Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Cortex XDR Features

Top Rated Cortex XDR Alternatives

Filter for Features

Administration

Compliance

Monitors assets and enforces security policies to audit assets and infrastructure security.

Not enough data

Web Control

Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network.

Not enough data

Application Control

Blocks endpoint users from accessing restricted applications.

Not enough data

Asset Management

Keeps records of each network asset and its activity. Discovers new assets accessing the network.

Not enough data

Device Control

Manages user network accessibility on laptops and mobile devices.

Not enough data

Functionality

System Isolation

Cuts off network connection or temporarily inactivate applications until incidents are remedied.

Not enough data

Firewall

Protects endpoint devices from a variety of attacks and malware threats.

Not enough data

Endpoint Intelligence

Analysis for users to examine threat intelligence data specific to their endpoint devices.

Not enough data

Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

Not enough data

Analysis

Automated Remediation

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

Not enough data

Incident Reports

Produces reports detailing trends and vulnerabilities related to their network and infrastructure.

Not enough data

Behavioral Analysis

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.

Not enough data

Incident Reporting

Produces reports detailing trends and vulnerabilities related to their network and infrastructur

Not enough data

Network Visibility

Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.

Not enough data

Metadata Enrichment

Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis.

Not enough data

Metadata Management

Indexes metadata descriptions for easier searching and enhanced insight

Not enough data

Response

Incident Alerts

Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.

Not enough data

Response Orchestration

Integrates additional security tools to automate security and incident response processes.

Not enough data

Response Automation

Reduces time spent remedying issues manually. Resolves common network security incidents quickly

Not enough data

Detection

Multi-Network Monitoring

Provides monitoring capabilities for multiple networks at once.

Not enough data

Asset Discovery

Detect new assets as they enter a network and add them to asset inventory.

Not enough data

Anomaly Detection

Constantly monitors activity related to user behavior and compares activity to benchmarked patterns

Not enough data

Detection & Response

Response Automation

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

Not enough data

Threat Hunting

Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks.

Not enough data

Rule-Based Detection

Allows administrators to set rules specified to detect issues related to issues such as sensitive data misuse, system misconfiguration, lateral movement, and/or non-compliance.

Not enough data

Real-Time Detection

Constantly monitors system to detect anomalies in real time.

Not enough data

Management

Extensibility

Allows for customized support for hybrid environments

Not enough data

Workflow Automation

Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.

Not enough data

Unified Visibility

Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.

Not enough data

Analytics

Threat Intelligence

Stores information related to common threats and how to resolve them once incidents occur.

Not enough data

Artificial Intelligence & Machine Learning

Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis.

Not enough data

Data Collection

Collects information from multiple sources to cross reference and build contextual to correlate intelligence.

Not enough data