Try our new research platform with insights from 80,000+ expert users

Cybereason Endpoint Detection & Response vs Datto Endpoint Detection and Response (EDR) comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cybereason Endpoint Detecti...
Ranking in Endpoint Detection and Response (EDR)
32nd
Average Rating
7.8
Reviews Sentiment
5.6
Number of Reviews
22
Ranking in other categories
Endpoint Protection Platform (EPP) (41st)
Datto Endpoint Detection an...
Ranking in Endpoint Detection and Response (EDR)
40th
Average Rating
7.6
Reviews Sentiment
7.0
Number of Reviews
4
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of January 2026, in the Endpoint Detection and Response (EDR) category, the mindshare of Cybereason Endpoint Detection & Response is 1.1%, up from 1.1% compared to the previous year. The mindshare of Datto Endpoint Detection and Response (EDR) is 1.6%, down from 2.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR) Market Share Distribution
ProductMarket Share (%)
Cybereason Endpoint Detection & Response1.1%
Datto Endpoint Detection and Response (EDR)1.6%
Other97.3%
Endpoint Detection and Response (EDR)
 

Featured Reviews

reviewer2642739 - PeerSpot reviewer
Security Delivery Analyst at a consultancy with 10,001+ employees
User-friendly platform and dashboards provide comprehensive insights
I would like to see improvements on the operational side, specifically in grouping. Currently, I can group sensors into a custom group and assign policies, but I feel it is a shame that I cannot create groups of groups with inheritance. This would be useful for organizing multiple sites or countries into a single group containing multiple sub-groups. Additionally, in the whitelisting case, if I want one policy to have specific whitelisting, but not all the machines in that policy to have it, I could use multiple groups belonging to the same parent group. It is a bit disappointing that whitelisting can only be done via policies and not for individual machines. If I need to whitelist for only one machine, I must create a specific policy. This poses a challenge with two thousand endpoints, making it nearly impossible to create two thousand different policies.
reviewer2406663 - PeerSpot reviewer
Director at a computer software company with 11-50 employees
Effective risk response, easy deployment, and enhanced security
They use Datto EDR as part of the solutions that we supply Datto EDR has helped reduce overall security incident costs by fifteen percent. The ease of deployment has been good, and the responsiveness of the application to risks has been quite effective. The inclusion of web filtering would be…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The initial setup was straightforward."
"They do a very good job of providing multi-stage visualizations of malicious operations that immediately show all attack details across all devices and users. Since it is MalOp-centric model, you can see if there has been a similar operation across multiple machines. If it is the same thing appearing on multiple machines, you see all the machines and users affected in one screen."
"The initial setup process is straightforward."
"The most valuable feature is the capability of the command used by the machine so that we see the kind of performance that is running."
"Cybereason absolutely enables us to mitigate and isolate on the fly. Our managed detection response telemetry has dropped dramatically since we began using it. It's very top-of-mind. We were running some tabletop exercises and none of the detections were getting triggered by the managed security services provider. So we needed to find a solution that would trigger high-fidelity alerts. That was Cybereason and it dramatically changed our landscape from the detection and response perspective."
"Their EDR solution, the ability to mitigate issues through their command line, is probably the best feature that we've had. We use that all the time. It's very useful for doing investigations."
"Immediately we can pick up the computers in the network if any malicious operation that is triggered."
"What I find most valuable is the clarity of the platform."
"The insight that the solution provides is the most valuable aspect. The security scanning they do is excellent."
"The most valuable feature of Datto EDR is the visibility of the endpoints."
"The ease of deployment has been good."
"Datto Endpoint Detection and Response is a perfect product for endpoint security."
 

Cons

"We are in the process of removing it from many of our endpoint clients because it's not really showing enough value for them at the moment."
"Reporting could be a bit more granular so that we had the ability to check regions and countries. I just noticed that, for instance, if I look at our servers, it's either "contained" or it's "not contained". I don't have the option, for instance, to look at countries. It only allows me to look at users as one big group."
"What needs to improve in Cybereason Endpoint Detection & Response and what I'd like to see in its next release is a centralized dashboard that allows you to view what is there, similar to what's on Symantec Endpoint Protection Manager: a beautiful display and reporting. Cybereason Endpoint Detection & Response has to start with the compliance, the homepage, etc. Everything should be there and should be customizable. The options should be there. The tool is very good currently, but visibility for IT administrators is lacking and needs to be worked on."
"Compared to our previous endpoint, we have a lot more false positives and a lot more duplication of alerts. So we're chasing more alerts."
"I feel it is a shame that I cannot create groups of groups with inheritance."
"Its Microsoft PowerShell protections still need some compatibility improvements. We have run across just a few. It is compatible with 90% of what we have in our network, but there is that 10% that we are still struggling with as far as compatibility with the type of PowerShell scripts needed to run our day-to-day business."
"It should be more stable, and the sensor needs improvement in terms of connectivity."
"I would like to see improvements on the operational side, specifically in grouping."
"The solution should allow the automation of playbooks."
"The solution could improve by having more deployment methods."
"The deployment of the solution right now is terrible. We find it to be very bad. It could be improved enormously."
"The inclusion of web filtering would be good."
 

Pricing and Cost Advice

"I had to go through a third-party to purchase it, which I wasn't really pleased about."
"This product is somewhat expensive and should be cheaper."
"We considered a few other solutions. Some were ridiculously overpriced, while others didn't have solutions for Mac endpoints. That was a deal-breaker because most of our organization is on Mac. It came down to two vendors: Cybereason and another. They had similar pitches and almost identical approaches, but in the end, Cybereason gave us the best value for our money."
"On a scale of one to ten, where one is cheap and ten is expensive, I rate the pricing an eight."
"The pricing is manageable."
"Though it is not the cheapest solution but it fits our budget. We pay an annual licensing fee."
"In terms of cost, this is a good choice for our needs."
"In terms of pricing, it's a good solution."
"Datto Endpoint Detection and Response is not an expensive solution."
"There is an annual license to use this solution. The price of the solution can be expensive depending on the company."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Computer Software Company
12%
Manufacturing Company
9%
Outsourcing Company
7%
Computer Software Company
13%
Comms Service Provider
13%
Retailer
7%
Real Estate/Law Firm
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise4
Large Enterprise13
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Cybereason Endpoint Detection & Response?
Comparison with other products showed it be cheaper than some larger competitors. Set up cost for us were cheaper as we already had users experienced with the product in other business units. Initi...
What is your primary use case for Cybereason Endpoint Detection & Response?
My main use case for Cybereason Endpoint Detection & Response is mostly for incident response.
What is your experience regarding pricing and costs for Infocyte HUNT?
The price is quite low. On a scale of one to ten, I would rate it a four, meaning it is quite cheap.
What needs improvement with Infocyte HUNT?
The inclusion of web filtering would be good.
What is your primary use case for Infocyte HUNT?
They use Datto EDR as part of the solutions that we supply.
 

Also Known As

Cybereason EDR, Cybereason Deep Detect & Respond
Infocyte HUNT
 

Overview

 

Sample Customers

Lockheed Martin, Spark Capital, DocuSign, Softbank Capital
Check Point Software, PwC, Grant Thornton, AT&T, DHL, U.S. Department of Defense
Find out what your peers are saying about Cybereason Endpoint Detection & Response vs. Datto Endpoint Detection and Response (EDR) and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.