We performed a comparison between Elastic Security and Intercept X Endpoint based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Detection and Response (EDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We are connected to Microsoft and have every laptop enrolled. This acts as an endpoint. The tool helps me check security and compliance. I can also check what a device is doing."
"It has been great for us. Previously, we didn't have a solution to protect us, especially from malware, whereas now, we are getting protection up front, especially from the malware attacks coming through emails or endpoints."
"The portal is quite user-friendly. There is integration with Office, Intune, and other products from the same portal. From there, we can see which policies are installed on a particular machine. We also can manage devices, groups, and tagging."
"Microsoft Defender XDR is scalable."
"The most valuable feature is the DLP because that's where we can have an added data protection layer and extend it not just to emails but to the documents that users are working on. We can make sure that sensitive data is tagged and flagged if unauthorized parties are using it."
"The comprehensiveness of Microsoft's threat detection is good."
"The integration between all the Defender products is the most valuable feature."
"Microsoft 365 Defender is a good solution and easy to use."
"ELK Logstash is easy and fast, at least for the initial setup with the out of box uses."
"It's open-source and free to use."
"We've found the initial setup to be quite straightforward."
"We like Elastic Security because it's a REST API-based solution. That's the primary reason we use it."
"It's simple and easy to use."
"The most valuable feature is the speed, as it responds in a very short time."
"The scalability is good. It can be scaled easily in the production environment."
"The feature that we have found the most valuable is scalability."
"The forensics within the solution are quite good. The ransomware mitigation is also impressive."
"This product integrates well with Sophos firewalls and should be seriously considered by Sophos Firewall clients."
"The performance is good."
"It is a very scalable solution."
"It is easy to change the size of its capabilities, i.e. to expand processes or scale the size of users."
"The stability on offer is fine."
"All of the features are very important for anyone who is supporting a large number of computers."
"I consider the heuristics to be most valuable, the fact that the solution does not work solely on signatures."
"I personally have not seen much evidence of how Defender can enhance the story of zero trust for enterprises."
"There are other SIEM solutions that are easier to use, mainly based on the creation of rules, use cases, and groups."
"At times, there may be delays in the execution of certain actions and their effects."
"Advanced attacks could use an improvement."
"The design of the user interface could use some work. Sometimes it's hard to find the exact information you need."
"The support team is not competent or responsive."
"The mobile app support for Android and iOS is difficult and needs improvement."
"Customers say they want absolutely seamless integration between other Microsoft solutions and Defender XDR, including the ability to change device settings within the Defender portal. They need to contact the IT team responsible for the device management tools to change some settings. They would prefer that those changes be initiated directly from the Defender portal or applied from Intune without involving the IT operations team."
"They don't provide user authentication and authorisation features (Shield) as a part of their open-source version."
"It would be better if Elastic Security had less storage for data. My customers do not like this. Other vendors have local support in different countries, but Elastic Security doesn't. I would like to have Operational Technology (OT) security in the next release."
"If you compare this with CrowdStrike or Carbon Black, they can improve."
"I would like more ways to manage permissions and restrict access to certain users."
"Elastic Security's maintenance is hard and its scalability is a challenge. There are complications in scaling and upgrading. The solution needs to also provide periodic upgrade checks."
"The setup process is complex. You need a solid working knowledge of networking, operating systems, and a little programming."
"Anything that supports high availability or ease of deployment in a highly available environment would help to improve this solution."
"It is difficult to anticipate and understand the space utilization, so more clarity there would be great."
"The price of this solution can be improved."
"The solution can be expensive, although we do see the value in it."
"There are not any solutions that are a 10 out of 10. A 10 would be perfect protection with no impact on the performance of the device. This is not the case, there is some impact on the performance of the device."
"They should keep doing what they're doing. Both of them have entered the EDR/MDR space, and they're keeping up with their competitors. I have a hard time understanding why their capabilities aren't garnering more attention."
"There is room for improvement in terms of stability and updates."
"Mobile device management is a challenging area, and it can be improved. Some areas in the DLP solution can also be improved. It has the DLP capability, but it is not an all-out DLP program. I would like to see them improve the DLP solution in terms of reporting and possibly network monitoring. Currently, they only do the reporting parts of it."
"I have not done it, but integrating it with authenticating the users on the Windows system looks a bit complicated to me. It could be because I don't understand it."
"We would like more application control in order to be able to schedule times and access."
Elastic Security is ranked 16th in Endpoint Detection and Response (EDR) with 59 reviews while Intercept X Endpoint is ranked 4th in Endpoint Detection and Response (EDR) with 101 reviews. Elastic Security is rated 7.6, while Intercept X Endpoint is rated 8.4. The top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". On the other hand, the top reviewer of Intercept X Endpoint writes "A standard offering with good threat analysis but reduces machine performance". Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, IBM Security QRadar and Microsoft Defender for Endpoint, whereas Intercept X Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business, SentinelOne Singularity Complete and Fortinet FortiClient. See our Elastic Security vs. Intercept X Endpoint report.
See our list of best Endpoint Detection and Response (EDR) vendors and best Extended Detection and Response (XDR) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.