

Palo Alto Networks VM-Series and Microsoft Defender for Endpoint are key players in the cybersecurity domain, each offering distinct strengths in threat management. Palo Alto VM-Series holds an advantage with strong customization options, while Microsoft Defender for Endpoint benefits from its integration within the Microsoft ecosystem.
Features: Palo Alto VM-Series distinguishes itself with advanced threat detection, robust security including user and application identification, and easy management, especially in cloud environments such as AWS. It offers comprehensive network segmentation and application filtering. Microsoft Defender for Endpoint provides real-time protection combined with automated incident response and integrates seamlessly within the Windows ecosystem.
Room for Improvement: For Palo Alto VM-Series, users suggest better integration with cloud services like Azure, enhanced interface functionalities, and detailed reporting options. Microsoft Defender for Endpoint could benefit from a simpler user interface and improved threat intelligence reporting, along with better integration with non-Microsoft platforms.
Ease of Deployment and Customer Service: Palo Alto VM-Series provides a flexible deployment model suitable for different cloud environments, though customer service experiences vary, with some users praising the technical expertise and others noting inefficiencies. Microsoft Defender for Endpoint offers straightforward deployment within Windows environments, yet support can be complicated by frequent portal updates and changes in product names.
Pricing and ROI: As a premium product, Palo Alto VM-Series justifies its higher price with extensive features and time savings in management, delivering good ROI. Microsoft Defender for Endpoint, often included with Windows licenses, offers great value for organizations already using Microsoft products, achieving cost savings through integration with Microsoft 365.
Without detection and protection measures, organizations would face substantial payments and reputational damage, including the necessity to inform customers about data breaches, potentially leading to loss of business.
We have seen a return on investment when using Microsoft Defender for Endpoint, as it saves labor by reducing the need for staff to focus on it.
The biggest return on investment for me when using Microsoft Defender for Endpoint is the time saving.
Customers can see data within a week, indicating a quick return on investment.
The Microsoft agent, who did not actually work for Microsoft, is one of the vendors that Microsoft uses for support, said, 'Just to set expectations, my lunch break is in an hour and I am going to go away then.'
The level-one support seems disconnected from subject matter experts.
I rate Microsoft support 10 out of 10.
The support quality could be improved.
Resolving issues promptly.
They are responsive and provide high-quality assistance.
We managed to scale it out in a short amount of time, with two months of planning and three months of implementation on 10,000 computers.
Microsoft Defender for Endpoint is scalable enough to handle various devices across environments, whether they are laptops, Android devices, or operating in hybrid environments.
Compatibility is its main feature.
They are easy to upgrade, and with credit licensing, they scale effectively according to demand.
The solution is scalable and can easily handle an increase in the number of users.
It is easy to use with an excellent graphical user interface and extensive documentation, which contributes to its high scalability.
I haven't seen any outages with Microsoft.
I rate Defender 10 out of 10 for stability.
Defender for Endpoint is extremely stable.
Hardware is generally very stable.
I have not experienced any major problems or downtime.
Perfection is unlikely as the dynamic nature of traffic and constant changes can result in occasional bugs despite regular updates.
Repeated interactions are necessary due to Level One's lack of tools and knowledge, hindering efficient problem-solving and negatively impacting our experience with Microsoft support.
In contrast, competing products offer reduced pricing for long-term commitments, which makes it difficult for us in that environment.
We use Microsoft partners to help govern the platform, and as part of an alliance, we want to gather data from each tenant and combine them for a complete view.
Integration with CSIRT across all use levels would make it easier for administrators to stay updated on the blocked entities without manual intervention.
Most customers go for partner-enabled support, which involves multiple layers, leading to delays.
Having those features missing, we are not proposing Palo Alto Networks VM-Series to all customers.
That has been the trend we have seen with Microsoft lately—it is just getting more and more expensive.
Given our extensive Microsoft licensing, transitioning to Defender for Endpoint did not affect licensing costs.
It costs $15 per VM for the P2 plan, which is seen as affordable for customers.
Palo Alto is expensive in terms of pricing, particularly when comparing features to cost.
The cost involves purchasing through a vendor, which might mark up due to the supply chain.
Pricing for Palo Alto Networks is higher than other OEMs, but considering the robustness and features, it gains customer trust.
Defender for Endpoint's coverage across different platforms in our environment is pretty good. We have devices running Linux, Mac OS, Windows, iOS, and Android. It covers all of them.
Microsoft Defender for Endpoint provides a unified management interface allowing customers to manage their on-premises and hybrid infrastructures from a single pane.
One of the best features of Microsoft Defender for Endpoint is its database for identifying zero-day attacks or malware attacks.
We use these tools to prevent all known and unknown threats using Palo Alto Networks' Wildfire and other data filtering tools to gather information, analyze traffic, manage malicious traffic, and offer visibility, control, and attack prevention.
Palo Alto's robust threat intelligence supports new updates, and I can open cases directly with their Threat Intelligence team.
The DNS security significantly enhances security through visibility and detection, allowing control over crucial traffic like DNS, which is often exploited by ransomware.
| Product | Mindshare (%) |
|---|---|
| Microsoft Defender for Endpoint | 5.7% |
| Palo Alto Networks VM-Series | 2.4% |
| Other | 91.9% |


| Company Size | Count |
|---|---|
| Small Business | 82 |
| Midsize Enterprise | 44 |
| Large Enterprise | 96 |
| Company Size | Count |
|---|---|
| Small Business | 31 |
| Midsize Enterprise | 15 |
| Large Enterprise | 24 |
Microsoft Defender for Endpoint provides comprehensive threat protection that integrates well with current systems, offering proactive threat detection and automatic updates while reducing manual efforts.
The platform is designed for seamless integration with Microsoft products, facilitating efficient management and use. It offers proactive ransomware protection and valuable threat intelligence, crucial for timely response and increased visibility across devices. Users highlight its ability to secure endpoints from viruses and malware, integrating with Windows and Office 365 to enhance real-time detection capabilities in diverse environments, including hybrid and on-premises setups. However, enhancements are needed in Linux integration, detection accuracy, and policy implementations.
What are the key features of Microsoft Defender for Endpoint?Microsoft Defender for Endpoint is implemented across industries for securing endpoints, relying on its deep integration with Windows and Office 365 to protect against malware and viruses. Organizations benefit from its real-time detection and comprehensive management capabilities, particularly in hybrid environments where diverse digital infrastructures need safeguarding.
Palo Alto Networks VM-Series offers robust threat prevention and advanced security capabilities. Key features like traffic control and malware protection enhance its usability in cloud and hybrid environments.
Palo Alto Networks VM-Series specializes in delivering comprehensive network security with features such as traffic inspection, threat management, and firewall functionalities. It supports secure remote access and integrates easily with third-party solutions. With features like GlobalProtect VPN and Advanced Threat Protection, enterprises leverage the VM-Series in cloud, on-premises, or hybrid deployments to protect data and enhance cybersecurity. Despite its strengths, improvements in cloud solutions, integration, and scalability are needed.
What are the most important features of Palo Alto Networks VM-Series?In industries like finance, healthcare, and technology, Palo Alto Networks VM-Series plays a crucial role in network security. Companies implement it to secure remote access, protect sensitive data, and ensure compliance. Its compatibility with cloud environments allows versatile deployment across sectors needing stringent cybersecurity measures.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.