Try our new research platform with insights from 80,000+ expert users

Intercept X Endpoint vs Zscaler Client Connector comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 8, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Ranking in Endpoint Detection and Response (EDR)
7th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
108
Ranking in other categories
Endpoint Protection Platform (EPP) (5th), Extended Detection and Response (XDR) (6th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (2nd)
Intercept X Endpoint
Ranking in Endpoint Detection and Response (EDR)
14th
Average Rating
8.4
Reviews Sentiment
6.7
Number of Reviews
109
Ranking in other categories
Endpoint Protection Platform (EPP) (11th), ZTNA (9th), Managed Detection and Response (MDR) (7th), Extended Detection and Response (XDR) (13th), Ransomware Protection (4th)
Zscaler Client Connector
Ranking in Endpoint Detection and Response (EDR)
32nd
Average Rating
8.8
Reviews Sentiment
5.9
Number of Reviews
6
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2026, in the Endpoint Detection and Response (EDR) category, the mindshare of Cortex XDR by Palo Alto Networks is 3.4%, down from 4.0% compared to the previous year. The mindshare of Intercept X Endpoint is 1.6%, down from 2.1% compared to the previous year. The mindshare of Zscaler Client Connector is 0.6%, up from 0.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR) Mindshare Distribution
ProductMindshare (%)
Cortex XDR by Palo Alto Networks3.4%
Intercept X Endpoint1.6%
Zscaler Client Connector0.6%
Other94.4%
Endpoint Detection and Response (EDR)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
AM
IT Head at Dee Development
Has struggled to detect major threats but has offered basic protection over time
Intercept X Endpoint could learn from CrowdStrike in terms of overall performance and filtering because performance is most important, especially these days as Windows is getting buggier and buggier, which puts a huge load on the PC, and even with the most advanced CPUs and everything in place, it still lags in performance in so many places, thanks to Windows' clumsy design of these collaboration suites that make it extremely heavy on PC's resources. The interface of Intercept X Endpoint is quite old-fashioned. The Sophos interfaces, including for Intercept X Endpoint, are quite bad actually; to be very honest, even in UTM boxes, they are not great at all. You can hardly see a very small portion of windows while it's creating the firewall rules, and we have been complaining about this for quite some time, but there hasn't been any improvement on those grounds. Intercept X Endpoint's anti-ransomware capabilities failed us during a bad attack, and just because of our own backup policies, we could restore our normal operations; otherwise, if we had to depend on this solution, we would have been long dead because the infection was so bad, it couldn't even detect the infection. Intercept X Endpoint cannot handle zero-day attacks; in my experience, last year, we had this major issue with a malware attack, and it happened just because of our backup policies that we were able to recover without any support from Sophos, which just told us they would charge us some 1 Crore in rupees. Intercept X Endpoint should improve their implementation; things will never be perfect for the new world. This new world is always facing new kinds of attacks and new ways to compromise the system. They need to learn fast, implement fast, and sometimes redesigning the solution is the solution—not just patchwork. There was a time we used to love Sophos because of its fresh design and innovative thought. In my experience, when technical companies are led by MBA professionals, they lose their shine on the technical part and become more dependent on target sales; it turns into a marketing-centric operation that loses the technical focus completely.
DA
IT Support Admin at Kuehne+Nagel
Client activity has been monitored efficiently through in-depth log analysis and traffic filtering
I use the Zscaler speed test, and it is very nice. We use some logs from Zscaler Client Connector to collect data and see what is happening, such as if there is an interruption or something. There is a specific tunnel version that we have to use because, depending on the internet provider, some of them have lower speed, so we have some issues. This is because of the provider, not from Zscaler. We use Office 365 services and Office applications, and because some connections are slow and they do not have full coverage from the internet provider, we have some issues. If the speed is slow for Zscaler Client Connector connection, then we have issues because if the speed is not good, then Zscaler Client Connector goes down. This may be because they put some policy. Of course, if you use Office 365 services such as Outlook, the minimum bandwidth is 5 megabits and more, so this causes issues if the users do not have a good remote connection. This depends on the companies and the users, so they need to fix it. This is not from us or our company. It is very useful, and the logs are very helpful. When we go to logs, we understand what is happening.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cortex XDR by Palo Alto Networks should be a stable solution."
"The positive impacts I see from Cortex XDR by Palo Alto Networks include a complete 360-degree view of our security posture altogether, being a uniform platform where we are ingesting logs from multiple resources."
"The solution allows us to gain remote access without the user's knowledge and take the necessary actions on the device."
"WildFire AI is the best option for this product."
"Traps has drastically reduced our endpoint attack surface via advanced detection capabilities, sandboxing of never before seen programs, and by drastically limiting where executables can launch in the first place."
"The tool is easy to use."
"We have a complete overview of all our PCs and it's very easy to handle and to use the interface. It has a lot of benefits for us."
"When the pandemic started, Palo Alto came up with many solutions, which helped with the quick shift from on-premises to the cloud."
"The most valuable features are ease of use and the GUI."
"The package we use also comes with spam filtering features, which are quite useful."
"Its AI algorithms provide excellent protection against attackers."
"The threat analysis center is nice."
"The key factor that attracted me to Sophos Intercept X was the multi-platform. I have multiple clients that have mixed environments of Mac and Windows. I am able to deliver a standard solution, regardless of the platform."
"It is very easy to set up and easy to use. It is also not resource-intensive."
"Anti-virus captures malicious threats and an aggressive next generation firewall."
"After that, the client switched to Sophos to get the protection they lacked. It either works or it doesn’t and Sophos works."
"The best features of Zscaler Client Connector are that it gives the client a much more transparent experience, as they don't have to worry about connecting to a VPN."
"Zscaler Client Connector is quite scalable, and I would rate its scalability as nine or ten out of ten."
"It is very important to see what is happening between the user and the applications that we have, and to filter the traffic from outbound traffic and inside traffic."
"It is very useful, and the logs are very helpful; when we go to logs, we understand what is happening."
"I'd rate the solution nine out of ten."
"Zscaler Client Connector has eliminated VPN bottlenecks and outages, improved user productivity with instant secure access, and reduced help desk tickets related to VPN issues, overcoming 60% of VPN-related problems while allowing faster onboarding of remote users and better enforcement of zero-trust security policies."
"The solution operates in the background seamlessly without the user noticing."
"It is very important to see what is happening between the user and the applications that we have, and to filter the traffic from outbound traffic and inside traffic."
 

Cons

"There's an overall lack of features."
"It's more focused on network communication. If a customer wants to increase the level of protection and start working with documents, it's impossible to integrate these features into the system. It's more of a communication-oriented system than a content security-oriented system."
"The solution lags to the real-time scenarios here and there."
"The encryption is not up to the mark."
"It tends to do 99.9% of things. The only thing I'd like is single sign-on authentication into their cloud platform so that my users can be properly authenticated against it."
"The playbooks could be improved to include more functionalities or actions."
"Cortex does not offer an on-premises solution. However, some customers would prefer not to be on the cloud. It would be ideal if it could offer something on-prem as well."
"The dashboard is the area that needs to improve so that we can have the ability to drill down without having to go elsewhere to verify results."
"The solution's pricing could be better."
"The performance is very slow and should be faster."
"They should keep doing what they're doing. Both of them have entered the EDR/MDR space, and they're keeping up with their competitors. I have a hard time understanding why their capabilities aren't garnering more attention."
"The solution can be expensive, although we do see the value in it."
"We are considering switching from this solution as a result of the closer integration needed between the firewall systems and the EDR."
"The integration has room for improvement, especially with Mac OS."
"This solution is not in the high ratings on many of the top review sites. This solution has to be near the top for me to continue using it."
"It consumes a lot of resources, and something needs to be done for that."
"I rate this product nine out of ten because I have seen some minor instability issues after updates and some room for UI improvement for deeper analytics, with instances of major issues after updating the GCC that required rollbacks."
"If the speed is slow for Zscaler Client Connector connection, then we have issues because if the speed is not good, then Zscaler Client Connector goes down."
"There is room for improvement regarding the price of Zscaler Client Connector, as it is one of the most expensive solutions available."
"The stability of Zscaler Client Connector needs improvement, as it often disconnects and reconnects."
"If the speed is slow for Zscaler Client Connector connection, then we have issues because if the speed is not good, then Zscaler Client Connector goes down."
"There is room for improvement regarding the price of Zscaler Client Connector, as it is one of the most expensive solutions available."
"If the speed is slow for Zscaler Client Connector connection, then we have issues because if the speed is not good, then Zscaler Client Connector goes down."
"Zscaler Client Connector is not low in cost; it is definitely on the higher side."
 

Pricing and Cost Advice

"The cost depends on your chosen license type, like Pro or other licenses."
"The pricing is a little bit on the expensive side."
"I don't recall what the cost was, but it wasn't really that expensive."
"The solution is expensive. It's pricing is on a yearly-basis."
"We pay about $50,000 USD per year for a bundle that includes Cortex XDR."
"I did PoCs on products called Cylance and CrowdStrike. Although, I consider these products and they were also good, when it come to cost and budgetary factors, Traps has been proven to be better than the other two products. It is quite cost-effective and delivers all the entire solution which we require."
"Cortex XDR by Palo Alto Networks is an expensive solution."
"It has a higher cost than other solutions, like CrowdStrike or Microsoft’s EDR tools, but it reduces the cost of our operations because it’s a new generation antivirus tool."
"We have bought a three-year license."
"We were able to eliminate the ransomware using the one-month, full-featured trial license."
"The price of this solution is a little high compared to competitors because they do not have a proper pricing structure."
"One can pay for the license annually, or at two and five year intervals."
"The price of Sophos Intercept X is expensive. The license is paid on an annual basis. There are extra features that can be added depending on the endpoints. The solution is priced twice as much as the Comodo solution."
"The price of this product should be reduced because it is a little high."
"You are able to purchase more licenses for the number of devices or servers that you require. There are many other features available but our license does not include them, such as XDR, which is endpoint detection and response. We have not explored the new features as of yet but plan to in the coming future."
"The solution’s pricing is high."
Information not available
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
884,933 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
9%
Manufacturing Company
9%
Financial Services Firm
9%
Comms Service Provider
7%
Computer Software Company
12%
Comms Service Provider
9%
Manufacturing Company
9%
Outsourcing Company
5%
Manufacturing Company
23%
Government
12%
Comms Service Provider
7%
Financial Services Firm
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business44
Midsize Enterprise20
Large Enterprise47
By reviewers
Company SizeCount
Small Business75
Midsize Enterprise22
Large Enterprise22
By reviewers
Company SizeCount
Small Business2
Large Enterprise5
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
How does Crodwstrike Falcon compare with Sophos Intercept X?
I like that Crowdstrike Falcon allows me to easily correlate data between my firewalls. Its detection and machine lea...
What is your experience regarding pricing and costs for Sophos Intercept X?
Intercept X Endpoint has some impact on the budget. It is quite costly when measuring Intercept X Endpoint's protecti...
What is your experience regarding pricing and costs for Zscaler Client Connector?
Zscaler Client Connector is notably costly, with pricing rated at five out of ten in terms of affordability, reflecti...
What needs improvement with Zscaler Client Connector?
Zscaler continues to strengthen the Zscaler Client Connector by introducing new features and expanding the platform’s...
What is your primary use case for Zscaler Client Connector?
I’m not working directly for Zscaler; I work with a partner organization as a Systems Integrator. Our work is not lim...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Sophos Intercept X
No data available
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Flexible Systems
Information Not Available
Find out what your peers are saying about Intercept X Endpoint vs. Zscaler Client Connector and other solutions. Updated: March 2026.
884,933 professionals have used our research since 2012.