Palo Alto Networks Cortex XDR vs. Trend Micro Cloud One - Workload Security

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Palo Alto Networks Cortex XDR
Score 8.8 out of 10
N/A
Traps replaces traditional antivirus with multi-method prevention, a proprietary combination of malware and exploit prevention methods that protect users and endpoints from known and unknown threats.N/A
Trend Micro Cloud One - Workload Security
Score 8.6 out of 10
N/A
Trend Micro Cloud One Workload Security (formerly Deep Security) is cloud security software suite, from Trend Micro, for hybrid cloud environments and virtualization security.N/A
Pricing
Palo Alto Networks Cortex XDRTrend Micro Cloud One - Workload Security
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Palo Alto Networks Cortex XDRTrend Micro Cloud One - Workload Security
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details——
More Pricing Information
Community Pulse
Palo Alto Networks Cortex XDRTrend Micro Cloud One - Workload Security
Top Pros
Top Cons
Best Alternatives
Palo Alto Networks Cortex XDRTrend Micro Cloud One - Workload Security
Small Businesses
SentinelOne Singularity
SentinelOne Singularity
Score 9.1 out of 10
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Score 8.2 out of 10
Medium-sized Companies
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Druva Data Resiliency Cloud
Druva Data Resiliency Cloud
Score 9.6 out of 10
Enterprises
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Druva Data Resiliency Cloud
Druva Data Resiliency Cloud
Score 9.6 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Palo Alto Networks Cortex XDRTrend Micro Cloud One - Workload Security
Likelihood to Recommend
8.8
(12 ratings)
9.0
(4 ratings)
Likelihood to Renew
-
(0 ratings)
10.0
(1 ratings)
Usability
2.0
(1 ratings)
8.0
(1 ratings)
Support Rating
10.0
(3 ratings)
10.0
(2 ratings)
Implementation Rating
-
(0 ratings)
10.0
(1 ratings)
User Testimonials
Palo Alto Networks Cortex XDRTrend Micro Cloud One - Workload Security
Likelihood to Recommend
Palo Alto Networks
Malware that doesn’t leave files behind has become widely available. Anyone who can afford to reverse this trend should purchase technology. Application whitelisting isn’t for everyone, and Palo Alto Networks Traps can help. Enterprises looking for a low-affected, next-generation solution with high protection should consider it. PAN Traps is a great product at a reasonable price, and I highly recommend it.
Read full review
Trend Micro
Hypervisor based agentless security this product excels at. It provides thorough protection for your VM's. The web filtering product that comes with it also does a great job filtering out malicious websites from being accessed by users with a very user friendly prompt that they are going to a website which has been found to be malicious. This is particularly useful when it comes to VDI.
Read full review
Pros
Palo Alto Networks
  • Direct Access to devices via Live Terminal which provides operations with scripting, triage, and preservation of artifacts.
  • Behavioral Indicators of Compromise which provides alerts on events regarding groups of hosts and their signatures.
  • Querying complex data sets involving a variety of devices for network connections, hashes, DNS, etc.
Read full review
Trend Micro
  • It's easy to use the console.
  • It has a very similar look and feels to Deep Security Console.
  • It plugs into the Apex Central for easy management.
Read full review
Cons
Palo Alto Networks
  • Traps doesn't seem to function as a traditional A/V very well, so it's better as another layer to your endpoint protection
  • Traps can cause issues with some legacy or custom programs, so exceptions may have to be made
  • Traps falsely identifies things as malicious at times, this is not often though
Read full review
Trend Micro
  • Trend Micro has very little room for improvement. I am using version 9.6 at this time and it is extremely reliable. Some of the upgrades were not completely intuitive, but in those cases Deep Security support came through with documentation that covered all the bases.
Read full review
Likelihood to Renew
Palo Alto Networks
No answers on this topic
Trend Micro
It's the best one compared to other security applications
Read full review
Usability
Palo Alto Networks
Day to day, Cortex is easy to use when you have no alerts and when an agent upgrade doesn't go south. Alerts are far too "clicky", there's too many steps to drilling down to what actually happened to trigger an alert. Investigating alerts in Cortex takes about 5x longer than it should.
Read full review
Trend Micro
It is the best application I've used. Its features are effective.
Read full review
Support Rating
Palo Alto Networks
The support we receive from Palo Alto is one of the best aspects of Traps. It is very easy to recommend their support. It seems much easier to connect directly with someone with a deep understanding of the product rather than other companies where you basically have to make an airtight case that it is some kind of non-standard issue that can't be solved with existing documentation. Palo Alto digs deep and helps with advanced troubleshooting to get things working.
Read full review
Trend Micro
Trend Micro's support is pretty decent, we have had issues in the past and they have been fairly responsive to us and our complaints. Depending on how severe the issue was. Any ticket that had a high priority was handled very shortly especially when we contacted our account rep even if it was after hours, we were still able to get support within a short time period.
Read full review
Implementation Rating
Palo Alto Networks
No answers on this topic
Trend Micro
Everything is good
Read full review
Alternatives Considered
Palo Alto Networks
Traps is the slickest interface, easy to use and intuitive rule making, and the rest just didn't quite stack up to the performance level of Traps. McAfee and Kaspersky just hog processor and RAM power. I didn't like the interface and functionality of SentinelOne as much as Traps. Palo Alto really put a lot of time into the development of this software, and had some of the founding fathers of IT Security heading the development process. Can't beat that.
Read full review
Trend Micro
We selected trend micro to take the AV scans and filtering out of the hands of the Windows and Linux vm's we have deployed and move it to the hypervisor level. This has led us to be able to deploy only a single DSVA per host and can protect all VM"s that are on that hosts. This has allowed for more time being spent on other priority security tasks.
Read full review
Return on Investment
Palo Alto Networks
  • After putting Palo Alto Networks Cortex XDR on a user's system, users came back with a positive response that there are no performance issues now.
  • We are able to track and control granular suspicious and malicious activities.
  • Web controls are missing, which if they would have been there would have been very helpful.
Read full review
Trend Micro
  • 100% positive ROI. Without Deep Security we would have to leverage and endpoint protection management solution like Sophos or SEPM (Symantec). Although both are good products, from a cost perspective it would have hit us much harder. Trend Micro Deep Security scales very nicely.
  • Since Deep Security actually has zero (or at least unnoticeable) resource footprint on monitored VMs, it is a huge cost benefit for us. As previously mentioned, actual antivirus clients installed on each virtual machine (VM) would have significantly affected performance. This would have cost us much more additionally in paying for additional resources to allocate over VMs in the VMware environment. Deep Security is almost completely unintrusive from a resource perspective.
  • Also, from a layered security perspective, it helps us meet our goals; and since the price of Trend Micro Deep Security quite reasonable, it is that much easier to get approval for this specific internal layer of security.
Read full review
ScreenShots