2018-12-12T10:13:00Z

What is your primary use case for Cortex XDR by Palo Alto Networks?


How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

Guest
99 Answers

author avatar
Top 10Real User

We use Palo Alto Traps in our Windows-based environments. Currently, it only protects our desktops and we use it in conjunction with our Check Point firewall.

2019-11-12T20:23:00Z
author avatar
Top 5LeaderboardReal User

We use Palo Alto Networks Traps (Version 6) to protect our endpoints against NG malware via behavior analysis, artificial intelligence and machine learning. Both the PA Traps endpoint logs, our PA firewall traffic logs and the Wildfire sandbox are used to provide immediate threat response and feed this information to the PA Threat Intelligence cloud.

2019-04-17T08:37:00Z
author avatar
Real User

We used it for malware detection and to detect weird DNS calls. Overall, it was for endpoint protection.

2019-02-11T08:11:00Z
author avatar
Top 5LeaderboardConsultant

The primary use case is endpoint security. The product is my main endpoint, IP, and threat management.

2019-02-07T12:28:00Z
author avatar
Real User

So far, we have only done a PoC of Palo Alto Traps. We deployed Traps on a few devices and then did the PoC. I also attend a workshop for Palo Alto Traps. I learned how it works and how it can block malicious files, etc.

2019-02-07T12:28:00Z
author avatar
Real User

I used the product at my previous company until November 2018.

2019-02-07T12:28:00Z
author avatar
Top 20Real User

We use it for primary endpoint protection.

2019-01-17T10:53:00Z
author avatar
Top 5LeaderboardReal User

Our primary use case is anti-malware and anti-exploit.

2019-01-10T08:22:00Z
author avatar
Real User

Advanced endpoint protection.

2018-12-12T10:13:00Z
Learn what your peers think about Cortex XDR by Palo Alto Networks. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
441,478 professionals have used our research since 2012.