No more typing reviews! Try our Samantha, our new voice AI agent.

Cynet vs OpenText Core Endpoint Protection​ comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 29, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Ranking in Endpoint Protection Platform (EPP)
4th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
110
Ranking in other categories
Endpoint Detection and Response (EDR) (6th), Extended Detection and Response (XDR) (5th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (1st)
Cynet
Ranking in Endpoint Protection Platform (EPP)
18th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
45
Ranking in other categories
Security Information and Event Management (SIEM) (21st), User Entity Behavior Analytics (UEBA) (7th), Endpoint Detection and Response (EDR) (18th), Threat Deception Platforms (2nd), Network Detection and Response (NDR) (9th), Extended Detection and Response (XDR) (13th), Ransomware Protection (4th)
OpenText Core Endpoint Prot...
Ranking in Endpoint Protection Platform (EPP)
43rd
Average Rating
7.8
Reviews Sentiment
5.8
Number of Reviews
31
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Endpoint Protection Platform (EPP) category, the mindshare of Cortex XDR by Palo Alto Networks is 3.6%, down from 3.9% compared to the previous year. The mindshare of Cynet is 1.4%, up from 1.1% compared to the previous year. The mindshare of OpenText Core Endpoint Protection​ is 1.5%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP) Mindshare Distribution
ProductMindshare (%)
Cortex XDR by Palo Alto Networks3.6%
Cynet1.4%
OpenText Core Endpoint Protection​1.5%
Other93.5%
Endpoint Protection Platform (EPP)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
Roshan Jadhav - PeerSpot reviewer
Technical Consultant at Vincacyber
Has improved threat detection and streamlined incident analysis through centralized control and AI-driven insights
People are looking for Cynet because it has next-generation threat protection that detects zero-day threats. It has UEBA (user entity behavior analysis), threat hunting features, and storage device control where we can create profiles and block unauthorized USB storage devices. We can also create threat protection policies to detect malware, ransomware, and many other threats. The most valuable feature is the UBA (User behavior analysis). It has integration with SIEM solutions, allowing us to share our logs to third-party SIEM servers. Cynet has AI integration which showcases complete forensic data about threats, making it very easy to understand what happened with the system and what type of incident was detected. Autonomous breach protection is a feature of Cynet which can detect and mitigate known and unknown threats based on signatures. If there are any signature-less files, malware, or ransomware, it will detect them based on autonomous breach protection capabilities. The centralized management console provides a dashboard where we can see four types of attack vectors and incident counts in real-time. It continuously scans the radar and shows open alerts related to files, hosts, users, or networks. We can easily export these alerts and send reports via email.
reviewer2584380 - PeerSpot reviewer
vCIO At Grove Networks Inc. at a computer software company with 11-50 employees
Improving threat detection is critical for enhanced protection
We use Webroot Business Endpoint Protection as a NextGen antivirus solution for our clients. It's included in the contract we have with our clients as a cost-effective option for antivirus protection Webroot Business Endpoint Protection is cost-effective for rolling it out to all of our clients,…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable aspect of Cortex XDR by Palo Alto Networks for me is its integration with AI detection, where we get to know the behavioral detection based on users, traffic patterns, and different services that we consume."
"If the user leaves our premises or network, Palo Alto Traps will still be on that endpoint and will still apply our policies."
"Cortex is the best tool for endpoint detection, and I have used it to verify hashes or domains to identify malicious activity, trigger playbooks that automate and gather endpoint logs, block malicious processes, and update incident tickets, showcasing end-to-end processes with automation in investigation and reducing the analysis workflow."
"It's very stable. I've never experienced downtime for the ASM console or ASM core."
"Cortex XDR is stable, offering high quality and reliable performance."
"Palo Alto Networks Traps improves our security posture and lowers risk by providing next-gen methods to combat against modern threats on all the major platforms."
"The ability to kind of stitch everything together and see the actual complete picture is very useful. I guess you'd call it a playbook. Some people call it the forensics analysis of what was happening on particular endpoints when they detected some malicious behavior, and what transpired before that to cause that. It is also very user friendly. The way they have done everything and integrated all the solutions that they've purchased over the years to make it a very seamless, effective product is very good. One thing about Palo Alto is that they take the products or services that they purchase and make them seamless for the end user as compared to some companies that purchase other companies and then just kind of have their products off to the side or keep different interfaces. Palo Alto doesn't do that."
"The positive impacts I see from Cortex XDR by Palo Alto Networks include a complete 360-degree view of our security posture altogether, being a uniform platform where we are ingesting logs from multiple resources."
"Cynet's most valuable features are laptop and server performance, internal network monitoring, and external firewall lock management."
"The valuable aspects of Cynet are its EDR and XDR components, which are available at a reasonable price point."
"I like that it is possible to use the solution to check more information about the users' devices."
"I like that you can implement it in the managed service portfolio."
"A good feature is how the solution packages varied information into a single dashboard that's readable and meets our needs."
"The feature that I have found most valuable is that the configuration and the usage of the product are not so complicated."
"The feature that I have found most valuable is that the configuration and the usage of the product are not so complicated. For people responsible for using this infrastructure for the first line of workstation monitoring, it's quite easy to use."
"It provides good protection from ransomware and malware attacks. It is very good as compared to other products. If any threat is there, their support is very good. They immediately respond to the users and do a follow-up. They call us and also provide email support."
"The most valuable features of the solution include the endpoint navigation protection, the protection related to the EMS service, as well as the control and the cloud integration capabilities."
"My advice about this product is that it is a very good solution and offers a stable and trusted software that runs smoothly and is easy to deploy."
"Overall, the solution is stable."
"I like that Webroot is very lightweight, it didn't bog down the machine, and more importantly, it had heuristics artificial intelligence to some degree, where you have one endpoint recognizing issues because it maintains a cloud database, so if one client recognizes a threat, it would add it to the database, and almost immediately, every agent in the world would also know about that threat."
"This is a great solution - it helped us a lot without business and improved the security we're offering to our customers."
"There aren't any features that really stand out — I just want it to keep malware out of my system. To date, I haven't had any malware in my system."
"We've not had any issues with scalability. If an organization needs to expand, they can do so quite easily."
"Speed"
 

Cons

"Cortex XDR by Palo Alto Networks could improve by adding a sandbox feature to better compete with their competitors which have it."
"Currently, we are monitoring all USB drives and ports but we would like to improve our device control capabilities."
"Cortex XDR by Palo Alto Networks could improve its user interface, which is more complicated compared to competitors such as SentinelOne."
"We would also like to have advanced tech protection and email scanning."
"Previously, the endpoint would leave the environment, not being on our VPN, essentially unable to interact with the server to upload files. It was unable to retrieve new file verdicts. It was using a thing called "local analysis" to determine if something was a malicious file or not. There was no dynamic analysis."
"Cortex XDR could improve its sales support team, including better commission structures and referral programs."
"The complexity and confusion regarding product variants, such as XDR, Forexiant, and Forexon, must be addressed."
"It would be good to have a better way to search for a file within the UI."
"SIEM - Although with their Centralised Log Management Cynet has created the basis for SIEM functionality, this is to be expanded in the near future."
"A support center in Asia is needed."
"Increased application for SOAR abilities across interconnected devices would be a welcome improvement."
"Sometimes, it is necessary for me to make important changes to a hard drive of a computer, and because Cynet does not allow me to do that, I have to go to the console and remove the computer from the security group just for Cynet. After that, I have to wait for 10 or 15 minutes for that to take effect. I would like to be able to disable Cynet locally. I shouldn’t have to go to the console to find the PC and then take it out of the group and then add it again to the group. I should locally be able to disable Cynet on a computer with a password or something like that, but it is currently not possible."
"In terms of what could be improved, I would say the usability of this product for new threats. Meaning, not everything which is new is properly seen by the product and not all the required actions are taken."
"I would like to see support for mobile protection and some additional reports included."
"Increased application for SOAR abilities across interconnected devices would be a welcome improvement."
"There is room for improvement in terms of support. The support should be faster to respond."
"We need to have a stronger defense against CryptoLock and other attackers."
"Its detection capability for certain attacks should be improved. It should have better and wider detection for certain malware attacks. It could also have some sort of RMN."
"I want Webroot to be easier to use and set up. It is not very intuitive."
"We need more control over when upgrades to the app are rolled out."
"Areas for improvement would be the reporting system in the admin console."
"It needs to improve the problems with the faster connection, and have a huge reduction in false positives."
"They should provide more information on the type of cyber attacks."
"The console spins up relatively slowly, and some of the configuration items are obscure (e.g., reporting back one time per day is a default setting) and need to be tweaked."
 

Pricing and Cost Advice

"Very costly product."
"The pricing is okay, although direct support can be expensive."
"The price was fine."
"Traps pays for itself within the first 16 months of a three-year subscription. This is attributed to OPEX savings, as security teams spent less time trying to identify and isolate malware for analysis as a result of a reduction in malware incidents, false positives, and breach avoidance."
"Cortex XDR's pricing is ok."
"It has a higher cost than other solutions, like CrowdStrike or Microsoft’s EDR tools, but it reduces the cost of our operations because it’s a new generation antivirus tool."
"The pricing is a little bit on the expensive side."
"The pricing is a little high. It is per user per year."
"The pricing was good."
"We purchase the product’s yearly license."
"Cynet is very affordable."
"It is extremely affordable. I'll give it a five out of five in terms of price. It was half the cost of the next closest competitor, and the competitor didn't provide SOC services."
"The licensing for Cynet is yearly. The solution pricing depends on the customer, but it is not very expensive."
"Its licensing is on a monthly basis."
"Our billing is on a quarterly basis, but they have monthly or annual billing availability."
"This solution is expensive. I would rate the price as a three out of five when compared to similar products."
"Webroot is less expensive than SentinelOne."
"I can't recall the exact pricing, but I believe there is a monthly fee of $20-30 per user."
"The solution is very cost-effective."
"Its cost is not much per month. Our price is a couple of bucks a user."
"Our strategy was to overestimate the complexity and cost. It turned out that Webroot's assurance was justified."
"It is relatively cheap."
"Webroot Business Endpoint Protection is not too expensive. My licenses cost me between $300 and $400. It is really good price wise."
"The solution is pretty cheap, actually. At our level, which is at 2,500 endpoints, we're paying 87 cents an agent per month."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
893,244 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Construction Company
12%
Comms Service Provider
9%
Manufacturing Company
8%
Manufacturing Company
10%
Financial Services Firm
10%
Comms Service Provider
9%
Computer Software Company
8%
Comms Service Provider
8%
Financial Services Firm
8%
Construction Company
8%
Computer Software Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business45
Midsize Enterprise21
Large Enterprise48
By reviewers
Company SizeCount
Small Business29
Midsize Enterprise7
Large Enterprise12
By reviewers
Company SizeCount
Small Business35
Midsize Enterprise2
Large Enterprise2
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
When evaluating User Activity Monitoring, what aspect do you think is the most important to look for?
The support team that stands behind the detection and response. Is there adequate expertise and are they behind you ...
What is your experience regarding pricing and costs for Cynet?
Cynet is not very costly. We can refer it to other customers because Cynet does not ask for additional costs for add-...
What needs improvement with Cynet?
One area where Cynet needs improvement is tamper protection for Mac and Linux agents. It currently has tamper protect...
What is your experience regarding pricing and costs for Webroot Business Endpoint Protection?
Webroot Business Endpoint Protection is probably on the cheaper side, so I would rate their pricing a one or a two ou...
What needs improvement with Webroot Business Endpoint Protection?
Webroot Business Endpoint Protection needs to improve its ability to detect threats. It does not do what it's adverti...
What is your primary use case for Webroot Business Endpoint Protection?
We use Webroot Business Endpoint Protection as a NextGen antivirus solution for our clients. It's included in the con...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
No data available
Webroot SecureAnywhere Business Endpoint Protection
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Meuhedet, East Boston Neighborhood Health Center
Mytech Partners
Find out what your peers are saying about Cynet vs. OpenText Core Endpoint Protection​ and other solutions. Updated: April 2026.
893,244 professionals have used our research since 2012.