Try our new research platform with insights from 80,000+ expert users

BloodHound Enterprise vs Cortex XSIAM comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

BloodHound Enterprise
Ranking in Identity Threat Detection and Response (ITDR)
8th
Average Rating
8.0
Number of Reviews
1
Ranking in other categories
No ranking in other categories
Cortex XSIAM
Ranking in Identity Threat Detection and Response (ITDR)
10th
Average Rating
9.2
Reviews Sentiment
7.3
Number of Reviews
7
Ranking in other categories
Security Information and Event Management (SIEM) (29th)
 

Featured Reviews

Hasan Abufreiha - PeerSpot reviewer
May 22, 2024
Has significantly influenced our security strategy as it helps us plan attacks and take initial steps in compromising networks
I mainly use BloodHound Enterprise for internal architecture planning, audits, and daily general testing engagements The simulation capability in BloodHound has significantly influenced our security strategy as it helps us plan attacks and take initial steps in compromising networks, considerably…
Forrest Stevens - PeerSpot reviewer
Sep 28, 2023
A robust security operation that ensures achieving automation, stability, and scalability
There is room for improvement in some areas, and I would highlight three key aspects. Firstly, the Attack Surface Management (ASM) module could benefit from more contextual depth. Currently, it tends to provide a broad overview without enriched context, and there's room for enhancement in this regard. Secondly, further integration capabilities with various other software products that can seamlessly tie into Cortex XSIAM would be advantageous. This would enhance its versatility and interoperability within a broader ecosystem. Regarding performance, there's potential for optimization. When multiple tabs are open in Cortex XSIAM, it can experience slowdowns, leading to longer load times for web pages. It's worth noting that this isn't a severe issue, and it doesn't entail waiting for extended periods, but there is room for improvement in terms of performance optimization.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The custom Cypress queries in BloodHound Enterprise is the most valuable feature."
"It does a better job of identifying anomalies that are more likely to be incidents of compromise without as many false positives or false negatives."
"The most valuable features of Cortex XSIAM are the machine learning used to identify threats, the complexity of the environment of products, and efficiency."
"The automation capabilities significantly improve response times by allowing us to respond to incidents from a single dashboard rather than navigating multiple dashboards."
"Its ability to deliver a substantial amount of security intelligence greatly enhances and optimizes our security operations program."
"It operates on a single, extensive database which enables it to excel in detecting threats and anomalies across the network and endpoints, delivering a highly effective and comprehensive security solution."
"The most valuable feature is the integration capability."
"It is an effective solution in terms of performance and functionalities."
 

Cons

"A few months ago, there was a problem with the digesters having trouble importing data from the normal digesters, a significant issue that needed attention."
"I am not sure if any improvements are needed right now."
"The solution’s pricing and technical support could be improved."
"The support could be a bit faster."
"There is room for improvement in expanding integrations to include more cybersecurity solutions."
"The platform isn't very developer-friendly and it should provide more flexibility and ease."
"Further integration capabilities with various other software products that can seamlessly tie into Cortex XSIAM would be advantageous."
"It could provide more integration with a large variety of products."
 

Pricing and Cost Advice

Information not available
"In terms of pricing, we found Cortex XSIAM to offer a very reasonable and competitive rate."
"Since Palo Alto is trying to get as many new customers as possible, they're offering very competitive pricing."
"The product cost could be considered value for money compared to other solutions in the market, though it is quite high."
"The solution comes at a significant cost."
"The solution is expensive compared to its competitors."
report
Use our free recommendation engine to learn which Identity Threat Detection and Response (ITDR) solutions are best for your needs.
814,649 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
10%
Retailer
8%
Manufacturing Company
8%
Computer Software Company
14%
Manufacturing Company
11%
Financial Services Firm
9%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What needs improvement with BloodHound Enterprise?
I don't have any specific improvements in mind, as I haven't encountered any significant issues with BloodHound Enterprise. However, a few months ago, there was a problem with the digesters having ...
What is your primary use case for BloodHound Enterprise?
I mainly use BloodHound Enterprise for internal architecture planning, audits, and daily general testing engagements.
What advice do you have for others considering BloodHound Enterprise?
I haven't explored cost-saving aspects or utilized integration capabilities within BloodHound. Additionally, I haven't used AI features in Broadcom for threat detection yet, leaving that to our IT ...
What do you like most about Cortex XSIAM?
It is an effective solution in terms of performance and functionalities.
What is your experience regarding pricing and costs for Cortex XSIAM?
We do not deal with licensing. Only the accounts team handles that information.
What needs improvement with Cortex XSIAM?
I am not sure if any improvements are needed right now. The current features are satisfactory, and new features are implemented following customer feature requests.
 

Overview

Find out what your peers are saying about Microsoft, CrowdStrike, SentinelOne and others in Identity Threat Detection and Response (ITDR). Updated: October 2024.
814,649 professionals have used our research since 2012.