We performed a comparison between Cynet and Elastic Security based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Detection and Response (EDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We are connected to Microsoft and have every laptop enrolled. This acts as an endpoint. The tool helps me check security and compliance. I can also check what a device is doing."
"Defender XDR has a feature called the timeline that lets you track all activities. It helps a lot with investigations."
"A crucial aspect for our team is the inclusion of identity and access management tools from the vendor."
"The most valuable feature of all is the full integration with the rest of the software in the operating system and Office 365, as well as Microsoft SCCM. It is quite easy for us to work with the whole instance of Microsoft products. This integration improves the benefits of the whole suite of products."
"The ability to isolate and address viruses is the most valuable feature of Microsoft Defender XDR."
"Microsoft Defender's most critical component is its CASB solution. It has many built-in policies that can improve your organization's cloud security posture. It's effective regardless of where your users are, which is critical because most users are working from home. It's cloud-based, so nothing is on-premise."
"Microsoft 365 Defender is simple to upgrade."
"The ability to integrate and observe a more cohesive narrative across the products is crucial."
"The initial setup is very fast and very easy."
"It can be deployed in autonomous mode, and then it automatically blocks malware threats."
"Its ability to revert back from a previous state is quite notable. This feature is particularly valuable because, for maintaining integrity, it can inspect the socket for any firewall modifications. In practice, it allows us to return to a previous configuration when everything was functioning correctly."
"It's transparent, so it's not something where every user has to press a button to download or do the thing. It is centralized, in fact. Personally, I use Malwarebytes and other tools, which are fine for home use. Cynet is also relatively silent in terms of operation, except when it's required to act."
"The initial setup is simple and user-friendly."
"The product is very easy to use. Customers really appreciate that."
"The interface is exceptionally clear and easy to understand."
"A good feature is how the solution packages varied information into a single dashboard that's readable and meets our needs."
"The solution has a good community surrounding it for lots of helpful documentation for troubleshooting purposes."
"The most valuable feature is the machine learning capability."
"We've found the initial setup to be quite straightforward."
"ELK is open-source, and it will give you the framework you need to build everything from scratch."
"ELK Logstash is easy and fast, at least for the initial setup with the out of box uses."
"The most valuable features are the speed, detail, and visualization. It has the latest standards."
"The feature that we have found the most valuable is scalability."
"One of the most valuable features of this solution is that it is more flexible than AlienVault."
"The price could be better. It'll also help if they can continuously update and upgrade the solution. Every day there's a new virus uploaded into the network, and we have to keep updating it to identify all these things."
"I'd like to see a wider solution that includes not only desktop devices but also other devices, such as servers, storage cabinets, switching equipment, et cetera."
"The web filtering solution needs to be improved because currently, it is very simple."
"The support team is not competent or responsive."
"The support from Microsoft could improve. There are times I have to wait for a response from a qualified specialist."
"In the future, it would be beneficial for Microsoft to consider making the product more user-friendly or simplified for those who are interested in using it. Currently, it requires a high level of technical expertise, making it challenging for beginners or less experienced individuals."
"The design of the user interface could use some work. Sometimes it's hard to find the exact information you need."
"Improving scalability, especially for very large tenants, could be beneficial for Microsoft Defender XDR."
"The reporting functionality in Cynet may not be as comprehensive or flexible as desired."
"It is an endpoint agent, but they don't have a probe for checking the network traffic. They could improve from this point of view."
"I'd like to see more data loss prevention within the product."
"The reporting is a little weak and could be improved. The other downside is that Cynet does not use the local time zone. It's based off of Greenwich Mean Time."
"A support center in Asia is needed."
"Compliance reports need to improve."
"The command line interface could be improved."
"There is room for improvement in terms of support. The support should be faster to respond."
"Upgrades currently released as stacks when it should be a plugin or an extension to save removal and reinstallation."
"Better integration with third-party APMs would be really good."
"The interface could be more user friendly because it is sometimes hard to deal with."
"This solution cannot do predictive maintenance, so we have to build our own modules for doing it."
"The process of designing dashboards is a little cumbersome in Kibana. Unless you are an expert, you will not be able to use it. The process should be pretty straightforward. The authentication feature is what we are looking for. We would love to have a central authentication system in the open-source edition without the need for a license or an enterprise license. If they can give at least a simple authentication system within a company. In a large organization, authentication is very essential for security because logs can contain a lot of confidential data. Therefore, an authentication feature for who accesses it should be there."
"I would like the process of retrieving archived data and viewing it in Kibana to be simplified."
"In terms of what could be improved with Elastic, in some use cases, especially on the advanced level, they are not ready made, so you'll have to write some scripts."
"Email notification should be done the same way as Logentries does it."
Cynet is ranked 15th in Endpoint Detection and Response (EDR) with 35 reviews while Elastic Security is ranked 16th in Endpoint Detection and Response (EDR) with 59 reviews. Cynet is rated 8.8, while Elastic Security is rated 7.6. The top reviewer of Cynet writes "Provides memory protection, device control, and vulnerability management". On the other hand, the top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". Cynet is most compared with CrowdStrike Falcon, SentinelOne Singularity Complete, ESET Endpoint Protection Platform, Microsoft Defender for Endpoint and Cortex XDR by Palo Alto Networks, whereas Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, IBM Security QRadar and Microsoft Defender for Endpoint. See our Cynet vs. Elastic Security report.
See our list of best Endpoint Detection and Response (EDR) vendors, best Extended Detection and Response (XDR) vendors, and best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.