Cortex XDR Features
Top Rated Cortex XDR Alternatives
(439)
4.4 out of 5
Visit Website
Sponsored
Cortex XDR Categories on G2
Filter for Features
Administration
Compliance | Monitors assets and enforces security policies to audit assets and infrastructure security. | Not enough data | |
Web Control | Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network. | Not enough data | |
Application Control | Blocks endpoint users from accessing restricted applications. | Not enough data | |
Asset Management | Keeps records of each network asset and its activity. Discovers new assets accessing the network. | Not enough data | |
Device Control | Manages user network accessibility on laptops and mobile devices. | Not enough data |
Functionality
System Isolation | Cuts off network connection or temporarily inactivate applications until incidents are remedied. | Not enough data | |
Firewall | Protects endpoint devices from a variety of attacks and malware threats. | Not enough data | |
Endpoint Intelligence | Analysis for users to examine threat intelligence data specific to their endpoint devices. | Not enough data | |
Malware Detection | Provides multiple techniques and information sources to alert users of malware occurrences. | Not enough data |
Analysis
Automated Remediation | Reduces time spent remedying issues manually. Resolves common network security incidents quickly. | Not enough data | |
Incident Reports | Produces reports detailing trends and vulnerabilities related to their network and infrastructure. | Not enough data | |
Behavioral Analysis | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators. | Not enough data | |
Incident Reporting | Produces reports detailing trends and vulnerabilities related to their network and infrastructur | Not enough data | |
Network Visibility | Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks. | Not enough data | |
Metadata Enrichment | Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis. | Not enough data | |
Metadata Management | Indexes metadata descriptions for easier searching and enhanced insight | Not enough data |
Response
Incident Alerts | Gives alerts when incidents arise. Some responses may be automated, but users will still be informed. | Not enough data | |
Response Orchestration | Integrates additional security tools to automate security and incident response processes. | Not enough data | |
Response Automation | Reduces time spent remedying issues manually. Resolves common network security incidents quickly | Not enough data |
Detection
Multi-Network Monitoring | Provides monitoring capabilities for multiple networks at once. | Not enough data | |
Asset Discovery | Detect new assets as they enter a network and add them to asset inventory. | Not enough data | |
Anomaly Detection | Constantly monitors activity related to user behavior and compares activity to benchmarked patterns | Not enough data |
Detection & Response
Response Automation | Reduces time spent remedying issues manually. Resolves common network security incidents quickly. | Not enough data | |
Threat Hunting | Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks. | Not enough data | |
Rule-Based Detection | Allows administrators to set rules specified to detect issues related to issues such as sensitive data misuse, system misconfiguration, lateral movement, and/or non-compliance. | Not enough data | |
Real-Time Detection | Constantly monitors system to detect anomalies in real time. | Not enough data |
Management
Extensibility | Allows for customized support for hybrid environments | Not enough data | |
Workflow Automation | Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process. | Not enough data | |
Unified Visibility | Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks. | Not enough data |
Analytics
Threat Intelligence | Stores information related to common threats and how to resolve them once incidents occur. | Not enough data | |
Artificial Intelligence & Machine Learning | Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis. | Not enough data | |
Data Collection | Collects information from multiple sources to cross reference and build contextual to correlate intelligence. | Not enough data |