


OpenText Core Endpoint Protection and Microsoft Defender for Endpoint compete in the comprehensive security solutions category. Microsoft Defender appears to have the upper hand due to its seamless integration within Windows environments, advanced threat detection, and response capabilities, making it particularly advantageous for organizations heavily using Microsoft services.
Features: Microsoft Defender for Endpoint provides seamless integration with Windows environments, robust threat detection, and automatic attack disruption. Its advanced response capabilities and detailed threat analytics are beneficial in maintaining security. On the other hand, OpenText Core Endpoint Protection focuses on delivering solid protection, although its integration and feature set may not be as extensive as Microsoft's offering.
Room for Improvement: OpenText Core Endpoint Protection could improve its handling of threats like CryptoLock and enhance its reporting capabilities, which often lack detail. Meanwhile, Microsoft Defender for Endpoint can work on simplifying its user interface, enhancing reporting capabilities, and reducing false positives. Both products should focus on improving threat detection accuracy and minimizing performance impacts.
Ease of Deployment and Customer Service: OpenText Core Endpoint Protection provides flexible deployment options across public, hybrid, and on-premises environments, but faces criticism on customer service wait times. Microsoft's Defender for Endpoint, widely deployable across hybrid and cloud environments, offers versatility and significant integration advantages for Microsoft service users. However, its extensive support options can also result in response delays.
Pricing and ROI: OpenText is recognized for its affordability, appealing to companies seeking cost-effective endpoint solutions. Although Microsoft Defender for Endpoint may appear expensive initially, when combined with broader enterprise licenses, it becomes cost-effective by offering extensive features and integration benefits. Both products deliver ROI, with Defender's value becoming more evident when leveraging Microsoft's comprehensive suite.
| Product | Mindshare (%) |
|---|---|
| Microsoft Defender for Endpoint | 7.0% |
| Cortex XDR by Palo Alto Networks | 3.6% |
| OpenText Core Endpoint Protection | 1.5% |
| Other | 87.9% |


| Company Size | Count |
|---|---|
| Small Business | 46 |
| Midsize Enterprise | 20 |
| Large Enterprise | 49 |
| Company Size | Count |
|---|---|
| Small Business | 82 |
| Midsize Enterprise | 44 |
| Large Enterprise | 95 |
| Company Size | Count |
|---|---|
| Small Business | 35 |
| Midsize Enterprise | 2 |
| Large Enterprise | 2 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
Microsoft Defender for Endpoint provides comprehensive threat protection that integrates well with current systems, offering proactive threat detection and automatic updates while reducing manual efforts.
The platform is designed for seamless integration with Microsoft products, facilitating efficient management and use. It offers proactive ransomware protection and valuable threat intelligence, crucial for timely response and increased visibility across devices. Users highlight its ability to secure endpoints from viruses and malware, integrating with Windows and Office 365 to enhance real-time detection capabilities in diverse environments, including hybrid and on-premises setups. However, enhancements are needed in Linux integration, detection accuracy, and policy implementations.
What are the key features of Microsoft Defender for Endpoint?Microsoft Defender for Endpoint is implemented across industries for securing endpoints, relying on its deep integration with Windows and Office 365 to protect against malware and viruses. Organizations benefit from its real-time detection and comprehensive management capabilities, particularly in hybrid environments where diverse digital infrastructures need safeguarding.
OpenText Core Endpoint Protection offers cloud-managed endpoint security with AI integration, providing real-time protection and lightweight performance. It ensures low system impact, seamless cloud integration, and cost-effective security solutions for various devices.
OpenText Core Endpoint Protection is a comprehensive endpoint security platform utilized by managed-service providers for antivirus and firewall functionality across servers, workstations, and mobile devices. It employs AI for robust threat detection, integrating with cloud applications for real-time updates. Multi-layered security features include malware protection, network defense, and DNS protection. Although connectivity and threat reporting need improvement, this platform extensively supports remote device management and integrates efficiently with Active Directory policies.
What are the key features of OpenText Core Endpoint Protection?OpenText Core Endpoint Protection finds application in industries requiring stringent data protection and peace of mind over device security. Managed-service providers implement this for comprehensive antivirus and firewall features, safeguarding multi-device networks. It is particularly useful for DNS protection and integrating with Active Directory policies, enabling secure yet flexible operations across sectors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.