it a versatile asset for security operations centers. Despite its advantages, areas for improvement include ransomware protection, cloud-native deployment, and more flexible pricing. Improvements in features like SOAR and UEBA functionality can boost its competitiveness.
What are the most important features of Logpoint?Many organizations utilize Logpoint across industries as part of their security infrastructure. It supports standard compliance, orchestrating incident responses and security threat monitoring. Logpoint empowers businesses by integrating and correlating security data, improving cybersecurity posture in varied environments.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.