15 ans à aider les entreprises françaises
à choisir le meilleur logiciel

Avis clients sur Cortex XDR

En savoir plus sur Cortex XDR

La protection des endpoints, bloque les menaces sur les endpoints et coordonne les mesures de contrôle avec la sécurité du cloud et du réseau.

En savoir plus sur Cortex XDR

Avantages :

It was easy to deploy to the end users computers. Easy to manage from one location.

Inconvénients :

The need to be connected to the internet is a limitation of the product.

Cortex XDR - Notes

Note moyenne

Facilité d'utilisation
4,0
Service client
4,6
Fonctionnalités
4,4
Rapport qualité-prix
4,0

Probabilité de recommander le produit

8,4/10

Cortex XDR a reçu une note globale de 4,4 étoiles sur 5 d'après 14 avis d'utilisateurs publiés sur Capterra.

Filtrer les avis (14)

Classer par

Avez-vous déjà utilisé Cortex XDR ?

Partagez vos expériences avec d'autres acheteurs de logiciels.

Filtrer les avis (14)

Utilisateur vérifié
Utilisateur LinkedIn vérifié
Collecte de fonds, 501–1 000 employés
Temps d'utilisation du logiciel : plus d'un an
Source de l'avis

Good Endpoint Security Solution

5,0 il y a 4 ans

Commentaires : Traps is good software to have. It did stop some malicious software that was downloaded.

Avantages :

This product doesn't do the old-fashioned signature based detection, but works by observing attack technique and behaviors. One of our workers had an Excel document which tried to reference some command line software to manipulate data. Of course this is very much how a virus could work, so Traps blocked it. Although this was a false positive, the solution using that Excel was not approved so Traps did a good thing. Management through the admin portal is visually pleasing and intuitive for most if the options.

Inconvénients :

We moved from on-prem installation to Cloud version of Traps. In the beginning the training options for the cloud version were almost non-existent. Even now, our training option was cancelled because of no other applicants for it. There is a free on-demand version of the training which I now will settle for. Managing the "Agent Installations" is not really intuitive.

Shawn
IT Systems Specialist (É.-U.)
Enseignement primaire et secondaire, 501–1 000 employés
Temps d'utilisation du logiciel : plus de deux ans
Source de l'avis

Alternatives envisagées précédemment :

Cortext XDR - Great Endpoint Protection and so much more.

5,0 il y a 5 mois

Avantages :

Cortex made our network more secure. When we swapped from our previous anti-virus platform to Cortex XDR we started seeing things that had slipped past our old AV platform and was causing issues in our network. Cortex made it easy to locate and clean these machines and if needed it made it easy to isolate them until they were cleaned and approved to be put back on our network.

Inconvénients :

The biggest con for our team, being part of a public school system, is the cost. The cost of this platform compared to traditional anti-virus/endpoint protection platforms such as Avast, Symantec, etc. is very significant and we had to get a trial of this setup and running as a proof of concept to justify the cost difference to our board and county commission in order to get the money to purchase this product but it has definatley been worth it.

Davesh
Davesh
Automation Engineering Intern (É.-U.)
Utilisateur LinkedIn vérifié
Logiciels, 501–1 000 employés
Temps d'utilisation du logiciel : 1 à 5 mois
Source de l'avis

Difficult to get setup

3,0 il y a 5 ans

Avantages :

Quick intrusion/threat detection, silent background running

Inconvénients :

Extremely difficult to roll out to company, was blocking company wide software such as 7-zip, was blocking Skype for Business messages, took forever to troubleshoot and properly roll out and install. In addition, the software does not have a great UI, it appears very serious and unnecessarily serious when detecting small threats

Jerome
Helpdesk Manager (É.-U.)
Santé, bien-être et fitness, 201–500 employés
Temps d'utilisation du logiciel : plus d'un an
Source de l'avis

Alternatives envisagées précédemment :

Cortex XDR Review

4,0 il y a 2 ans

Commentaires : Cortex is a solid product. We haven't had any major complaints from the user community. We haven't had to unblock any major products that were perceived as spam at this point. Many other products tended to block updates to products due to the executable file not being recognized by their database. We haven' had that issue with Cortex.

Avantages :

Our team is responsible for the deployment of Cortex into our Mac and PC environment. The agent was very easy to distribute utilizing our Deployment Software tool. The dashboards provide an excellent view into what is active and reporting back to the tool. We haven't had any major whitelist issues between the tool and endpoints.

Inconvénients :

I would like to see the scan on demand option as an easy one-click process for end users so they can be pro-active.

Shitij
Sr. Security Manager (É.-U.)
Services d'information, 10 000+ employés
Temps d'utilisation du logiciel : plus d'un an
Source de l'avis

Alternatives envisagées précédemment :

Excellent product with great flexibility in terms of outcomes

4,0 il y a 3 ans

Commentaires : I evaluated this technology and compared it to other SOAR and NDR platforms in the space. We did choose Cortex XDR due to the use case coverage and close knit relationships with Palo's executive teams. Overall, very happy with the acquisition of this product line in our IT environment and the security program has benefited directly because of the day-to-day use of this product across a wide variety of business and technical use cases in our environment.

Avantages :

The ability to create custom playbooks and integrate APIs from disparate vendors was the highlight of our use of this product.

Inconvénients :

Customer support can be patchy. Also, depending on the use case being implemented, documentation and systems engineering support from Palo can vary. We were able to work through these issues being an Enterprise user for PANW, however, small to mid size companies may find the time to value to drag a fair bit.

David
Network Administrator (É.-U.)
Construction, 201–500 employés
Temps d'utilisation du logiciel : plus de deux ans
Source de l'avis

Much better than signature based AV

5,0 il y a 5 ans

Commentaires : We needed a malware protection system that really worked. We had tried other AV programs but they would all fail at some point. We have had zero problems with workstations getting infected since using Traps.

Avantages :

Traps does not rely on AV signatures. It relies on detecting the programmatic exploits that virus writers use to infect PCs. It also uses the behavior of programs to detect malicious activity. And it really works. It has caught malicious infected documents, spyware, adware, and grayware trying to infect our systems. And it stops the programs cold. Also, the new version is cloud based so we can protect remote users.

Inconvénients :

The endpoint agent updating process is still not as automatic as I think it should be. But it has been vastly improved in the latest version.

Daniel
Systems Administrator (É.-U.)
Hôtellerie, 1 001–5 000 employés
Temps d'utilisation du logiciel : plus de deux ans
Source de l'avis

Best AV I’ve Used

5,0 il y a 2 ans

Commentaires : It’s the most effective endpoint protection software I’ve used to date.

Avantages :

I’ve never seen it miss blocking actual malware. The hueristic analysis is also very accurate.

Inconvénients :

It often mistakes IT admin tools as malware. Which is understandable, albeit annoying.

Javier
CSO (Espagne)
Logiciels, 11–50 employés
Temps d'utilisation du logiciel : plus d'un an
Source de l'avis

Good solution for Endpoint... but with comments

4,0 il y a 5 ans

Commentaires : The general experience is very positive. There have been hardly any incidents after almost 2000 deployments and, on the other hand, the level of protection and information on the endpoints has improved enormously.

Avantages :

In standard endpoints it works perfectly. Protects equipment easily and efficiently. It has support for most of the operating systems updated in a company and the false positive rate is acceptable

Inconvénients :

The need to be connected to the internet is a limitation of the product. Proxy-based architectures are not supported, which makes it impossible to use them for systems in network segments without internet access

Richard
IT Supervisor (É.-U.)
Gestion de l'enseignement, 501–1 000 employés
Temps d'utilisation du logiciel : 6 à 12 mois
Source de l'avis

Decent Anti-Virus

4,0 il y a 4 ans

Commentaires : It has been a pretty decent product overall. We used a management system to deploy it to out desktops and laptops. Wish they had a way to deploy it from the portal.

Avantages :

It was easy to deploy to the end users computers. Easy to manage from one location. Installing and activating the license was pretty easy and straight forward. It was a good solution to interface with our firewall.

Inconvénients :

I had it installed on a few desktops and servers during the testing period. The vendor had a page setup for us. But once we bought the software I had to un-install the trial verison and install it again with out license. You could do any type of upgrade.

Utilisateur vérifié
Utilisateur LinkedIn vérifié
Logiciels, 10 000+ employés
Temps d'utilisation du logiciel : 6 à 12 mois
Source de l'avis

This is awesome

5,0 il y a 6 ans

Avantages :

I like that this was a well designed product that pushed my org's concept of IT security

Inconvénients :

It's expensive. We had to work to find budget for this

Stefan
Network- and Security Engineer (Allemagne)
Produits chimiques, 201–500 employés
Temps d'utilisation du logiciel : plus de deux ans
Source de l'avis

Cortex XDR

5,0 il y a 11 mois

Commentaires : Sehr ausgereiftes Produkt welches mit einer guten Darstellung überzeugt.Sehr gute Thread Erkennung.auch mit der lokalen Analyse (KI)

Avantages :

Gute Darstellung aller Clients und BedrohungenKlare Strukturen innerhalb des ProgrammsEinfache InstallationGute und einfache Update-Prozesse

Inconvénients :

Aktuell kann ich da nichts zu sagen. Wir sind aktuell sehr zufrieden mit dem Produkt

Troy
Software Engineer (É.-U.)
Hôpitaux et soins de santé, 10 000+ employés
Temps d'utilisation du logiciel : plus d'un an
Source de l'avis

As a User I Don't Notice It, Which is Good

5,0 il y a 2 ans

Avantages :

This software seems to have a light footprint on performance when running on computers. I have it running all the time on mine and I don't notice any performance hit as a result, which is good. It seems to work well on lower-end performing computers (i5 processor, 8GB RAM) as well as higher-end performing ones (e.g. i7 processor, 16GB+ RAM, etc).

Inconvénients :

No cons I can think of; however, I am only a user (not an admin), so I only see one side of this software, which looks good from my perspective. I don't notice it's running, which is the best you can hope for in a security product that's always running on your computer.

Jack
Engineer (Liban)
Services financiers, 1 001–5 000 employés
Temps d'utilisation du logiciel : Essai gratuit
Source de l'avis

Alternatives envisagées précédemment :

Next gen endpoint protection with some caveats

4,0 il y a 4 ans

Commentaires : Overall, the product is promising offering next gen protection against 0 day attacks.
We found management interface needing improvement and features need to be added to cater for very big deployments.

Avantages :

We liked most the capability and detection rate of detecting malware and malicious behavior, even without internet.

Inconvénients :

Some software from known vendors were detected as false positive. Management interface lacks some nice to have features, specially for large deployment.

Utilisateur vérifié
Utilisateur LinkedIn vérifié
Informatique et sécurité réseau, 501–1 000 employés
Temps d'utilisation du logiciel : 6 à 12 mois
Source de l'avis

Its a trap

3,0 il y a 5 ans

Avantages :

The product works well. Its not a full solution although it can help hit compliance with legacy servers

Inconvénients :

it can be resource intensive and requires that some exploits run partially before being caught.