Cortex XDR by Palo Alto Networks provides endpoint protection by detecting and blocking malware. It integrates with firewalls, enhances security with AI-driven threat detection, and offers behavior-based analysis. Praised for its user-friendly interface, it ensures endpoint safety but faces challenges like integration issues, high memory usage, and compatibility differences.
I feel it is fairly priced.
The pricing seems fair, and I do like the licensing model. You use wherever they are, and it is elastic.
I feel it is fairly priced.
The pricing seems fair, and I do like the licensing model. You use wherever they are, and it is elastic.
Microsoft Defender XDR is a comprehensive security solution that helps organizations manage devices and vendor security compliance.
Its primary use case includes email filtering, vulnerability management, and detecting threats launched via emails. The solution offers advanced threat-hunting capabilities, integration with other Microsoft products, centralized management, automation features, and comprehensive threat protection.
It improves visibility, automates routine tasks, and provides threat intelligence and compliance management. Microsoft Defender XDR is praised for its advanced capabilities, ease of use, and integration with other Microsoft products.
It has proven to be a comprehensive and effective security solution for organizations.
The solutions price is fair for what they offer.
The price of the solution is high compared to others and we have lost some customers because of it.
The solutions price is fair for what they offer.
The price of the solution is high compared to others and we have lost some customers because of it.
Trend Vision One- Cloud Security is a cloud security solution that offers comprehensive threat protection, monitoring, and visibility for cloud environments. Users appreciate its ability to centralize security management across multiple platforms, ensuring compliance and reducing the risk of data breaches. With advanced features like data encryption, network security, and data loss prevention, Trend Vision One- Cloud Security offers strong performance and ease of use. This solution has helped companies improve efficiency, streamline processes, and enhance productivity.
It's a slightly expensive product.
We make use of the full licensing version.
It's a slightly expensive product.
We make use of the full licensing version.
XDR Defined and Explained
Extended detection and response (XDR) is a natural extension of the endpoint detection and response (EDR) concept, in which behaviors that occur after threat prevention controls act are further inspected for potentially malicious, suspicious, or risky activity that warrant mitigation. The difference is simply the location (endpoint or beyond) where the behaviors occur.
This is an expensive solution compared to other vendors, such as Check Point.
This is an expensive solution compared to other vendors, such as Check Point.
IBM Guardium Vulnerability Assessment scans data infrastructures (databases, data warehouses and big data environments) to detect vulnerabilities, and suggests remedial actions. The solution identifies exposures such as missing patches, weak passwords, unauthorized changes and misconfigured privileges.
One thing not advantageous for it was that it was a little bit more expensive. I would rate it one out of five in terms of pricing.
One thing not advantageous for it was that it was a little bit more expensive. I would rate it one out of five in terms of pricing.
Our proprietary protection capabilities shield apps from reverse engineering, tampering, API exploits, and other attacks that can put your business, your customers, and your bottom line at risk.
ERPScan’s primary mission is to bridge the gap between technical and business security, and provide solutions to evaluate and secure SAP and Oracle ERP systems and business-critical applications from both, cyber-attacks as well as internal fraud.
Blue Cedar is the leading mobile app security integration platform that secures and accelerates the deployment of native and third-party mobile apps through an automated, no-code, enterprise-grade solution. We enable organizations to secure their mobile apps while saving significant development time, money and resources.