We just raised a $30M Series A: Read our story

Cortex XDR by Palo Alto Networks Valuable Features


I like the centralized console and the predictive analysis it does of malware.

It is very stable and also scalable.

It is easy to deploy and update. It does not require a lot of maintenance.

View full review »
Network Designer at a computer software company with 1,001-5,000 employees

The solution offers a very high-performance. 

The solution has analytics that watch patterns and trends. If there is a change in user behavior or communication, it has the ability to track that. 

The solution has a very helpful isolation feature. If any system gets compromised, with one click I can access the system and isolate it from other networks, and then go into further forensic investigation of the current threat without compromising anything else.

There are a lot of lead solutions in this space, however, Palo Alto is number one.

The initial setup is pretty easy.

View full review »
Senior Information Security Architect at a tech services company with 201-500 employees

I can call the tweak responses or other items that the customer doesn't like very easily due to the fact that this solution is on the cloud

It collects and caches and the knowledge of machine learning from different customers to take to the cloud. It makes it better to use for everybody. It allows for quick learning and updates and can, therefore, offer zero-day malware security. This sharing of metadata helps make the solution very safe.

Even the firewalls have their signatures. It takes from different resources and takes note of everything. 

The exploits and malware technology are really good. 

View full review »
Learn what your peers think about Cortex XDR by Palo Alto Networks. Get advice and tips from experienced pros sharing their opinions. Updated: November 2021.
552,695 professionals have used our research since 2012.
Vice President / Chief Technology Officer at Sinnott Wolach Technology Group

The ability to kind of stitch everything together and see the actual complete picture is very useful. I guess you'd call it a playbook. Some people call it the forensics analysis of what was happening on particular endpoints when they detected some malicious behavior, and what transpired before that to cause that. It is also very user friendly.

The way they have done everything and integrated all the solutions that they've purchased over the years to make it a very seamless, effective product is very good. One thing about Palo Alto is that they take the products or services that they purchase and make them seamless for the end user as compared to some companies that purchase other companies and then just kind of have their products off to the side or keep different interfaces. Palo Alto doesn't do that.

View full review »
CIO/CTO at a manufacturing company with 501-1,000 employees

There aren't many features we find valuable on the solution.

They have a new GUI which is just fantastic.

View full review »
Consultant at a tech services company with 501-1,000 employees

It can automatically correlate events and logs, which is very helpful for an IT administrator. It can correlate different kinds of malware activities over a network, agent, or host system. You do not need to do it manually. It is a good feature. 

It is also a user-friendly solution. We have deployed it on the cloud because our space does not provide any flexibility for on-premises deployment, but Palo Alto has added some flexibility to install it on-premises. It must be like the same Cortex XDR agent for all the VPN services, web filtering services, and everything else.

View full review »
Cybersecurity Incident Response Analyst at a computer software company with 5,001-10,000 employees

I like that the product has behavior-based detection which offers many benefits over signature-based detection. When it comes to zero day attacks and targeted attacks, signature detection is not able to detect problems. Behavior-based detection is able to detect attacks tailored specifically for your environment, or malware that doesn't yet have a known malicious signature. It's the nature of how the data is processed that makes the tool really powerful. 

View full review »
Lead Security Engineer at ESKA

If a company uses Palo Alto and supports Cortex XDR for endpoint protection it is very well protected. Palo Alto is the best security solution in the market. It's very advanced and its protection is extremely reliable.

The solution doesn't need a high level of technical training. The solution is very usable and doesn't take a lot of personnel.

The product is very scalable.

The stability is very good.

View full review »
System Manager at a consumer goods company with 10,001+ employees

Cortex has several good features that I am interested in. There is a nice Sandbox function that is very strong, there is the Traps (endpoint protection) solution, the real-time filtering of suspect linkages is good, and the automatic blocking of suspect behavior is always active and protecting the network.  

View full review »
Lead Consultant at a tech services company with 1-10 employees

The protection offered by this product is good, as is the endpoint reporting.

Once installed, this product is easy to manage, whether it is on-premises or the cloud-based management system.

View full review »
Senior Security Consultant at a tech services company with 201-500 employees

The most valuable feature is that you can select remote access of any machine for sandboxing.

Irrespective of whether you have the rights or not, you can still access it from the cloud.

View full review »
Network and Cybersecurity Consultant at a tech services company with 11-50 employees

Stability is a primary factor, and then there's the ease of distribution and policy management. Cortex XDR by Palo Alto Networks is very easy to work with, and we're quite happy with them.

View full review »
Assistant Superintendent with 51-200 employees

The interface is easy to use and it is more up to date than our previous solution.

View full review »
Digital Business Solutions Manager at Bahrain Telecommunication Company BSC (Batelco)

It's a nice product that's stable and scalable.

View full review »
Sr. Technology Architect at Incedo Inc.

The most valuable for us is the correlation feature. You are able to correlate data that is coming from the firewall, network, server, and endpoints. This is one of our main requirements and makes for a good product.

It works with the data lake in an agent-based or agentless manner.

It is easy to integrate most with network devices, including firewalls, and Active Directory. We use firewalls from different vendors including Palo Alto and Check Point, and it supports them.

View full review »
IT Director at a energy/utilities company with 1,001-5,000 employees

It's a perfect solution. 

It integrates well into the environment.

View full review »
IT manager at a computer software company with 11-50 employees

Its ability to react to cyber data attacks is awesome. That is pretty much the use of it. What blows your mind is the ability to access your assets remotely and see what is actually going on with them. You can not only see them in a console. You can also react very rapidly to your assets that are compromised.

View full review »
Pre-sales engineer at a tech services company with 51-200 employees

Its interface and pricing are most valuable. It is better than other vendors in terms of security.

View full review »
Security Engineer at a tech services company with 11-50 employees

The behavior-based detection feature is valuable. 

View full review »
Security consultant at a tech services company with 1,001-5,000 employees

The user interface of the solution is sophisticated and straightforward.

View full review »
General manager at MOL-IT India Pvt. Ltd.

One of the main benefits of the solution is its intelligence to correlate the events into an incident.

View full review »
EMEA IT Infrastructure Manager at a consumer goods company with 5,001-10,000 employees

The most valuable features of this product are the management capabilities, which allow an IT organization to get quite a good picture of attempted cyber attacks, and its out-of-the-box investigation capabilities.

View full review »
Relationship Manager at a financial services firm with 5,001-10,000 employees

It is easy to use.

View full review »
Ingeniero de Soporte at a tech services company with 11-50 employees

They did what they said. This solution could apply to any scenario.

View full review »
Assistant PhD at Stefan Cel Mare University of Suceava

Threat identification and detection are the most valuable features of this solution.

View full review »
Learn what your peers think about Cortex XDR by Palo Alto Networks. Get advice and tips from experienced pros sharing their opinions. Updated: November 2021.
552,695 professionals have used our research since 2012.