


CyberArk Endpoint Privilege Manager and Intercept X Endpoint compete in the cybersecurity market, focusing on endpoint protection and privilege management. CyberArk holds an advantage in privilege and password management, while Intercept X is preferred for its threat detection capabilities and user-friendly interface.
Features: CyberArk offers privilege management, password management, and secure onboarding, reducing IT help desk calls through application distribution. Intercept X focuses on threat detection using deep learning, synchronized security, and robust ransomware protection.
Room for Improvement: CyberArk could benefit from reduced complexity, quicker support response, and better integration with various OS. Enhancements in user experience and policy management are also suggested. Intercept X requires improved support, integration with Sophos Central, more flexible reporting, and broader OS compatibility. Concerns about pricing and resource consumption also exist.
Ease of Deployment and Customer Service: CyberArk provides hybrid and on-premises deployment with some support limitations. Intercept X primarily offers public cloud deployment with hybrid options. Both solutions face criticism for slow response times, though CyberArk's community resources are noted.
Pricing and ROI: CyberArk is seen as costly, suited to larger enterprises. Intercept X is reasonably priced but considered high. Users report a return on investment due to reduced security incidents and improved management efficiencies.
They appreciate the rich telemetry data from the solution, as it provides in-depth threat identification.
Cortex XDR by Palo Alto Networks helps to reduce my total cost of ownership significantly.
In Cortex XDR by Palo Alto Networks, most of the remediation is automated and the accuracy is quite good.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
I consider CyberArk Endpoint Privilege Manager's return on investment to be good since it effectively accomplishes the goals expected from privilege access management solutions.
I have seen a return on investment with Intercept X Endpoint.
The technical support from Palo Alto deserves a mark of ten because they reach out within an hour whenever assistance is needed.
There is no back and forth, and they know what we are asking for and come up with the best resolution for a solution.
If any of these services are missed, it becomes a problem in terms of support tickets, follow-up, or special configuration that needs to be done in the system.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
Earlier, we received support for normal tickets within a day, but now it takes one or two days to resolve issues.
Technical support from Sophos is rated as nine out of ten, which represents high quality.
There are issues with onboarding technical engineers to resolve problems, which causes delays.
When you are in real deep trouble, you just want to get out of it; you don't need so many jargons.
You can onboard 10,000 endpoints in just hours, which demonstrates the excellent scalability of this product.
Activating the newly purchased licenses is instantaneous, allowing installations without adjustments since it's cloud-based.
Cortex XDR by Palo Alto Networks can be expanded anytime by purchasing another license without any issues related to scalability.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
The customer support is scalable because if we take licenses for fifty machines and later purchase one hundred fifty more, we can increase our licensing with the support team.
The tool's scalability is good, and I would rate it an eight out of ten.
Intercept X Endpoint's scalability is good.
Cortex remains fast and responsive, even with increasing data and alerts.
The thresholds we've seen on our firewall boxes at some instances reached 80% to 85%, but even at that level of utilization, we don't observe any latency or any issues reported with respect to accessing the application.
Cortex XDR is stable, offering high quality and reliable performance.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
In terms of stability, I would rate Intercept X Endpoint an eight out of ten.
To improve Intercept X Endpoint performance, upgrades in RAM and other system features are needed.
Improving reporting and dashboard customization, along with the addition of real-time and exportable reports, would help SOC teams greatly.
The inclusion of this feature would allow the application of DLP policies alongside antivirus policies via a single agent and console, making it more competitive as other OEMs often offer DLP solutions as part of their antivirus products.
If the per GB data could be provided at a certain level free of cost or at the same cost which the customer is taking for the entire bundle, that would be better.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
There should be a profile where I can see what files Sophos is scanning.
Intercept X Endpoint's anti-ransomware capabilities failed us during a bad attack, and just because of our own backup policies, we could restore our normal operations.
Intercept X Endpoint sometimes slows down machines due to high CPU utilization and significant RAM consumption during scanning.
The pricing on SentinelOne is far more reasonable and cheaper than Cortex XDR by Palo Alto Networks.
I would say it is definitely not a cheap product, considering how mature it is and how scalable all Palo Alto products are together.
Cortex XDR is perceived as expensive by some customers, yet offers dynamic pricing.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost.
It is quite costly when measuring Intercept X Endpoint's protective capabilities against zero-day attacks.
The setup costs and licensing for Sophos Intercept X Endpoint are good.
The pricing of Intercept X Endpoint is a bit high.
It incorporates AI for normal behavior detection, distinguishing unusual operations.
The product provides automation responses in case of a threat attack, severity assessments, centralized manageability, and comprehensive compliance features, resulting in reduced costs.
It includes machine learning to easily analyze data and detect complex threats across endpoints, networks, or clouds.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
It allows them to granularly manage controls to prevent some malicious activities on the endpoint machine.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
The stronger the AI/ML in an endpoint, the better the protection against unknown threats.
Intercept X Endpoint is the only endpoint security product I know that provides content filtering and application controls.
Intercept X Endpoint offers multiple features, including the Threat Analysis Center, remote run ransomware protection, and CryptoGuard.
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 11.6% |
| CyberArk Endpoint Privilege Manager | 6.2% |
| Intercept X Endpoint | 8.4% |
| Other | 73.8% |

| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 21 |
| Large Enterprise | 48 |
| Company Size | Count |
|---|---|
| Small Business | 17 |
| Midsize Enterprise | 9 |
| Large Enterprise | 18 |
| Company Size | Count |
|---|---|
| Small Business | 75 |
| Midsize Enterprise | 22 |
| Large Enterprise | 22 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
CyberArk Endpoint Privilege Manager enhances security by controlling access, removing admin rights, and managing privileges. It supports diverse environments with simple integration, focusing on credential detection, threat protection, and compliance.
CyberArk Endpoint Privilege Manager secures enterprise passwords, monitors session connections, and enhances cybersecurity by controlling privileged access. It blocks unauthorized applications, monitors user activities, and secures credentials across platforms. Key areas include Just-In-Time Access, privilege separation, and local administrator password rotation. While robust, challenges exist with performance, complexity, and setup. Integration with Linux and Unix needs improvement, requiring advanced reporting tools and easier policy management. Pricing concerns and maintenance issues with Windows servers persist, as well as database issues in the on-prem version.
What are the key features of CyberArk Endpoint Privilege Manager?Organizations deploying CyberArk Endpoint Privilege Manager in industries such as finance, healthcare, and technology benefit from secure credential management across Unix, AWS, and GCP. By implementing privilege separation and monitoring user activities, they achieve effective risk mitigation and compliance across multiple platforms.
Intercept X Endpoint is known for its advanced threat detection, user-friendly interface, and centralized management, alongside powerful cloud-based capabilities that enhance security using AI and machine learning.
Intercept X Endpoint strengthens security posture through AI and machine learning, effectively countering unknown threats. It includes ransomware protection, server lockdown, application control, and synchronized security with Sophos Firewall. Appreciated for preventing data leaks, it ensures superior malware and web filtering, while offering a robust EDR component for managed detection. Highlighted for its scalability and cost-effectiveness, it serves well in endpoint protection, covering antivirus, ransomware, malware, and DLP services across PCs, servers, and mobile devices.
What are the key features of Intercept X Endpoint?Intercept X Endpoint finds usage across industries by protecting endpoints against cyber threats. Deployable through Sophos Central for remote management, it suits entities lacking extensive security expertise. AI algorithms deliver advanced threat protection, making it a smart choice for organizations across different sectors. Aligning with varied technological environments enhances its acceptability, while integration with existing systems is supported.
We monitor all Ransomware Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.