Try our new research platform with insights from 80,000+ expert users

Code42 Incydr vs Qualys Multi-Vector EDR comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Code42 Incydr
Ranking in Endpoint Detection and Response (EDR)
53rd
Average Rating
9.0
Reviews Sentiment
7.4
Number of Reviews
78
Ranking in other categories
Backup and Recovery (56th), Data Loss Prevention (DLP) (26th)
Qualys Multi-Vector EDR
Ranking in Endpoint Detection and Response (EDR)
72nd
Average Rating
8.0
Reviews Sentiment
7.1
Number of Reviews
1
Ranking in other categories
Network Detection and Response (NDR) (26th)
 

Featured Reviews

Chuck_Mackey - PeerSpot reviewer
Provides comprehensive visibility and protection, helps in identifying the gaps in security, and comes with excellent onboarding support
In a couple of instances, we had a little bit of trouble in getting it distributed throughout the organization. We ultimately managed to do it, but they talk about it being a pretty simple process, and it became a little laborious. It would just turn away. The agents were not being distributed. It was just churning and churning and churning. When we were looking for specific categories of data, it was getting bogged down, but that was not even so much Code42, although some of it was their issue. It really has to do with the overall infrastructure and what the organization is prepared to do. If the infrastructure or the networking is a little hinky or you don't have a really finely tuned network infrastructure environment and your patches aren't up to date on your servers and your endpoints, it could get a little sticky. Other than that, it was okay. We really didn't have much problem beyond that. It took a couple of days to sort that out, but it was no big deal.
reviewer1668453 - PeerSpot reviewer
Provides contextual alerts and risk ratings on findings
It's kind of difficult to quantify areas for improvement. In the larger picture, one challenge is that the NDR space is very crowded today. I can mention half a dozen names just off the top of my head. There are at least 12 to 20 different players. All of them are well-known brand names, and it's difficult to compare them. They all claim to be giving you the same network difference capability: catching malware, dealing with all the minor taxonomy of attack, all that. Still, it's very difficult to compare them side by side because they all do things a little differently, and they all have different presentations and output. We haven't deployed it, so I can't give you what we felt about it exactly. But in the larger perspective, the critical feature is really giving a clear separation between a low, high, and medium criticality. You need a rating that is really true to the actual attack. There's one other capability we are evaluating them for, and it's for custom alerts detection. A lot of these products are trying to profile the threats that are already out there in the industry. They're very well known and published. Today, there are targeted acts being played against organizations, so you have to be sensitive to how your firewalls, protocols, and your HTTP are all operating. You might have some fine-tuned threats that are targeting you, and you should be able to build custom defenses. They should have some openness in terms of how you specify your threats. You get a standard library of threats. On top of it, every organization builds its own.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Backup and recovery have been great, but I love having the ability to keep the hybrid type build which they offer."
"It required very little ongoing maintenance once setup."
"Security tools: Being able to monitor data going in and coming off our endpoints. Seeing what it is and where it's going is awesome."
"Low system overhead, setting retention policies, ease of use"
"It has quite a bit of flexibility in configuring backup sets."
"It had the ability to preseed by sending in a data drive and could restore by sending the user a data drive."
"Works in the background and users are able to perform restores."
"t has a very user friendly status bar with common errors and has logs built in to the console so we can review the issues or status of CrashPlan."
"They can provide you very contextual alerts on if something bad is happening—coming into your network or going out of your network. As part of that, they gather a lot of threat intelligence and map your connections against that. The larger benefit is that they give you a risk rating on their findings."
 

Cons

"I think one we can improve is the compression."
"Java, please get rid of Java."
"In a couple of instances, we had a little bit of trouble in getting it distributed throughout the organization. We ultimately managed to do it, but they talk about it being a pretty simple process, and it became a little laborious. It would just turn away. The agents were not being distributed. It was just churning and churning and churning. When we were looking for specific categories of data, it was getting bogged down, but that was not even so much Code42, although some of it was their issue."
"Reporting could use an overhaul. It is very limited."
"The application, written in Java, required far more system resources on a Client than other solutions."
"There doesn't seem to be any feature that is lacking."
"I would like to see more flexibility on privileges, perhaps create another kind of admin for regions. Also, I would like the ability to access logs without having to be on the actual device or a super-admin."
"​Due to recent changes that effectively abandoned an entire segment of their user base, I no longer trust nor can recommend Code42 products."
"My challenge is actually comparing offerings from different vendors across a threat spectrum that is very large. We are talking about millions of threats. How are you confident that Blue Hexagon is catching all one million of them and Palo Alto is doing the same thing? They all have their strengths. Within that, Blue Hexagon might cover 990,000 of them. Palo Alto might cover another 990,000. It's a bit difficult to compare them and say, "Oh, are they catching the same 990,000?" I don't know."
 

Pricing and Cost Advice

"It is 100% worth the cost to get and keep the support, especially when setting it up."
"They were the best solution and surprisingly enough, the cheapest."
"It used to be a good solution for SOHO in particular as it had unlimited storage for a reasonable price. However, their pricing model has changed and they are now primarily targeting enterprise users."
"It was expensive. It was more expensive than Eureka, and it was more expensive than Barracuda Backup, but what we got was a full team. They didn't come in and nickel and dime us. They provided the assistance we needed. They didn't say that they need to charge us for something or it is going to take another statement of work. It was all bundled into it... We pay for the software maintenance. It is probably 18% or 20% of the license fee for rev releases."
"The pricing is reasonable. It's my understanding that the cost is about $7 for unlimited storage in the cloud per server."
"It's difficult to state the setup cost. All the NDRs range anywhere between $500,000, plus or minus, to $2 million. There's a spread of pricing here, depending on who you are talking to. Obviously the major brand names want more money. They typically bundle it with their other offerings. With Cisco, for example, you don't just buy an NDR. So, typically it gets rolled into the cost."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
824,053 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Manufacturing Company
9%
Educational Organization
7%
Financial Services Firm
7%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Code42 Next-Gen DLP?
Risk factors can be adjusted for all intricate details.
What advice do you have for others considering Code42 Next-Gen DLP?
If you come with the perception that this solution uses the same policies that are used in traditional DLP products, you might find Code42 doesn't work for you. You have to adapt to their philosoph...
What needs improvement with Code42 Incydr?
The solution has been designed for a different approach than the one followed by other DLP solutions in the market. Most of us who come from the mindset of filtering out incidents using a content-s...
Ask a question
Earn 20 points
 

Also Known As

Code42 Next-Gen DLP, Code42 Next-Gen Data Loss Protection, Code42 Forensic File Search, Code42 Backup + Restore
Blue Hexagon
 

Learn More

 

Overview

 

Sample Customers

Adobe, Okta, Samsung, Taylormade, Boston University, Lending Club, North Highland, Stanford University, Ping Identity, Qualcomm, Pandora.
Pacific Dental Services, Greenhill and Co, Heffernan Insurance Brokers
Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Detection and Response (EDR). Updated: December 2024.
824,053 professionals have used our research since 2012.