No more typing reviews! Try our Samantha, our new voice AI agent.

Cynet vs Hunters comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Ranking in Extended Detection and Response (XDR)
5th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
110
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Endpoint Detection and Response (EDR) (6th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (1st)
Cynet
Ranking in Extended Detection and Response (XDR)
13th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
45
Ranking in other categories
Security Information and Event Management (SIEM) (21st), Endpoint Protection Platform (EPP) (18th), User Entity Behavior Analytics (UEBA) (7th), Endpoint Detection and Response (EDR) (18th), Threat Deception Platforms (2nd), Network Detection and Response (NDR) (9th), Ransomware Protection (4th)
Hunters
Ranking in Extended Detection and Response (XDR)
33rd
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
1
Ranking in other categories
Security Information and Event Management (SIEM) (37th), SOC as a Service (5th)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
Roshan Jadhav - PeerSpot reviewer
Technical Consultant at Vincacyber
Has improved threat detection and streamlined incident analysis through centralized control and AI-driven insights
People are looking for Cynet because it has next-generation threat protection that detects zero-day threats. It has UEBA (user entity behavior analysis), threat hunting features, and storage device control where we can create profiles and block unauthorized USB storage devices. We can also create threat protection policies to detect malware, ransomware, and many other threats. The most valuable feature is the UBA (User behavior analysis). It has integration with SIEM solutions, allowing us to share our logs to third-party SIEM servers. Cynet has AI integration which showcases complete forensic data about threats, making it very easy to understand what happened with the system and what type of incident was detected. Autonomous breach protection is a feature of Cynet which can detect and mitigate known and unknown threats based on signatures. If there are any signature-less files, malware, or ransomware, it will detect them based on autonomous breach protection capabilities. The centralized management console provides a dashboard where we can see four types of attack vectors and incident counts in real-time. It continuously scans the radar and shows open alerts related to files, hosts, users, or networks. We can easily export these alerts and send reports via email.
VikramSingh8 - PeerSpot reviewer
Security Delivery Manager at Accenture
Advanced detectors streamline threat monitoring with many use cases
Hunter support is functional yet not exceptional. Their support engineers could be more advanced and faster in providing solutions. Their turnaround time could improve to match other tools. When feedback is provided, they consider it and indicate if it is in the development stage. They commit to fixing bugs and developing the module or feature, however, take quite a lot of time. I would rate their customer support as needing improvement. Another area needing improvement is integration capabilities, as they are not yet fully compatible. Users still have to rely on third-party software or integration tools. Furthermore, they should incorporate more GenAI capabilities, a current buzzword, and enable predictive use cases. Their tools should be capable of reading the environment, making adaptations, and automatically tweaking settings as per client or environmental needs, similar to capabilities provided by other SIEM tools.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"But overall, when we speak about security and protection, they are one of the top providers."
"Cortex XDR by Palo Alto Networks saves time in various ways, although the user interface is fairly standard."
"The protection offered by this product is good, as is the endpoint reporting."
"Best solution for avoiding security breaches, malware attacks, and other kinds of security issues."
"Stability is a primary factor, and then there's the ease of distribution and policy management."
"The stability is pretty good except for one or two cases, and based on the performance, it's been okay with pretty high performance, no bugs or glitches, and it doesn't crash or freeze."
"This software helps us understand any issues that may arise when someone is not at work."
"It has pretty much everything we need and works well within the Palo Alto ecosystem."
"The feature that I have found most valuable is that the configuration and the usage of the product are not so complicated. For people responsible for using this infrastructure for the first line of workstation monitoring, it's quite easy to use."
"I have found the continued support and pretty much all the features to be valuable."
"We are very satisfied with the level of performance we get."
"At the end of the day, Cynet got the maximum rating."
"Advanced detection and protection against ransomware paired with SOC monitoring are the most valuable features. They have 24/7 SOC monitoring and file activity. It is a very robust tool."
"The customer service and support get back to you real quick."
"It has quite good detection and response features; they are improving continuously."
"Aside from the real people behind the product, it gives visibility on the network, on the file level, on the memory level, and it also does user behavior analysis, with a deception capability as well."
"Other SIEM tools base their license cost on the volume of data processed, often charging by how much TB or GB data is processed. Hunter, however, charges based on the number of data sources and the number of data entities integrated, which saves money."
"Hunter proactively provides a set of five to six hundred use cases, categorized based on cloud use cases, endpoint use cases, parameter use cases, and malicious use cases."
 

Cons

"If they had pulse rate detection, it would be better."
"Limited remote connection."
"Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth."
"In terms of areas of improvement, we have not completed our review of the product. We're also looking at other products. So, it's a little bit hard to tell what could be different because we have not completed the review of this product, but based on our experience so far, its implementation is quite complex."
"The solution lacks real-time, on-demand antivirus."
"Cortex XDR could improve its sales support team, including better commission structures and referral programs."
"If he is using a smaller company, he can depend on some other tools because Cortex XDR by Palo Alto Networks is a bit expensive."
"The solution needs better reports. I think they should let the customer go in and customize the reports."
"Linux servers are not supported."
"Cynet is capable and cloud-based, however, enterprise organizations often prefer on-premises servers for managing entire organizations."
"They have some things in the pipeline, we understand, and they're going to be able to support Android and all these other devices soon. The key is the devices - which is an aspect that is lacking right now. Every company has that problem, not just Cynet."
"I cannot provide more details about Cynet's automation features. While Cynet claims to be automated, the specifics of this automation are unclear. They claim to have a high capability to detect and block attacks, but I am cautious about companies that claim to solve every problem without limitations. It does help in identifying malware on the network but doesn't specifically identify vulnerabilities."
"One problem is that Linux servers are not supported."
"I think the technical support could be better."
"Could have better integration with other security applications."
"Cynet could improve when a reverse proxy is being used to connect to the servers. There could be an easier configuration because it is not plug-and-play."
"Hunter support is functional yet not exceptional."
"Hunter support is functional yet not exceptional. Their support engineers could be more advanced and faster in providing solutions."
 

Pricing and Cost Advice

"Licensing for Palo Alto Networks Cortex XDR can be costly, especially when it comes to a hundred users. A license is required for each user, and the subscription must be renewed on a yearly basis."
"Compared to CrowdStrike, Cortex XDR is an expensive solution."
"It has a yearly renewal."
"Our license will require renewal in August, after which the maintenance will continue as usual."
"Very costly product."
"The price of the product is not very economical."
"I don't have any issues with the pricing. We are satisfied with the price."
"The tool's price is moderate."
"The pricing was good."
"This solution is expensive. I would rate the price as a three out of five when compared to similar products."
"Its licensing is on a monthly basis."
"I don't have specific information about integration capabilities or licensing costs."
"The price should not be less than $100 which is quite reasonable for this solution because you are getting multiple components."
"Cynet has a pay-as-you-go pricing model."
"It costs us 20,000 to 28,000 per year."
"Cynet is very affordable."
Information not available
report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
893,221 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Construction Company
12%
Comms Service Provider
9%
Manufacturing Company
8%
Manufacturing Company
10%
Financial Services Firm
10%
Comms Service Provider
9%
Computer Software Company
8%
Financial Services Firm
10%
Computer Software Company
8%
Construction Company
8%
Non Profit
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business45
Midsize Enterprise21
Large Enterprise48
By reviewers
Company SizeCount
Small Business29
Midsize Enterprise7
Large Enterprise12
No data available
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
When evaluating User Activity Monitoring, what aspect do you think is the most important to look for?
The support team that stands behind the detection and response. Is there adequate expertise and are they behind you ...
What is your experience regarding pricing and costs for Cynet?
Cynet is not very costly. We can refer it to other customers because Cynet does not ask for additional costs for add-...
What needs improvement with Cynet?
One area where Cynet needs improvement is tamper protection for Mac and Linux agents. It currently has tamper protect...
What needs improvement with Hunters?
Hunter support is functional yet not exceptional. Their support engineers could be more advanced and faster in provid...
What is your primary use case for Hunters?
Hunter is a very new SIEM in the market. It is definitely a broad market for us as they are trying to establish a new...
What advice do you have for others considering Hunters?
Their knowledge base is good. When starting with Hunter, ensure you have one or two sessions to understand navigation...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
No data available
Hunters.AI
 

Interactive Demo

Demo not available
Demo not available
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Meuhedet, East Boston Neighborhood Health Center
We're happy to support organizations like Booking.com, ChargePoint, Yext, Red Ventures and Cimpress who leverage Hunters SOC Platform to transform their security teams' operations.
Find out what your peers are saying about Splunk, IBM, Wazuh and others in Security Information and Event Management (SIEM). Updated: April 2026.
893,221 professionals have used our research since 2012.