


Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP).
| Product | Mindshare (%) |
|---|---|
| Microsoft Defender for Endpoint | 7.0% |
| CrowdStrike Falcon | 6.2% |
| SentinelOne Singularity Endpoint | 4.5% |
| Other | 82.3% |
| Product | Mindshare (%) |
|---|---|
| OpenText EnCase eDiscovery | 3.7% |
| Microsoft Purview eDiscovery | 5.9% |
| kCura Relativity | 5.8% |
| Other | 84.6% |



| Company Size | Count |
|---|---|
| Small Business | 46 |
| Midsize Enterprise | 20 |
| Large Enterprise | 49 |
| Company Size | Count |
|---|---|
| Small Business | 82 |
| Midsize Enterprise | 45 |
| Large Enterprise | 96 |
| Company Size | Count |
|---|---|
| Small Business | 2 |
| Midsize Enterprise | 2 |
| Large Enterprise | 3 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
Microsoft Defender for Endpoint provides comprehensive threat protection that integrates well with current systems, offering proactive threat detection and automatic updates while reducing manual efforts.
The platform is designed for seamless integration with Microsoft products, facilitating efficient management and use. It offers proactive ransomware protection and valuable threat intelligence, crucial for timely response and increased visibility across devices. Users highlight its ability to secure endpoints from viruses and malware, integrating with Windows and Office 365 to enhance real-time detection capabilities in diverse environments, including hybrid and on-premises setups. However, enhancements are needed in Linux integration, detection accuracy, and policy implementations.
What are the key features of Microsoft Defender for Endpoint?Microsoft Defender for Endpoint is implemented across industries for securing endpoints, relying on its deep integration with Windows and Office 365 to protect against malware and viruses. Organizations benefit from its real-time detection and comprehensive management capabilities, particularly in hybrid environments where diverse digital infrastructures need safeguarding.
OpenText EnCase eDiscovery is a versatile tool used in data management and forensic investigations. It offers capabilities in indexing, recovery, and handling complex tasks, providing an integrated platform for data recovery, image creation, and analysis.
OpenText EnCase eDiscovery integrates artificial modeling and customizable EnScripts for efficient file management, ensuring an enhanced user experience with its intuitive interface. It supports multiple search capabilities, including regular expressions and keyword searches, and offers features like Pathways and SweepEnterprise for ease of use. Users can take advantage of full tech search and AI integration for improved functionality. Despite its robustness, areas needing enhancement include data ingestion, mobile phone acquisition, and email extension support, as well as reporting reliability and performance improvements.
What are the most important features?OpenText EnCase eDiscovery finds significant use in data centers and forensic investigations across various industries. It serves engineering and capital projects by improving project and asset management documentation. In forensic roles, it functions as a tool for imaging, data extraction, and keyword analysis, contributing extensively to enhanced project outcomes.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.