We compared CylancePROTECT and Intercept X Endpoint (Sophos) based on our users reviews in five parameters. After reading the collected data, you can find our conclusion below:
Comparison Results: CylancePROTECT and Sophos' Intercept X Endpoint are both endpoint security solutions that provide advanced technology and protection against threats. CylancePROTECT is appreciated for its simple deployment and implementation, accurate threat detection, and user-friendly dashboard. However, it is considered expensive and some have concerns about the quality of support. On the other hand, Intercept X Endpoint offers multi-platform capability, centralized management, and 24/7 monitoring. It also has fair pricing and helpful technical support. Suggestions for improvements include installation speed, performance impact, and pricing. In summary, CylancePROTECT prioritizes technological advancements while Intercept X Endpoint focuses on multi-platform capability and effective threat management.
"The price is low and quite competitive with others."
"Fortinet has helped free up around 20 percent of our staff's time to help us out."
"The most valuable feature is the analysis, because of the beta structure."
"It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
"Additionally, when it comes to EDR, there are more tools available to assist with client work."
"It is very easy to set up. I would rate my experience with the initial setup a ten out of ten, with ten being very easy to set up."
"The setup is pretty simple."
"Having all monitoring, response, tracking, and mitigation tools in one dashboard provides our analysts and SOC team with a comprehensive view at a glance."
"It provides good insight into the programs, applications, or websites that may need attention."
"The solution is pretty easy to scale."
"Specifically for a Windows domain environment, the product can be customized and pushed via GPO or SCCM without issue."
"The solution is very quick at easily changing the levels of protection for each computer and the server."
"It does a good job of protecting us."
"The CylancePROTECT agent is very low on CPU usage, so it has virtually no adverse impact on my servers, desktops, or workstations."
"The solution is easy to deploy."
"Blackberry Protect offers endpoint protection. It's easy to deploy. It's scalable and stable."
"This solution is easy to configure."
"One reason why I have stuck with Sophos is because it grabs it and deals with it, and if it's known malware, it can quarantine it or delete it."
"The solution is easy to install."
"The updates and a lot of the day-to-day fiddling that you would have to do with it, can all be done from the cloud so it's easy to manage, and very easy to administer."
"The most valuable feature of the solution is that it is less hash-based than competitors."
"I like the way it goes beyond the office space. Being a cloud-based solution makes it very easy to manage your endpoints within the office. In this time of COVID, you can also very effectively manage people who are working from home."
"The most valuable features are the cloud administration and the strength of the ransomware protection."
"The deployment is quick. It just depends on the environment and what you may be replacing."
"To improve Fortinet, we need to see more features and technology areas at the endpoint level introduced."
"ZTNA can improve latency."
"Making the portal mobile friendly would be helpful when I am out of office."
"There's room for improvement in the quick response time and technical support for integration issues, especially when dealing with multiple vendors."
"We'd like to see more one-to-one product presentations for the distribution channels."
"The support needs improvement."
"Once, we had an event that was locked and blocked, but information about it came to us two or three days later."
"The solution should address emerging threats like SQL injection."
"They could improve on the false positives, reporting and whitelisting features."
"The security scripting needs improvement. It needs deeper security for scripting."
"It's a good solution but some features just need to be updated."
"The process of whitelisting a script that you want to be able to run can be a little bit difficult, or awkward."
"rom my experience interacting with the primary or the central administrative console, it's quite complex. You would need a fair bit of technical experience to set it up, implement and maintain it. That would be one area for improvement."
"It could have integration with industrial base HMIS or Human Machine Interfaces Solutions. This is the industrial environment where you have a control center for all the automation that's happening, whether it is oil, gas, or chemical manufacturing. They often have to set up a computer at the back and watch the other stuff to get alerts. In these autonomous or on-premises environments, they often don't have access to email readily. Integration with other industrial solutions, such as HMIS, will allow them to communicate and get an alert that something has been found. This way, they can react to it sooner than having somebody watch the screen and keep checking the screen. Rockwell has its own suite. Similarly, Honeywell has its own suite. There's also an independent HMI/historian solution provider out there called VTSCADA. We actually get asked if we can get it to show up on a screen, which is difficult. Getting those alerts to work within an industrial environment would be a huge plus."
"If they can add more features on top of their Persona feature that would be ideal."
"It needs real analysis of quarantined files. The EDR product isn't showing much right now."
"The graphical interface could improve. Additionally, adding less expensive mobile device support would be helpful. Other solutions have this feature."
"It's a bit heavy on the computers. So once you install it, the computer slows down. It is a resource-intensive solution."
"The product’s DDoS and AI features must be improved."
"Sophos has a lot of different features. Some of them are tied to different clients, which may mean that different prices or licenses have to be added on. It can be a little bit confusing if you're not familiar with the logic of how they work. They can make it a little bit clearer."
"There is room for improvement in terms of stability and updates."
"The after sales service and support could be improved."
"The cloud management console could be a little more user-friendly."
"There should be a report including a flowchart or diagram. It will be useful to evaluate the software’s effectiveness."
CylancePROTECT is ranked 27th in Endpoint Protection Platform (EPP) with 39 reviews while Intercept X Endpoint is ranked 7th in Endpoint Protection Platform (EPP) with 101 reviews. CylancePROTECT is rated 8.0, while Intercept X Endpoint is rated 8.4. The top reviewer of CylancePROTECT writes "Ensures advanced AI-driven threat detection to provide robust endpoint security, effectively preventing both known and unknown threats with minimal impact on system performance". On the other hand, the top reviewer of Intercept X Endpoint writes "A standard offering with good threat analysis but reduces machine performance". CylancePROTECT is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, SentinelOne Singularity Complete, Cortex XDR by Palo Alto Networks and ESET Endpoint Protection Platform, whereas Intercept X Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business, SentinelOne Singularity Complete and Seqrite Endpoint Security. See our CylancePROTECT vs. Intercept X Endpoint report.
See our list of best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.