


Find out what your peers are saying about CrowdStrike, SentinelOne, Microsoft and others in Endpoint Detection and Response (EDR).
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 3.4% |
| Fortinet FortiEDR | 2.8% |
| Open EDR | 0.9% |
| Other | 92.9% |



| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 21 |
| Large Enterprise | 48 |
| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 9 |
| Large Enterprise | 14 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
Fortinet FortiEDR integrates with FortiGate, offering advanced antivirus and AI-driven behavioral analysis, automatic incident response, and strong scalability in endpoint security. It's especially noted for ease of deployment and a user-friendly interface.
Fortinet FortiEDR provides robust security features such as firewall and ransomware prevention. Its centralized management console simplifies operations, and customizable settings enhance user experience. It excels in granular threat control and effective threat intelligence for endpoint security and zero-day threat mitigation. The system is valued for its stability and comprehensive data analysis. However, increased cloud security, SASE capabilities, and better intelligence features are needed. Some users find challenges with high resource consumption, user interface, and false positives, while seeking improved cloud functions, SIEM integration, and broader attack surface protection.
What are the key features of Fortinet FortiEDR?Organizations utilize Fortinet FortiEDR for endpoint security across banking, education, and elder care sectors, integrating it with Fortinet firewalls. It detects and blocks unauthorized software and controls lateral movement, aiding in anomaly detection and threat hunting. It ensures network visibility and assists in incident response within diverse infrastructures.
Open EDR is an advanced solution designed to offer comprehensive endpoint detection and response capabilities. It focuses on providing strong security features tailored to meet the specific needs of modern IT environments.
Open EDR offers robust features for detecting, investigating, and responding to threats within an IT ecosystem. Its design caters to professionals seeking efficient threat management tools. By integrating seamlessly into existing infrastructures, it enhances security operations with real-time threat detection and efficient incident response. As a versatile tool, Open EDR supports a wide array of security use cases, making it an essential part of contemporary IT security strategies.
What are the standout features of Open EDR?In the financial sector, Open EDR is often implemented to safeguard sensitive data while ensuring compliance with industry regulations. Tech firms utilize it to maintain comprehensive oversight and control over their digital environments, adapting quickly to emerging threats and vulnerabilities.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.