What is Cortex XDR?
Show LessContact Details
Palo Alto Networks
Located in United States, California, Santa Clara
Founded in 2005
Best For User Type
- Laser-accurate detection
- Endpoint protection
- Free trial available
- Free version available
Top Industries Represented
Data from Grid Report for Endpoint Detection and Response (Edr) Software
View grid dataDeployment & Support
Deployment
- Cloud, Saas, Web-based
- Desktop-mac
- Desktop-Windows
- Desktop-Linux
- Desktop-Chromebook
- On Promise Windows
- On Premise Linux
- Mobile-Android
- Mobile-Iphone
- Mobile-Ipad
Support
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live Recap)
Training
- In Person
- Live Online
- Webinars
- Documentation
- Videos
Cortex XDR Pricing
Check out our offers for each of our packages to get best out of the software
Visit us on our website to know more
Get a custom quote
Cortex XDR Features
Primary Features
Behavioral Analytics
EDR uses behavioral analysis to analyze and connect the activity of individual users on your system.
Policy Management
Policy Management refers to the creation, communication, and management of all the policies and procedures implemented by an organization.
Vulnerability Scanning
Vulnerability scanning is an inspection of the potential points of exploit on a computer or network to identify security holes.
Endpoint Management
Endpoint management is an IT and cybersecurity process that consists of two main tasks: evaluating, assigning and overseeing the access rights of all endpoints; and applying security policies and tools that will reduce the risk of an attack or prevent such events.
Firewall
The endpoint web application firewall (endpoint WAF) is a firewall that runs within the application. It's aware of the software used inside the website and understands how it's built.
Anomaly/Malware Detection
EDR technology pairs comprehensive visibility across all endpoints with IOAs and applies behavioral analytics that analyze billions of events in real time to automatically detect traces of malicious activities.
Secondary Features
- Device Management
- Activity Tracking
- Anti Virus
- Remote Access & Monitoring
- Third Party Integrations
Compare with Similar Products
SentinelOne Active EDR
Falcon Insight
Blackberry optics
MVISION EDR
Cisco Secure Endpoint
Cynet 360
Sophos Intercept X
Apex One
Binary Defense MDR
FireEye Endpoint Security