

OpenText Behavioral Signals and Cortex XSIAM are competing platforms in the technology space. OpenText is more attractive for cost-sensitive buyers due to its pricing and support, while Cortex offers advanced features that may justify a higher investment for those prioritizing functionality.
Features: OpenText Behavioral Signals provides intuitive behavior prediction algorithms, real-time analysis capabilities, and seamless integration options, appealing to organizations with strong analytics needs. Cortex XSIAM stands out with comprehensive security management, sophisticated threat detection, and advanced automation features, providing an edge in security capabilities.
Room for Improvement: OpenText Behavioral Signals could enhance its automation capabilities, improve its integration with third-party security tools, and expand its threat intelligence database. Cortex XSIAM could improve simplicity in deployment, refine its user interface for easier navigation, and enhance cost effectiveness for budget-conscious customers.
Ease of Deployment and Customer Service: OpenText Behavioral Signals offers a straightforward deployment process and responsive customer support, appealing to organizations seeking seamless integration. Cortex XSIAM involves more complex deployment but is supported by robust customer service and comprehensive training resources, ensuring sustained value.
Pricing and ROI: OpenText Behavioral Signals features lower setup costs, providing quicker ROI for budget-conscious organizations. Cortex XSIAM, with a higher initial investment, claims superior returns through enhanced security outcomes, with its pricing positioned as justified by comprehensive security returns.
Premium support provides direct access, while distributor support quality can vary.
It is ineffective in terms of responding to basic queries and addressing future requirements.
I would rate the support of Palo Alto a nine out of ten.
Without proper integration, scaling up with more servers is meaningless.
Cortex XSIAM is highly scalable.
The product was easy to install and set up and worked right.
Overall, Cortex XSIAM is stable.
It works really nice and performs really efficiently after configuration.
Cortex XSIAM is on the expensive side and requires substantial improvement in pricing.
In terms of incident response automation, it is quite poor due to the lack of integration with all security tools, making manual intervention necessary.
Cortex XSIAM needs improvements in terms of data onboarding, parsers, and third-party integration supports.
The product is very expensive.
The first impression is that XSIAM would be more expensive than others we tried.
Cortex XSIAM is pretty expensive, and the licensing process is not very comfortable.
The advanced visualization capabilities of the product are important for understanding security trends in an organization.
One of the valued aspects of the product is its use of artificial intelligence to detect security vulnerabilities.
The flexibility for creating manual workflows stands out.
| Product | Market Share (%) |
|---|---|
| Cortex XSIAM | 2.1% |
| OpenText Behavioral Signals | 0.8% |
| Other | 97.1% |

| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 2 |
| Large Enterprise | 4 |
Cortex XSIAM acts as a critical element for SOC foundations, integrating SIEM and EDR capabilities, valued for threat detection and seamless security orchestration with Palo Alto Networks products.
Organizations find Cortex XSIAM beneficial for SOC foundations due to its capability to integrate SIEM and EDR tools, facilitating data collection, detection, and response. It connects with third-party data sources while reducing management effort and offering cost-effective alternatives to competitors like CrowdStrike and Trend Micro. Featuring automation and integration with Palo Alto Networks products, Cortex XSIAM enhances threat detection. Unified architecture allows a comprehensive view of attacks, further supported by machine learning and integration with existing vendor solutions, ensuring that users gain insights without significant manual log analysis.
What are Cortex XSIAM's key features?
What benefits are evident in Cortex XSIAM reviews?
Industries implement Cortex XSIAM mainly in technology-driven sectors where centralized endpoint protection and automation of forensic investigation are paramount. By integrating several third-party systems for incident response, companies in competitive markets leverage its attributes for heightened operational security efficiency. However, users note areas for improvement, such as Attack Surface Management and integration enhancements, to better suit tech-heavy industries needing extensive connectivity with cybersecurity solutions.
OpenText Behavioral Signals enhances organizational security monitoring with its robust correlation engine and streamlined dashboard, offering customization to suit different environments like airports or banks.
OpenText Behavioral Signals effectively integrates device logs through its strong correlation engine. The platform's customization options enable tailored alerts to match specific use cases, such as airports or banks. Although it needs more frequent updates to stay aligned with global incidents, it provides a centralized dashboard that ensures comprehensive visibility across networks. Users find the interface intuitive, making rule writing and report access easy, aiding in a comprehensive understanding of the network environment.
What are the key features of OpenText Behavioral Signals?In industries like banking and airports, OpenText Behavioral Signals is implemented for gathering global intelligence from the cloud. It notifies organizations about global attacks and updates its correlation engines. These industries utilize the platform for monitoring and analyzing logs from network devices, security log management, and addressing network challenges like link failures and unauthorized login attempts, ensuring better security posture with behavioral analytics and log integration using Unix and Microsoft-based connectors.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.