No more typing reviews! Try our Samantha, our new voice AI agent.

Adlumin Security Operations vs Anomali comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 15, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Ranking in Extended Detection and Response (XDR)
5th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
110
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Endpoint Detection and Response (EDR) (6th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (1st)
Adlumin Security Operations
Ranking in Extended Detection and Response (XDR)
42nd
Average Rating
0.0
Reviews Sentiment
3.3
Number of Reviews
1
Ranking in other categories
Security Information and Event Management (SIEM) (54th), User Entity Behavior Analytics (UEBA) (26th), Managed Detection and Response (MDR) (22nd), Risk-Based Vulnerability Management (24th)
Anomali
Ranking in Extended Detection and Response (XDR)
22nd
Average Rating
7.8
Reviews Sentiment
7.2
Number of Reviews
4
Ranking in other categories
Security Information and Event Management (SIEM) (32nd), User Entity Behavior Analytics (UEBA) (12th), Advanced Threat Protection (ATP) (21st), Threat Intelligence Platforms (TIP) (8th)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
NickShmakov - PeerSpot reviewer
Md at Res-Q
Strong security reporting has supported our consulting work and drives better integration choices
I rated Adlumin Security Operations probably the same as Huntress at eight. They are better at reporting and better integrations. The integrations in terms of the number of integrations you can run from them or connect to are not as many as available with Huntress, but they have easier implementation. Overall, I would say it is the same. I do not want to see any additional features in the next release of Adlumin Security Operations, but I would change the pricing a little bit for around SIEM integrations and SIEM data collection. That is probably the maximum I would do. I do not really have much to say because that is literally five percent of our deployments versus ninety-five percent being Huntress. My overall rating for this review is eight.
CC
Enterprise Security Architect V at FirstEnergy
Enables automated threat intelligence sorting and enhances proactive threat hunting capabilities
You have to have at least a threat intelligence background or a SOC analyst background to use it, as that's the information you'll dig around with in there. If you don't have that kind of knowledge, it probably can be a little hard to use, but they do provide training. They offer training not only for how to use the platform but also some basic threat intelligence training to explain what these things are and what these terms mean. My company is a customer of Anomali. I would recommend it to other people. I would advise making sure you don't pick it without testing other products and have your use cases well thought out and documented before testing, so you know it will solve the problems you're trying to address. Keep an open mind with it and realize that whatever you can dream of, you can probably do with the platform. Overall, I would rate Anomali an eight out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature of Cortex XDR by Palo Alto Networks is its machine-learning capabilities. Additionally, there is full integration with other solutions."
"The initial setup is pretty easy."
"Cortex is the best tool for endpoint detection, and I have used it to verify hashes or domains to identify malicious activity, trigger playbooks that automate and gather endpoint logs, block malicious processes, and update incident tickets, showcasing end-to-end processes with automation in investigation and reducing the analysis workflow."
"They did what they said. This solution could apply to any scenario."
"Monitoring is most valuable."
"On a scale from one to ten, I would rate Cortex XDR by Palo Alto Networks a nine."
"One thing that I like about Cortex XDR is its ability to detect all the suspicious or malicious binaries, and it can integrate with Palo Alto Firewall."
"The protection offered by this product is good, as is the endpoint reporting."
"We normally focus on Huntress."
"I have found Cyber threat intelligence (CTI) very useful and concise. The solution is easy to use."
"We now have a very robust collection of threat intelligence based on the capabilities that Anomali provides."
"I have found Cyber threat intelligence (CTI) very useful and concise. The solution is easy to use."
"The feature I have found most valuable is credential monitoring. This feature is easy and quick."
"The most valuable aspect of Anomali is the threat modeling capability."
 

Cons

"I would like to see some additional features related to email protection included."
"We had a problem with getting our older endpoints up to date, but their newest updates have been really good. I've been pleased with it in terms of what our needs are. It's doing what we want it to do."
"It's not an ideal choice for smaller businesses, as you need a minimum of 200 endpoints to even use the solution at all."
"It tends to do 99.9% of things. The only thing I'd like is single sign-on authentication into their cloud platform so that my users can be properly authenticated against it."
"There are some default policies which sometimes affect our applications and cause them to run around. In the hotel industry, we use a different type of data versus Oracle and SQL. By default, there are some policies which stop us from running properly. Because of this, the support level is also not that strong. We have to wait to get a results."
"Being able to filter the events to see those that are related to the actual alert would save time spent by the engineer."
"However, if you do not have Palo Alto in your environment, you are paying these additional services just for Cortex XDR by Palo Alto Networks, so it is not a cost-effective solution."
"It is not easy to sell Cortex XDR, not because it isn't a good tool. Its marketing needs to be improved."
"Adlumin Security Operations's functionality is probably slightly better, but implementation and integration with Office 365 was not as straightforward."
"An area for improvement is the intelligence sharing within the Anomali community. The tagging system can be inconsistent, as any company can use any tags for their reporting."
"Less code in integration would be nice when building blocks."
"Support in the past has been top-notch, but recent trends indicate that it has taken a back seat, as we often don't get answers for days."
"Anomali Enterprise could improve by combining all the other tools' features into one solution."
"A lot of tools can give you many features, such as CTI intelligence and a tax service reduction. However, many people are combining different tools together to have more capabilities. It is up to the consumer whether they want to have multiple tools or have one tool that serves the purpose. Anomali Enterprise could improve by combining all the other tools' features into one solution."
 

Pricing and Cost Advice

"The return on investment is from the user side because we have seen the performance of it increase the delivery time of the product if we are using too many web-based and on-premise applications. In indirect ways, we saw the return of investment in terms of performance and user satisfaction increase."
"In terms of the cost Cortex XDR by Palo Alto Networks is very expensive because we are a Mexican company and when you translate dollars to pesos the cost is very high. The solution is very expensive for Mexican companies. I understand that they have international prices, but I do not think it offsets the price enough for many companies in countries, such as Mexico. The amount it is reduced is not a massive percentage."
"When we first bought it, it was a bit expensive, but it was worth it. The licensing was straightforward."
"I don't have any issues with the pricing. We are satisfied with the price."
"Cortex XDR by Palo Alto Networks is quite an expensive solution."
"It is "expensive" and flexible."
"The price is on the higher side, but it's okay."
"This is an expensive solution."
Information not available
"When comparing the price of Anomali Enterprise to other solutions it is in the medium to high range. However, I am satisfied with the price."
report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
893,221 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Construction Company
12%
Comms Service Provider
9%
Manufacturing Company
8%
Computer Software Company
12%
Comms Service Provider
10%
Retailer
7%
Real Estate/Law Firm
6%
Financial Services Firm
14%
Manufacturing Company
8%
Computer Software Company
7%
Construction Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business45
Midsize Enterprise21
Large Enterprise48
No data available
By reviewers
Company SizeCount
Small Business2
Midsize Enterprise1
Large Enterprise5
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
What needs improvement with Adlumin Security Operations?
I see room for improvement. I would want to improve reporting.
What is your primary use case for Adlumin Security Operations?
I have hands-on experience with Huntress as a consultant and a reseller. I deal with some competitors as well, but I ...
What advice do you have for others considering Adlumin Security Operations?
I rated Adlumin Security Operations probably the same as Huntress at eight. They are better at reporting and better i...
What needs improvement with Anomali ThreatStream?
An area for improvement is the intelligence sharing within the Anomali community. The tagging system can be inconsist...
What is your primary use case for Anomali ThreatStream?
I use Anomali ( /products/anomali-reviews ) for threat hunting, threat collection, operationalization of intelligence...
What advice do you have for others considering Anomali ThreatStream?
For new users, I recommend taking the training provided by Anomali as it is very well articulated. I advise reading t...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Adlumin Cybersecurity Platform
Match, Lens, ThreatStream, STAXX, Anomali Security Analytics
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Courthouse News Service, Maschoff Brennan, Sky Lakes Medical Center, Tooele County School District, Southern Oregon ESD, CNB Bank & Trust, Ogden City, Southeast Financial Credit Union (SEFCU), Utah State Bar, Financial Plus Credit Union, Kelly Community, United Southern Bank of Kentucky (USBKY)
Bank of England, First Energy, UBISOFT, Bank of Hope, Blackhawk Network
Find out what your peers are saying about Splunk, IBM, Wazuh and others in Security Information and Event Management (SIEM). Updated: April 2026.
893,221 professionals have used our research since 2012.