


HP Wolf Security and Kaspersky Endpoint Security Cloud are competing in the endpoint protection category. Kaspersky Endpoint Security Cloud has the upper hand with its advanced features and adaptive security, making it worth the investment.
Features: HP Wolf Security utilizes micro-virtualization technology for threat isolation, providing robust protection. It also focuses on device-centric security with Office and PDF Micro VM protection. The secure browser isolates high-risk web activities effectively. Kaspersky Endpoint Security Cloud offers comprehensive threat intelligence-driven defense, anti-phishing and anti-malware features, and a cloud-based console for ease of managing endpoints. It also includes advanced email gateway protection and seamless integration with Microsoft Office 365.
Room for Improvement: HP Wolf Security could enhance its network-wide threat management capabilities and further integrate cloud-based security measures. Expanding report customization options and improving dashboard features will add value. Moreover, enhancing its adaptive security features would be beneficial. Kaspersky Endpoint Security Cloud can improve export data and central management post-update, optimize its Cloud Discovery feature to reduce manual input, and enhance the integration with external storage services.
Ease of Deployment and Customer Service: HP Wolf Security provides a straightforward deployment model with strong customer support, making the installation process hassle-free for businesses. Kaspersky Endpoint Security Cloud offers seamless cloud-based deployment and well-regarded customer service, setting a high standard in the industry.
Pricing and ROI: HP Wolf Security is recognized for its competitive pricing and favorable return on investment, achieved through cost-effective device-centric protection strategies. Kaspersky Endpoint Security Cloud, while potentially more expensive, offers higher ROI through its extensive security capabilities and effective threat management.
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 3.4% |
| Kaspersky Endpoint Security Cloud | 0.7% |
| HP Wolf Security | 2.0% |
| Other | 93.9% |


| Company Size | Count |
|---|---|
| Small Business | 44 |
| Midsize Enterprise | 20 |
| Large Enterprise | 48 |
| Company Size | Count |
|---|---|
| Small Business | 3 |
| Large Enterprise | 5 |
| Company Size | Count |
|---|---|
| Small Business | 8 |
| Midsize Enterprise | 4 |
| Large Enterprise | 3 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
HP Wolf Security is a comprehensive cybersecurity solution that bolsters your organization's cyber-resilience on multiple fronts. With its full-stack security approach, it ensures layered protection from hardware to the cloud, providing a robust defense against cyber threats. HP Wolf Security introduces endpoint isolation, a cutting-edge feature that effectively halts threats that may go unnoticed by Next-Generation Antivirus (NGAV) and Endpoint Detection and Response (EDR) systems. Moreover, it extends its security coverage to printers, equipping them with advanced detection and self-healing capabilities to further safeguard your digital ecosystem. This integrated solution streamlines IT and security risk management, resulting in fewer alerts and false positives, and reduces the time and effort required for endpoint incident analysis and remediation. Notably, HP Wolf Security prioritizes productivity, allowing you to manage risk without disrupting the user experience, enabling worry-free work from anywhere, and offering rapid IT disaster recovery at scale.
Kaspersky Endpoint Security Cloud offers robust cybersecurity with features like malware detection and cloud-based endpoint management, suitable for businesses requiring advanced protection.
This solution provides comprehensive endpoint security, including a self-protection mechanism, EDR service, and integration with Microsoft Office 365. It supports multiple operating systems with components like Web Control, Device Control, and BitLocker encryption. Anti-phishing and anti-malware features, alongside detailed vulnerability assessments, enhance its security capabilities. Despite its strengths, users note areas for improvement in deployment, update management, and resource usage. Challenges include high CPU usage, installation delays, and stability issues. Companies benefit from features like ransomware protection and cloud platform integration, ensuring protection against threats.
What are the most important features of Kaspersky Endpoint Security Cloud?Companies in sectors such as automation and insurance implement Kaspersky Endpoint Security Cloud for its advanced cybersecurity features. They rely on its capabilities for application blocking, web and email threat defense, and compliance with data protection standards. By leveraging endpoint management and behavior analysis, organizations integrate this tool with cloud platforms to secure servers, workstations, and mobile devices.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.