We compared CylancePROTECT and Intercept X Endpoint (Sophos) based on our users reviews in five parameters. After reading the collected data, you can find our conclusion below:
Comparison Results: CylancePROTECT and Sophos' Intercept X Endpoint are both endpoint security solutions that provide advanced technology and protection against threats. CylancePROTECT is appreciated for its simple deployment and implementation, accurate threat detection, and user-friendly dashboard. However, it is considered expensive and some have concerns about the quality of support. On the other hand, Intercept X Endpoint offers multi-platform capability, centralized management, and 24/7 monitoring. It also has fair pricing and helpful technical support. Suggestions for improvements include installation speed, performance impact, and pricing. In summary, CylancePROTECT prioritizes technological advancements while Intercept X Endpoint focuses on multi-platform capability and effective threat management.
"The product's initial setup phase is very easy."
"The features that I have found most valuable are the ability to customize it and to reduce its size. It lets you run in a very small window in terms of memory and resources on legacy cash registers."
"Forensics is a valuable feature of Fortinet FortiEDR."
"The product detects and blocks threats and is more proactive than firewalls."
"The setup is pretty simple."
"NGAV and EDR features are outstanding."
"Exceptions are easy to create and the interface is easy to follow with a nice appearance."
"It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
"CylancePROTECT works on AI technology, is always up to date, and uses very few resources on your devices."
"We are quite security-focused. Blackberry Protect as an endpoint solution for our service really delivers what we are expecting."
"The solution runs in the background, and I do not need to care about it."
"The solution’s AI is its most valuable feature."
"It provides good insight into the programs, applications, or websites that may need attention."
"I rate the tool a ten out of ten when it comes to the ease of use or management part."
"The solution is stable."
"Specifically for a Windows domain environment, the product can be customized and pushed via GPO or SCCM without issue."
"The solution has very good usability."
"I like the way it goes beyond the office space. Being a cloud-based solution makes it very easy to manage your endpoints within the office. In this time of COVID, you can also very effectively manage people who are working from home."
"The Managed Detection and Response service provided by Intercept X Endpoint is highly valuable. With a team of 600-700 individuals monitoring systems, they swiftly respond to attacks, either informing us to isolate or directly removing threats. This full MDR service is especially recommended for sectors like finance, where data security is critical. The deep learning technology within Intercept X Endpoint enhances our security posture by analyzing behaviors and algorithms to differentiate between legitimate users and threats, effectively preventing attacks on our network infrastructure."
"One reason why I have stuck with Sophos is because it grabs it and deals with it, and if it's known malware, it can quarantine it or delete it."
"It is a practically maintenance free intelligent system that independently protects environments from malicious attacks."
"The most valuable features of Sophos Intercept X are the ease of use and the policy options that are simple to understand. Overall, the protection is good."
"The client isolation feature is a very effective feature."
"The solution is easy to install."
"The EDR console should have more extensive reporting. You shouldn't need to purchase FortiAnalyzer. It should be included in the EDR part. The security adviser cloud platform could be improved with more options for exclusive or intensive rules for devices."
"Intelligence aspects need improvement"
"The amount of usage, the number of details we get, or the number of options that can be tweaked is limited in comparison to that with other EDR solutions"
"FortiEDR could add a separate scanning dashboard. In incident management, we prefer to remove the endpoint system from the environment and scan the system. We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things."
"Integration with Azure and SaaS provisioning tools could improve Fortinet FortiEDR."
"Cannot be used on mobile devices with a secure connection."
"There's room for improvement in the quick response time and technical support for integration issues, especially when dealing with multiple vendors."
"We've had a lot of false positives; things incorrectly flagged that require manual configuration to allow. Even worse, after we allow a legitimate program, it sometimes gets flagged again after an update. This has caused a lot of extra work for my team."
"The solution should implement AI in the product."
"CylancePROTECT could be improved in its technical support and communication."
"The solution needs better dashboards that are easier to use."
"Reporting is an area with shortcomings in CylancePROTECT that needs to be improved."
"If they can add more features on top of their Persona feature that would be ideal."
"The product does not do a lot of reporting on what it is taking care of. Enhanced reporting would be a welcome improvement."
"The solution’s user interface could be improved."
"The security scripting needs improvement. It needs deeper security for scripting."
"The security is good but the feature set is limited."
"The main real-time scanning takes most of the processing power of my notebook."
"I recommend that Intercept X Endpoint should include a patch assessment feature. Various vendors offer virtual patching solutions, which could be a game-changer, especially for the financial sector where frequent service restarts are challenging. These solutions allow patching servers without the need for restarts. Incorporating these features into Intercept X Endpoint would enhance its effectiveness in securing endpoints and servers."
"When we load Intercept X, it puts a load on the device. When it is scanning, it slows down the device. A system with basic specifications completely slows down till the scan is complete. They should improve this part."
"Technical support is too slow to schedule meetings."
"The initial setup was not very user-friendly."
"Should include additional integration."
"The number one thing I would like is if their support could be a little faster and it would be a little easier to get a hold of support when you need them."
CylancePROTECT is ranked 23rd in Endpoint Protection Platform (EPP) with 41 reviews while Intercept X Endpoint is ranked 7th in Endpoint Protection Platform (EPP) with 101 reviews. CylancePROTECT is rated 8.0, while Intercept X Endpoint is rated 8.4. The top reviewer of CylancePROTECT writes "Ensures advanced AI-driven threat detection to provide robust endpoint security, effectively preventing both known and unknown threats with minimal impact on system performance". On the other hand, the top reviewer of Intercept X Endpoint writes "A standard offering with good threat analysis but reduces machine performance". CylancePROTECT is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, SentinelOne Singularity Complete and Cortex XDR by Palo Alto Networks, whereas Intercept X Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business, SentinelOne Singularity Complete and Seqrite Endpoint Security. See our CylancePROTECT vs. Intercept X Endpoint report.
See our list of best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.