Try our new research platform with insights from 80,000+ expert users

Comodo MDR vs Intercept X Endpoint comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Comodo MDR
Ranking in Managed Detection and Response (MDR)
38th
Average Rating
10.0
Reviews Sentiment
6.8
Number of Reviews
3
Ranking in other categories
No ranking in other categories
Intercept X Endpoint
Ranking in Managed Detection and Response (MDR)
7th
Average Rating
8.4
Reviews Sentiment
6.7
Number of Reviews
109
Ranking in other categories
Endpoint Protection Platform (EPP) (11th), Endpoint Detection and Response (EDR) (14th), ZTNA (9th), Extended Detection and Response (XDR) (13th), Ransomware Protection (4th)
 

Mindshare comparison

As of March 2026, in the Managed Detection and Response (MDR) category, the mindshare of Comodo MDR is 0.8%, up from 0.2% compared to the previous year. The mindshare of Intercept X Endpoint is 1.2%, up from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Managed Detection and Response (MDR) Mindshare Distribution
ProductMindshare (%)
Intercept X Endpoint1.2%
Comodo MDR0.8%
Other98.0%
Managed Detection and Response (MDR)
 

Featured Reviews

Navin Mohinani - PeerSpot reviewer
CEO at Forte IT Solutions
Have faced integration challenges but continue to benefit from strong security and proactive response features
The biggest advantage of the product, as I see it as a reseller, is its security and reporting. The automated incident response feature in Comodo MDR works fantastic. When customers install custom tailor-made software which is not recognized by Comodo MDR endpoint detection response tool, it runs in an isolated environment, virtual environment, sandbox environment. If it determines that this software is not secure, not verified, or not approved by system admin, it blocks the software immediately. The software will not run, and it sends a report to the admin email instantly. If there is any issue with the software or if any incident such as a malware attack or ransomware attack is happening, or something is trying to make changes to the system files, it immediately blocks the software tool and reports back to the admin. As a reseller partner and secondary admin for the customers, my team and I directly receive a mail, and we take control of that machine. It even blocks complete network access to that machine. On the hardware side, if there is a hard disk full or RAM 90% usage or CPU 90% usage or any of these incidents, we set up an alert notification option for it. The moment these incidents occur, it sends an alert so we can recommend customers upgrade their hardware or check if there is any malfunctioning software consuming too much RAM and CPU. This incident response use case helps us keep customer machines' performance to the maximum. The 24/7 monitoring capability supports a lot in contributing to our cybersecurity strategy. It is very much compatible with our goal.
AM
IT Head at Dee Development
Has struggled to detect major threats but has offered basic protection over time
Intercept X Endpoint could learn from CrowdStrike in terms of overall performance and filtering because performance is most important, especially these days as Windows is getting buggier and buggier, which puts a huge load on the PC, and even with the most advanced CPUs and everything in place, it still lags in performance in so many places, thanks to Windows' clumsy design of these collaboration suites that make it extremely heavy on PC's resources. The interface of Intercept X Endpoint is quite old-fashioned. The Sophos interfaces, including for Intercept X Endpoint, are quite bad actually; to be very honest, even in UTM boxes, they are not great at all. You can hardly see a very small portion of windows while it's creating the firewall rules, and we have been complaining about this for quite some time, but there hasn't been any improvement on those grounds. Intercept X Endpoint's anti-ransomware capabilities failed us during a bad attack, and just because of our own backup policies, we could restore our normal operations; otherwise, if we had to depend on this solution, we would have been long dead because the infection was so bad, it couldn't even detect the infection. Intercept X Endpoint cannot handle zero-day attacks; in my experience, last year, we had this major issue with a malware attack, and it happened just because of our backup policies that we were able to recover without any support from Sophos, which just told us they would charge us some 1 Crore in rupees. Intercept X Endpoint should improve their implementation; things will never be perfect for the new world. This new world is always facing new kinds of attacks and new ways to compromise the system. They need to learn fast, implement fast, and sometimes redesigning the solution is the solution—not just patchwork. There was a time we used to love Sophos because of its fresh design and innovative thought. In my experience, when technical companies are led by MBA professionals, they lose their shine on the technical part and become more dependent on target sales; it turns into a marketing-centric operation that loses the technical focus completely.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The product is fairly new compared to others like Trend Micro or Symantec. However, it offers sophisticated features, especially in scanning and analyzing activities on workstations or servers. It can prevent malicious operations from spreading to other applications or the network. This feature is particularly effective because it operates at the IO level, unlike behavior or signature analysis used by other products. It contains threats and alerts administrators about whether they are false positives or real threats that need immediate action or support recommendations."
"The automated incident response feature in Comodo MDR works fantastic; when customers install custom tailor-made software which is not recognized by Comodo MDR, it runs in an isolated environment, and if it determines the software is not secure, it blocks it immediately and sends a report to the admin."
"One of the most valuable features is its around-the-clock, 365-day-a-year online technical support."
"It's quite simple to use and user friendly."
"The solution's initial setup process was straightforward."
"It is not just a simple virus scanning product. It handles more advanced needs."
"Sophos Intercept X is a very effective solution and its being cloud-based is a benefit. Wherever my users are, I can apply policies to them. In the era of mobility, when users are out of the office or they're in different locations, it doesn't matter."
"The forensics within the solution are quite good. The ransomware mitigation is also impressive."
"The deployment is quick. It just depends on the environment and what you may be replacing."
"I find the security heartbeat feature with synchronized security very useful. It's a very nice feature that allows you to basically switch off an endpoint. When an endpoint has got a virus or something like that, or it's infected or compromised, you can isolate it from the network, but only if you've got an XG Firewall as well. It also provides ease of use. It is the only antivirus that can recognize 25 out of the 36 ransomware and virus techniques that have been often used in terms of the behavior base using heuristics. It's beautiful, utterly amazing. No other antivirus can do that."
"The most valuable feature is the anti-ransomware capability. It's been helpful because we have been seeing a lot of information around what the ransomware hit."
 

Cons

"They should consider adopting the desktop version as a solution."
"I think having a higher level of MDR would be beneficial, although it's quite expensive. This would involve not just monitoring the network but also taking actions to stop and detect threats. We haven't implemented this yet, but we're considering it for our organization's plans."
"Users pay $60 per user per year, and in case there is an issue, support tickets take nearly three days or sometimes even more for a clear resolution or an answer."
"The endpoint detection and response (EDR) technology has room for improvement because the information that it gives us to resolve our problems is poor nowadays."
"This solution is not in the high ratings on many of the top review sites. This solution has to be near the top for me to continue using it."
"It would be a value-add if they can include integration with other technologies or solutions, like Fortinet, Blue Coat, etc."
"Pricing is high."
"Needs more flexible reporting, particularly for medium to large size companies."
"The solution is heavy in the usage of resources, you can notice the performance decrease. This should prove in the future."
"The performance offered by the product needs improvement."
"Stability-wise, we had issues with some clients which had to be dealt with manually. The issue was with that installation part."
 

Pricing and Cost Advice

"The pricing falls within the moderate range."
"The tool's pricing is high compared to other products. If you want to target a certain quantity, it should provide discounts to enterprises."
"The pricing is average for software like this, but you can purchase additional services if you wish."
"The price of the solution is average compared to the market."
"The price of this product should be reduced because it is a little high."
"The cost of Sophos Intercept X is reasonable."
"The price of Sophos Intercept X is expensive. The license is paid on an annual basis. There are extra features that can be added depending on the endpoints. The solution is priced twice as much as the Comodo solution."
"The price of this solution is reasonable."
"You can pay monthly, but most of our customers choose annual subscriptions because they are less expensive."
"Intercept X for endpoints is around $35 per user per year. The server version is $95 per server per year."
report
Use our free recommendation engine to learn which Managed Detection and Response (MDR) solutions are best for your needs.
884,873 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Computer Software Company
12%
Comms Service Provider
9%
Manufacturing Company
9%
Outsourcing Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business75
Midsize Enterprise22
Large Enterprise22
 

Questions from the Community

What is your experience regarding pricing and costs for Comodo MDR?
The tool's pricing is high compared to other products. If you want to target a certain quantity, it should provide discounts to enterprises.
What needs improvement with Comodo MDR?
Areas for improvement are mainly on the software side. They are trying to integrate some functionalities, but their API integration with some CRM and invoicing tools is not appropriate or 100% comp...
What is your primary use case for Comodo MDR?
The major use case for the product is mainly for endpoint security and endpoint management.
How does Crodwstrike Falcon compare with Sophos Intercept X?
I like that Crowdstrike Falcon allows me to easily correlate data between my firewalls. Its detection and machine learning are very valuable features. Crowdstrike Falcon also successfully prevents ...
What is your experience regarding pricing and costs for Sophos Intercept X?
Intercept X Endpoint has some impact on the budget. It is quite costly when measuring Intercept X Endpoint's protective capabilities against zero-day attacks.
 

Also Known As

Comodo Managed Detection and Response
Sophos Intercept X
 

Overview

 

Sample Customers

Information Not Available
Flexible Systems
Find out what your peers are saying about Comodo MDR vs. Intercept X Endpoint and other solutions. Updated: March 2026.
884,873 professionals have used our research since 2012.