No more typing reviews! Try our Samantha, our new voice AI agent.

MetaDefender Endpoint vs Stellar Cyber Open XDR comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 15, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Ranking in Endpoint Detection and Response (EDR)
7th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
110
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Extended Detection and Response (XDR) (6th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (1st)
MetaDefender Endpoint
Ranking in Endpoint Detection and Response (EDR)
72nd
Average Rating
0.0
Reviews Sentiment
5.7
Number of Reviews
1
Ranking in other categories
No ranking in other categories
Stellar Cyber Open XDR
Ranking in Endpoint Detection and Response (EDR)
55th
Average Rating
0.0
Reviews Sentiment
7.0
Number of Reviews
2
Ranking in other categories
Security Information and Event Management (SIEM) (48th), User Entity Behavior Analytics (UEBA) (27th), Network Traffic Analysis (NTA) (19th), Security Orchestration Automation and Response (SOAR) (24th), Network Detection and Response (NDR) (20th), Extended Detection and Response (XDR) (36th), Identity Threat Detection and Response (ITDR) (17th)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
Jasmit Singh Juneja - PeerSpot reviewer
CEO & Technology Specialist at Karman Infotech Private Limited
Comprehensive endpoint visibility and multilayer security have strengthened compliance and protected removable media in critical environments
I work with the data sanitization feature, including USB. When it comes to data integrity, it is not meant for data integrity; it will modify your data. It will not look into your content, but it will look into embedded objects, such as hyperlinks, scripts, and any other embedded object, macro, and images. It will remove that potential malicious content, sanitize the hyperlink, remove the macro, sanitize the embedded objects, and remove the scripts if they are attached in your document to prevent you from zero-day attacks. MetaDefender Endpoint has an excellent malware detection feature; it has around thirty plus different anti-malware engines, so the detection ratio can go up to ninety-nine point nine percent. The vulnerability assessment feature definitely helps to address system vulnerabilities. You will have visibility of the vulnerability, and it is a continuous assessment. You will get complete visibility of your environment and of your endpoint.
Hrishiraj Bhattacharjee - PeerSpot reviewer
Founder & CEO at Team Karimganj
Correlates incidents, allows for quicker identification and helps prioritize investigations
The only challenge is, and that’s where we come into play, it’s a pretty high-tech platform. So, it’s difficult for small and medium-sized organizations to manage it on their own. It’s a very complex system. It requires a lot of expertise. All my guys who work on it have gone through certification from Stellar itself. There are three different certifications that you need to complete. Only then are you certified by Stellar to work on it. It’s a very complex platform. Not everyone can use it. A simple IT engineer or system admin won’t be able to handle it because it’s quite complex. You need to have an understanding of the industry, the subject, and the tool. So, just purchasing this tool or license and then using it on your own would be very difficult to configure and manage on a day-to-day basis. The pricing model is not suitable for small and medium companies, particularly small companies. The minimum pricing model they have is suitable for companies with more than one thousand users. So, if someone has 50 to 100 users, like typical small companies, it’s difficult for them because the cost involved is high. Stellar would charge you for those thousand users, but you do not need all those users. So what are they going to do? I guess Stellar does not want to target small companies directly and maybe relies on resellers and MSPs like us to sell it. So, that is something I would recommend changing. Otherwise, it’s a great tool, but because of the pricing model, small companies are unable to leverage the advantage of this beautiful tool. So, the pricing model should be suitable for small and medium businesses. The product currently has vulnerability monitoring and everything. But if they could also do something about vulnerability management and maybe patch management, that would be nice.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Palo Alto is the core of the security infrastructure in the environment."
"It integrates well into the environment."
"We can visualize and control the activities in the environment from anywhere."
"The stability is pretty good except for one or two cases, and based on the performance, it's been okay with pretty high performance, no bugs or glitches, and it doesn't crash or freeze."
"The information the dashboard provides is very clear."
"The tool's use cases are relevant to security."
"The anti-exploit is impenetrable. We chose Traps because it is the only product that we were not able to get anything past."
"It has absolutely improved the way our organization functions, we are more secure, it is giving us more peace of mind, and it has found malicious activity happening on our endpoints that probably would not have been detected if we didn't have it."
"Altogether, it is going to be complete endpoint protection and visibility."
"It can integrate with almost any cybersecurity tool available in the market."
"Stellar Cyber Open XDR offers these functionalities at a more affordable price, making it easier for me to position it with price-sensitive customers."
 

Cons

"Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth."
"The encryption is not up to the mark."
"The solution lags to the real-time scenarios here and there."
"The downside to the solution is that there are a large number of false positives."
"The price could be a little lower."
"Additionally, I think the price is very high, and if it can be adjusted, I believe it will be a very good solution."
"The main issue I could point out is the offline agents and the way that it is missing."
"Whenever the tool releases a new version when deploying the product across the organization, I feel like there are some disturbances in the CPU usage after upgrading the tool to the latest version."
"The negative aspect is that it only provides visibility; you require integration with multiple products to get complete control."
"I would rate the stability at about five to six. The platform requires some fine-tuning, especially when integrating data sources and creating connectors."
"Support is an issue because they have a limited number of resources."
 

Pricing and Cost Advice

"Cortex XDR is a costly solution."
"Very costly product."
"It has a yearly renewal."
"The pricing is a little bit on the expensive side."
"It has a higher cost than other solutions, like CrowdStrike or Microsoft’s EDR tools, but it reduces the cost of our operations because it’s a new generation antivirus tool."
"Every customer has to pay for a license because it doesn't work with what you get from a managed services provider."
"The tool's price is moderate."
"This is an expensive solution."
Information not available
"It’s a single license platform."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
886,976 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
13%
Financial Services Firm
12%
Comms Service Provider
8%
Manufacturing Company
7%
No data available
Manufacturing Company
13%
Comms Service Provider
10%
Computer Software Company
9%
Financial Services Firm
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business45
Midsize Enterprise20
Large Enterprise48
No data available
No data available
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
What needs improvement with MetaDefender Endpoint?
The negative aspect is that it only provides visibility; you require integration with multiple products to get comple...
What is your primary use case for MetaDefender Endpoint?
There are multiple use cases for MetaDefender Endpoint. The main one is a compliance check and system compliance chec...
What is your experience regarding pricing and costs for Stellar Cyber Open XDR?
Pricing is a major benefit of Stellar Cyber Open XDR. I rate it between three and four on the cost scale. It offers f...
What needs improvement with Stellar Cyber Open XDR?
I am currently evaluating Stellar Cyber Open XDR in terms of their support. I do not see any major areas for improvem...
What is your primary use case for Stellar Cyber Open XDR?
I use Stellar Cyber Open XDR ( /products/stellar-cyber-open-xdr-reviews ) as a 24/7 security monitoring tool, especia...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
No data available
No data available
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Information Not Available
Sumitomo Chemical USA, PlastiPak Packaging, University of Denver, Large California State Agency, Large Midwestern American City
Find out what your peers are saying about CrowdStrike, SentinelOne, Microsoft and others in Endpoint Detection and Response (EDR). Updated: April 2026.
886,976 professionals have used our research since 2012.