No more typing reviews! Try our Samantha, our new voice AI agent.

MetaDefender Endpoint vs Trellix Endpoint Detection and Response (EDR) comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 15, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Ranking in Endpoint Detection and Response (EDR)
7th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
109
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Extended Detection and Response (XDR) (6th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (1st)
MetaDefender Endpoint
Ranking in Endpoint Detection and Response (EDR)
72nd
Average Rating
0.0
Reviews Sentiment
5.7
Number of Reviews
1
Ranking in other categories
No ranking in other categories
Trellix Endpoint Detection ...
Ranking in Endpoint Detection and Response (EDR)
24th
Average Rating
7.4
Reviews Sentiment
6.8
Number of Reviews
25
Ranking in other categories
No ranking in other categories
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
Jasmit Singh Juneja - PeerSpot reviewer
CEO & Technology Specialist at Karman Infotech Private Limited
Comprehensive endpoint visibility and multilayer security have strengthened compliance and protected removable media in critical environments
I work with the data sanitization feature, including USB. When it comes to data integrity, it is not meant for data integrity; it will modify your data. It will not look into your content, but it will look into embedded objects, such as hyperlinks, scripts, and any other embedded object, macro, and images. It will remove that potential malicious content, sanitize the hyperlink, remove the macro, sanitize the embedded objects, and remove the scripts if they are attached in your document to prevent you from zero-day attacks. MetaDefender Endpoint has an excellent malware detection feature; it has around thirty plus different anti-malware engines, so the detection ratio can go up to ninety-nine point nine percent. The vulnerability assessment feature definitely helps to address system vulnerabilities. You will have visibility of the vulnerability, and it is a continuous assessment. You will get complete visibility of your environment and of your endpoint.
CESARCASTRO - PeerSpot reviewer
Committee Of IT Cybersececurity at a energy/utilities company with 51-200 employees
Cross-site threat hunting has improved visibility and supports proactive incident response
I believe this is a product in evolution. I do not think it is a final tool to conduct forensics or information forensics of the incidents or information incidents that could arise in our network infrastructure. Trellix Endpoint Detection and Response (EDR) is interesting and is a very good entry point that has been evolving through the last years. In the next two months, I have a new contract, and we are pointing out to have an XDR solution with NDR and EDR together. I do not have enough time to do it because I am the manager. However, my coworkers do not understand it yet. I have a contract with a third-party company that is making reports around that, but also they do not have enough experience or enough utility of this. It would be interesting if I have a notification system from EDR. For example, if I am the manager, it would be interesting to have a warning, alarm, or something around that which could call me to get into the system and the dashboard to see what is happening. For example, if it is a high-level threat. However, most of them are just advisory or warnings. I do not enter the tool frequently. I guess I access it once every three months.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Best solution for avoiding security breaches, malware attacks, and other kinds of security issues."
"Cortex XDR is a very capable solution for protecting large networks and a lot of endpoints. It's very useful because the automation is very high, and if you combine it with the features on Palo Alto firewalls, it provides very strong protection."
"Its interface and pricing are most valuable, and it is better than other vendors in terms of security."
"Cortex is the best tool for endpoint detection, and I have used it to verify hashes or domains to identify malicious activity, trigger playbooks that automate and gather endpoint logs, block malicious processes, and update incident tickets, showcasing end-to-end processes with automation in investigation and reducing the analysis workflow."
"It collects and caches and the knowledge of machine learning from different customers to take to the cloud, it makes it better to use for everybody, it allows for quick learning and updates and can, therefore, offer zero-day malware security, and this sharing of metadata helps make the solution very safe."
"It has absolutely improved the way our organization functions, we are more secure, it is giving us more peace of mind, and it has found malicious activity happening on our endpoints that probably would not have been detected if we didn't have it."
"Threat identification and detection are the most valuable features of this solution."
"The best feature of Cortex XDR by Palo Alto Networks is that it collects logs from different sections such as the endpoint, the network, and the cloud, making it easy to investigate alerts, collect some of the investigation packages related to the infected machines, and provide live response."
"Altogether, it is going to be complete endpoint protection and visibility."
"The cost is okay, compared to other products."
"If there is any malicious behavior in the workstation or server, the tool stops or isolates it automatically and generates alerts."
"Trellix Endpoint Detection and Response (EDR) offers endpoint protection and helps collect information while also allowing users to investigate malicious files in an IT environment...It is a stable solution...It is a scalable solution."
"It has been helpful in terms of identifying unknown threats."
"What we're using the most and what we found valuable in McAfee MVISION Endpoint Detection and Response are Web Control, Advanced Threat Protection, and Threat Prevention features."
"Trellix Endpoint Detection and Response (EDR) is valuable because we have a Wide Area Network with many sites, and the EDR is cross-site since it is installed and managed from the cloud."
"Trellix has a user-friendly interface."
"This is a stable product."
 

Cons

"In general, the price could be more competitive."
"A little bit more automation would be nice."
"While using Cortex, I noticed some aspects that could be improved, such as increasing the synchronization speed between XDR and Xnor."
"It should support more mobile operating systems. That is one of the cons of their infrastructure right now."
"I recommend adding a data loss prevention (DLP) solution to Cortex XDR by Palo Alto Networks. The inclusion of this feature would allow the application of DLP policies alongside antivirus policies via a single agent and console, making it more competitive as other OEMs often offer DLP solutions as part of their antivirus products."
"We have found that there are times Cortex XDR by Palo Alto Networks does not detect some of the viruses, we have to use another protection solution called Kaspersky."
"They've been having some issues with updating their endpoint agents, and it has been quite frustrating."
"Palo Alto Networks Cortex XDR does not detect malicious activity like in other anti-virus solutions like Trend Micro and Windows with Cisco."
"The negative aspect is that it only provides visibility; you require integration with multiple products to get complete control."
"This is the worst technical support. Without OEM support, you can't handle this product."
"I remember doing many tickets for Trellix support, and my EDR was not properly functioning. I didn't feel the detection or the real protection."
"One of their issues is that they were very much based on agents, whereas most of the other solutions are clientless."
"The endpoints and utilization are too high, which impacts the production activity."
"The searching capabilities for the IOCs can be further improved"
"When it comes to some unknown fileless attacks, the tool is not able to detect them properly, making it an area where improvements are required."
"The console has a lot of bugs, and it creates many issues."
"I need some protection, possibly multi-factor authentication improvements."
 

Pricing and Cost Advice

"The cost depends on your chosen license type, like Pro or other licenses."
"The price of the solution could be reduced. I have customers that have voiced that the solution is good for the value but if I want to sell more of the solution the price reduction would help."
"Cortex XDR's pricing is ok."
"Our customers have expressed that the price is high."
"The solution is expensive. It's pricing is on a yearly-basis."
"The solution has one subscription for endpoint protection and one subscription for detection and response. The two licenses combined give you the BRO version."
"I don't have any issues with the pricing. We are satisfied with the price."
"Traps pays for itself within the first 16 months of a three-year subscription. This is attributed to OPEX savings, as security teams spent less time trying to identify and isolate malware for analysis as a result of a reduction in malware incidents, false positives, and breach avoidance."
Information not available
"The licensing costs attached to the solution are very easy to manage. There is a need to make yearly payments towards the licensing costs."
"Pricing for McAfee MVISION Endpoint Detection and Response is not that expensive, but it's not something that a startup could buy. Pricing for it is for midsized businesses. There's an additional payment if you want data retention for more than thirty days. They gave us data retention for thirty days. Then if you want longer data retention, they have the paid option for a three-month data retention period and for a one-year data retention period."
"Pricing is a problem in South Africa. It could be cheaper here. The rand-to-dollar exchange rate makes it expensive for us. A 25 dollar endpoint cost becomes quite significant when converted to rand."
"The cost is okay, compared to other products."
"The price is reasonable."
"On a scale of one to ten, where one is low and ten is high, I rate the solution's pricing an eight out of ten."
"Speaking about the price, you must use the product to find the product's cost for you."
"The product’s pricing is reasonable."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
886,468 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
13%
Financial Services Firm
13%
Comms Service Provider
7%
Manufacturing Company
7%
No data available
Financial Services Firm
14%
Government
8%
Computer Software Company
8%
University
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business44
Midsize Enterprise20
Large Enterprise48
No data available
By reviewers
Company SizeCount
Small Business14
Midsize Enterprise3
Large Enterprise11
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
What needs improvement with MetaDefender Endpoint?
The negative aspect is that it only provides visibility; you require integration with multiple products to get comple...
What is your primary use case for MetaDefender Endpoint?
There are multiple use cases for MetaDefender Endpoint. The main one is a compliance check and system compliance chec...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
No data available
McAfee MVISION EDR, MVISION EDR, MVISION Endpoint Detection and Response
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Information Not Available
Sutherland Global Services
Find out what your peers are saying about CrowdStrike, SentinelOne, Microsoft and others in Endpoint Detection and Response (EDR). Updated: April 2026.
886,468 professionals have used our research since 2012.