Most Helpful Review
Strong IDS solution, easy deployment, coverage across multiple platforms with at-a-glance dashboard and many more...
Solved our anti-virus problems for endpoint security with AI functionality for maintaining endpoint security
Find out what your peers are saying about Cortex XDR by Palo Alto Networks vs. Webroot Business Endpoint Protection and other solutions. Updated: January 2021.
457,459 professionals have used our research since 2012.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Its most valuable features are its scalability and advanced threat protection for customers."
"I am told that we get over 100 million emails a month. This filters them down and allows only somewhere about three million emails, which is a great help."
"For the initial first level of support, we provide it from our side. If there's escalation required, we use Cisco tech for the AMP. And again, they are perfect. I mean, one of the best, compared to any other vendors."
"The most valuable features of this solution are the IPS and the integration with ISE."
"The simplicity of use is its most valuable feature. You can very clearly see things."
"The stability of the solution is perfect. I believe it's the most stable solution on the market right now."
"I am really satisfied with the technical support."
"It is a very stable program."
"If the user leaves our premises or network, Palo Alto Traps will still be on that endpoint and will still apply our policies."
"After deploying Traps, we saw the performance of the network improve by 65 to 70 percent."
"Traps is quite a stable product. Once it was properly deployed and configured, you have nothing to be worried about."
"The most valuable features are the fact that it was running in the background and it would intercept any weird stuff, and the fact that it would send things directly to the cloud for sandboxing. It's quite practical."
"It blocks malicious files. It prevents attacks. It doesn't require many updates, it's a very light application."
"We have a complete overview of all our PCs and it's very easy to handle and to use the interface. It has a lot of benefits for us."
"It's very stable. I've never experienced downtime for the ASM console or ASM core."
"The stability of the solution is very good. We have about 100 users on it right now, and we use it twice a week."
"The feature we found most valuable is the AI functionality for maintaining endpoint security. This is very powerful."
"The most valuable features of the solution include the endpoint navigation protection, the protection related to the EMS service, as well as the control and the cloud integration capabilities."
"It is excellent endpoint protection for mobiles that does everything it says it will."
"We've not had any issues with scalability. If an organization needs to expand, they can do so quite easily."
"Their policy management, their cloud-based dashboard and user interface are very easy to navigate."
"The initial setup is not complex at all. It's very straightforward."
"We would like to have an API integration with a SIEM solution, because as far as I know, it currently hasn't yet been released."
"I would like them to add whatever makes filtering more advanced in scanning and blocking for malware in emails."
"The solution needs more in-depth analytics."
"In the next version of this solution, I would like to see the addition of local authentication."
"The initial setup is a bit complex because you need to execute existing antiviruses or security software that you have on your device."
"In the next release, I would for it to have back up abilities. I would like the ability to go back to a point in time to when my PC was uninfected and to the moment of when the infection happened."
"The reporting and analytics areas of the solution need to be improved."
"I would like more seamless integration."
"Traps doesn't work with McAfee. You need to remove McAfee to install Traps. This is very common, and its nothing that should be an issue. Some antivirus engines recognize Traps as an threat component, so maybe they need to shake hands somewhere."
"There are some default policies which sometimes affect our applications and cause them to run around. In the hotel industry, we use a different type of data versus Oracle and SQL. By default, there are some policies which stop us from running properly. Because of this, the support level is also not that strong. We have to wait to get a results."
"There are some false positives. What our guys would have liked is that it would have been easier to manipulate as soon as they found a false positive that they knew was a false positive. How to do so was not obvious. Some people complained about it. The interface, the ESM, is not user-friendly."
"Managing the product should be easier."
"Currently, if you use Palo Alto endpoint protection as the only solution it's very complicated to remove pre-existing threats."
"In the next release, I would like to see more UI improvements. Their UI is a bit basic. When we are speaking about Palo Alto Networks they are the big company, so they can improve the UI a little bit. The UI, the reports, the log system can all be improved."
"The solution needs better reports. I think they should let the customer go in and customize the reports."
"It automatically detects security issues. It should be able to protect our network devices while operating autonomously."
"We need to know more details about how the virus interacted with the computer."
"There needs to be more advanced analytics. It would make it a more powerful antivirus solution within the marketplace."
"It would be nice if it had a feature for automatically generating reports on the client end for device status, security status and backup information."
"Technical support is not the best. It's hard to get a hold of them if we need help. It's something that definitely needs improvement."
"Webroot is very reactionary. It waits until the threat is active within memory to try and detect it. They need better pre-execution detection and prevention."
"We need to have a stronger defense against CryptoLock and other attackers."
Pricing and Cost Advice
"The costs of 50 licenses of AMP for three years is around $9,360."
"The price is very good."
"The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost."
"Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc."
"In our case, it is a straightforward annual payment through our Enterprise Agreement."
"Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection."
"There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization."
"The Enterprise Agreement is like an all-you-can-eat buffet of Cisco products. In that vein, it was very affordable."
"It is "expensive" and flexible."
"Traps pays for itself within the first 16 months of a three-year subscription. This is attributed to OPEX savings, as security teams spent less time trying to identify and isolate malware for analysis as a result of a reduction in malware incidents, false positives, and breach avoidance."
"I did PoCs on products called Cylance and CrowdStrike. Although, I consider these products and they were also good, when it come to cost and budgetary factors, Traps has been proven to be better than the other two products. It is quite cost-effective and delivers all the entire solution which we require."
"It is cost-effective compared to similar solutions. It fits for the small businesses through to the big businesses."
"The return on investment is from the user side because we have seen the performance of it increase the delivery time of the product if we are using too many web-based and on-premise applications. In indirect ways, we saw the return of investment in terms of performance and user satisfaction increase."
"When we first bought it, it was a bit expensive, but it was worth it. The licensing was straightforward."
"The price was fine."
"This is an expensive solution."
"I can't recall the exact pricing, but I believe there is a monthly fee of $20-30 per user."
"The solution is pretty cheap, actually. At our level, which is at 2,500 endpoints, we're paying 87 cents an agent per month."
"The solution doesn't cost too much. It's about 30 Euros a year for each endpoint. It's pretty affordable for us and for many other companies."
Questions from the Community
Top Answer: The solution's integration capabilities are excellent. It's one of the best features.
Top Answer: Nice to have URL management, password protection of the app, more details of the machine & user running the app.
Top Answer: The primary use case is for endpoint protection. For the larger deployments, we use it for our policy enforcement as… more »
Ask a question
Earn 20 points
Top Answer: It is excellent endpoint protection for mobiles that does everything it says it will.
Top Answer: I think the one bad point about this product is that we did not find a way for Webroot to generate reports or schedule… more »
Top Answer: We are a small managed-service provider. One of the services we are providing to our clients is the endpoint protection… more »
Compared 14% of the time.
Compared 12% of the time.
Compared 9% of the time.
Compared 6% of the time.
Compared 6% of the time.
Compared 18% of the time.
Compared 13% of the time.
Compared 10% of the time.
Compared 6% of the time.
Compared 3% of the time.
Compared 37% of the time.
Compared 10% of the time.
Compared 9% of the time.
Compared 5% of the time.
Compared 2% of the time.
Also Known As
|Cyvera, Cortex XDR, Palo Alto Networks Traps||Webroot SecureAnywhere Business Endpoint Protection|
|Cisco||Palo Alto Networks||OpenText|
Advanced Malware Protection (AMP) is subscription-based, managed through a web-based management console, and deployed on a variety of platforms that protects endpoints, network, email and web Traffic. AMP key features include the following: Global threat intelligence to proactively defend against known and emerging threats, Advanced sandboxing that performs automated static and dynamic analysis of files against more than 700 behavioral indicators, Point-in-time malware detection and blocking in real time and Continuous analysis and retrospective security regardless of the file's disposition and Continuous analysis and retrospective security.
Cortex XDR by Palo Alto Networks is the world's first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Cortex XDR by Palo Alto Networks accurately detects threats with behavioral analytics and reveals the root cause to speed up investigations.
Webroot SecureAnywhere Business Endpoint Protection offers a unique security approach that protects against threats across numerous vectors; including email, web browsing, file attachments, hyperlinks, display ads, social media apps, and connected devices like USB drives, as well as other blended threats with the potential to deliver malicious payloads. SecureAnywhere Business Endpoint Protection is fully cloud-based management, means no on-premises hardware or software is needed and the console is always up to date and there are no definitions or signatures to deploy and manage. Webroot SecureAnywhere Business Endpoint Protection offers highly accurate and effective endpoint malware prevention with a range of additional security shield capabilities that keep both the user and the device safe, Malware detection occurs continuously in real time, so performance issues fade away.
Learn more about Cisco AMP for Endpoints
Learn more about Cortex XDR by Palo Alto Networks
Learn more about Webroot Business Endpoint Protection
|Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank||CBI Health Group, University Honda, VakifBank||Mytech Partners|
Comms Service Provider7%
Comms Service Provider29%
Computer Software Company23%
Financial Services Firm4%
Mining And Metals Company14%
Financial Services Firm7%
Computer Software Company27%
Comms Service Provider21%
Comms Service Provider25%
Computer Software Company24%
Cortex XDR by Palo Alto Networks is ranked 5th in Endpoint Protection (EPP) for Business with 21 reviews while Webroot Business Endpoint Protection is ranked 21st in Endpoint Protection (EPP) for Business with 6 reviews. Cortex XDR by Palo Alto Networks is rated 8.4, while Webroot Business Endpoint Protection is rated 6.4. The top reviewer of Cortex XDR by Palo Alto Networks writes "You can see the value for your money and sleep peacefully at night, not worrying about ransomware attacks". On the other hand, the top reviewer of Webroot Business Endpoint Protection writes "Keeps mobile devices secure against vulnerabilities or any attacks". Cortex XDR by Palo Alto Networks is most compared with CrowdStrike Falcon, Symantec End-user Endpoint Security, Microsoft Defender Antivirus, Carbon Black CB Defense and McAfee Endpoint Security, whereas Webroot Business Endpoint Protection is most compared with Microsoft Defender Antivirus, SentinelOne, Carbon Black CB Defense, Bitdefender GravityZone Ultra and Panda Security Adaptive Defense. See our Cortex XDR by Palo Alto Networks vs. Webroot Business Endpoint Protection report.
See our list of best Endpoint Protection (EPP) for Business vendors.
We monitor all Endpoint Protection (EPP) for Business reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.