


Find out in this report how the two Endpoint Detection and Response (EDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 3.4% |
| Kandji | 0.5% |
| Rapid7 InsightIDR | 1.2% |
| Other | 94.9% |


| Company Size | Count |
|---|---|
| Small Business | 46 |
| Midsize Enterprise | 20 |
| Large Enterprise | 49 |
| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 5 |
| Large Enterprise | 6 |
| Company Size | Count |
|---|---|
| Small Business | 21 |
| Midsize Enterprise | 5 |
| Large Enterprise | 6 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
Kandji offers a comprehensive device management platform, ideal for managing Apple devices. Its intuitive interface and automation streamline device workflows, enhancing security and ease of use.
Kandji stands out with its efficient administration of iOS and Mac devices, featuring a user-friendly interface, exceptional support, and reliable management capabilities. The intuitive blueprinting aids in remote device management, while automated functions streamline workflows. Users benefit from time-saving features like app deployment and updates. Although it could improve its application suite, flexibility, and support for Windows and Android, it remains a favored choice for its ability to manage large-scale environments efficiently, automating updates and securing endpoints. Users appreciate the seamless setup and impactful operational management.
What are the standout features of Kandji?In industries focusing on Apple devices, Kandji proves invaluable. Its application in device administration, app deployment, policy enforcement, and endpoint security makes it a preferred MDM platform, offering solutions tailored to manage device enrollments and enhance security, thus supporting businesses in maintaining streamlined operations.
Rapid7 InsightIDR is a cloud-based security information and event management solution known for its user behavior analytics, offering rapid detection and response capabilities while facilitating seamless integration across systems.
Rapid7 InsightIDR is designed to enhance threat detection and investigation through its efficient user behavior analytics and advanced threat intelligence framework. The platform's cloud-based deployment ensures rapid setup and comprehensive event monitoring across diverse IT environments, including endpoints and Office 365. Its intuitive interface supports seamless data collection, honing in on threat detection through honeypot utilization and intelligent alerting. However, it is noted for lacking some customization features and better integration, especially with Microsoft and ITSMs.
What are the key features of Rapid7 InsightIDR?Rapid7 InsightIDR is prominently used in security operation centers to manage events, detect threats, and respond effectively. Industries apply it for network behavior monitoring, compliance, and vulnerability management. Companies integrate it with security tools to boost threat investigation, ensuring full SIEM functionalities and robust log management capacities. Its application spans behavioral and intrusion analytics, aiding in monitoring and addressing malicious activities.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.