

Varonis Platform and Cortex XSIAM are key players in the data access governance and cybersecurity categories. While both excel in specific areas, Varonis has an advantage in security and compliance monitoring, whereas Cortex XSIAM leads in threat detection and automation.
Features: Varonis Platform is recognized for its robust data access governance, effectively identifying sensitive data and user behavior anomalies. It integrates with third-party systems, ensuring flexible reporting and compliance, and efficiently scans unstructured data sources without affecting performance. Cortex XSIAM excels in machine learning for threat detection, offers wide third-party integration, and includes automation capabilities. Its contiguous data environment enables extensive network detection.
Room for Improvement: Varonis Platform could enhance cloud integration and ease of use in its interface, improve reporting capabilities, and reduce data processing time. It also relies heavily on on-premises setups, which can be a limitation. Cortex XSIAM needs better integration potential and a more straightforward user interface. Enhancements in detection capabilities and performance during high-volume usage are necessary, along with more flexible third-party integration.
Ease of Deployment and Customer Service: Varonis Platform offers on-premises and hybrid cloud deployment, with customer support typically rated high for its responsiveness. Cortex XSIAM provides various deployment modes, including public and hybrid cloud. While technical support is generally praised, some users experience delays. Both platforms provide comprehensive support, with Varonis noted for proactive customer engagement.
Pricing and ROI: Varonis Platform has a higher price point, more suitable for larger enterprises, with costs justified by its security benefits and time-saving ROI. Cortex XSIAM offers competitive pricing but remains generally expensive, influenced by additional features and support needs. Both platforms show high initial ROI which may reduce as automation increases.
I definitely say that we have had time savings by using the DataVantage module and also time savings using the AD module when we are dealing with different incidents.
I have seen a return on investment mainly through time savings and improved security for sensitive data, making it a valuable investment.
With premium support, core Palo Alto technical experts handle issues directly.
It is ineffective in terms of responding to basic queries and addressing future requirements.
The Palo Alto support team is fully responsive and helpful.
The customer support is above par; it is what I think other organizations should look at to be comparable to.
They respond quickly to anything we need, which is not common among platforms.
I would rate the customer support for Varonis Platform at nine out of ten.
Without proper integration, scaling up with more servers is meaningless.
Cortex XSIAM is highly scalable.
Varonis Platform is highly rated for scalability.
Varonis's scalability as eight to eight point five out of ten.
The product was easy to install and set up and worked right.
Overall, Cortex XSIAM is stable.
It works really nice and performs really efficiently after configuration.
Obtaining validation for integrations from Palo Alto takes around eight months, which is quite long.
Cortex XSIAM needs improvements in terms of data onboarding, parsers, and third-party integration supports.
Cortex XSIAM is on the expensive side and requires substantial improvement in pricing.
Varonis requires more access permissions for its core functions compared to competitors, which can be a concern for companies about data safety.
A phishing email module would be great; I look forward to when that comes out.
Enhancing tighter integration with third-party solutions, such as SIEM or SOAR platforms, for smoother incident response workflows.
The first impression is that XSIAM would be more expensive than others we tried.
The product is very expensive.
Cortex XSIAM is pretty expensive, and the licensing process is not very comfortable.
Varonis is known for its high licensing cost, which can include the cost of multiple servers required for its operations, called collectors.
My experience with pricing, setup costs, and licensing for Varonis Platform has been good, with competitive costs.
The advanced visualization capabilities of the product are important for understanding security trends in an organization.
One of the valued aspects of the product is its use of artificial intelligence to detect security vulnerabilities.
The flexibility for creating manual workflows stands out.
Varonis is excellent for scanning unstructured data sources like file shares, OneDrive, SharePoint, Azure Blob Storage, and S3s.
Varonis Platform is agent-based and AI-driven for detection and response, identifying data based on its content and context.
We have created automatic scripts in case there is a chance that it is a ransomware malicious actor, and it will automatically disable the user, log them out, and disable the actual workstation.
| Product | Mindshare (%) |
|---|---|
| Cortex XSIAM | 5.4% |
| Varonis Platform | 5.8% |
| Other | 88.8% |


| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 2 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 2 |
| Large Enterprise | 13 |
Cortex XSIAM acts as a critical element for SOC foundations, integrating SIEM and EDR capabilities, valued for threat detection and seamless security orchestration with Palo Alto Networks products.
Organizations find Cortex XSIAM beneficial for SOC foundations due to its capability to integrate SIEM and EDR tools, facilitating data collection, detection, and response. It connects with third-party data sources while reducing management effort and offering cost-effective alternatives to competitors like CrowdStrike and Trend Micro. Featuring automation and integration with Palo Alto Networks products, Cortex XSIAM enhances threat detection. Unified architecture allows a comprehensive view of attacks, further supported by machine learning and integration with existing vendor solutions, ensuring that users gain insights without significant manual log analysis.
What are Cortex XSIAM's key features?
What benefits are evident in Cortex XSIAM reviews?
Industries implement Cortex XSIAM mainly in technology-driven sectors where centralized endpoint protection and automation of forensic investigation are paramount. By integrating several third-party systems for incident response, companies in competitive markets leverage its attributes for heightened operational security efficiency. However, users note areas for improvement, such as Attack Surface Management and integration enhancements, to better suit tech-heavy industries needing extensive connectivity with cybersecurity solutions.
Varonis Platform enhances data security and governance with advanced analytics, identifying unusual access patterns and sensitive areas. Its centralized interface manages permissions across systems, offering essential capabilities for alerting and reporting.
Varonis Platform provides continuous data protection and monitoring by identifying and alerting on unauthorized data access. It offers comprehensive insights into file access and user activities, supporting data classification and simplifying compliance with tracking and monitoring capabilities. Integration with storage systems enables users to manage permissions and access effectively. Room for improvement includes cloud integration and simplifying its interface and calculation engine for ease of use. Challenges include on-premises dependency, licensing costs, and a need for enhanced DLP capabilities.
What are the primary features of Varonis Platform?
What benefits and ROI should users expect?
In finance, Varonis aids in safeguarding sensitive financial data, while in healthcare, it secures patient records. Legal industries utilize it for protecting client information, and retail sectors manage sensitive customer data. These industries benefit from Varonis' ability to prevent unauthorized access and streamline compliance.
We monitor all Identity Threat Detection and Response (ITDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.