Try our new research platform with insights from 80,000+ expert users

Cynet vs LogRhythm NDR [EOL] comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 26, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
106
Ranking in other categories
Endpoint Protection Platform (EPP) (5th), Endpoint Detection and Response (EDR) (7th), Extended Detection and Response (XDR) (6th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (2nd)
Cynet
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
45
Ranking in other categories
Security Information and Event Management (SIEM) (11th), Endpoint Protection Platform (EPP) (13th), User Entity Behavior Analytics (UEBA) (3rd), Endpoint Detection and Response (EDR) (12th), Threat Deception Platforms (2nd), Network Detection and Response (NDR) (4th), Extended Detection and Response (XDR) (9th), Ransomware Protection (3rd)
LogRhythm NDR [EOL]
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
3
Ranking in other categories
No ranking in other categories
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
Roshan Jadhav - PeerSpot reviewer
Technical Consultant at Vincacyber
Has improved threat detection and streamlined incident analysis through centralized control and AI-driven insights
People are looking for Cynet because it has next-generation threat protection that detects zero-day threats. It has UEBA (user entity behavior analysis), threat hunting features, and storage device control where we can create profiles and block unauthorized USB storage devices. We can also create threat protection policies to detect malware, ransomware, and many other threats. The most valuable feature is the UBA (User behavior analysis). It has integration with SIEM solutions, allowing us to share our logs to third-party SIEM servers. Cynet has AI integration which showcases complete forensic data about threats, making it very easy to understand what happened with the system and what type of incident was detected. Autonomous breach protection is a feature of Cynet which can detect and mitigate known and unknown threats based on signatures. If there are any signature-less files, malware, or ransomware, it will detect them based on autonomous breach protection capabilities. The centralized management console provides a dashboard where we can see four types of attack vectors and incident counts in real-time. It continuously scans the radar and shows open alerts related to files, hosts, users, or networks. We can easily export these alerts and send reports via email.
AshishDubey - PeerSpot reviewer
Product manager at Tata Communications Ltd
A scalable and stable tool that offers users a great GUI
Though I have not extensively worked on LogRhythm NDR, I know the need for a compute side since, in the past, we had required the compute side to deploy the solution in one of our company's client's infrastructure. The product's setup phase was easy and not complicated. The deployment process of LogRhythm NDR can vary between three and four weeks, depending on the skill set of the people involved in the deployment process. For deployment of the product, you have to purchase the license from LogRhythm, and you have to ensure that the compute side is ready for LogRhythm. After you deploy NDR and sensors in the premises of our company's customer on the SPAN and TAP port, and once the logs go through throughput, you can see the logs coming to LogRhythm NDR's console.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cortex is the best tool for endpoint detection, with playbooks that automate and gather endpoint logs, block malicious processes, and update incident tickets, showcasing end-to-end processes with automation in investigation and reducing the analysis workflow."
"One of the things that I enjoy the most is using policy extensions. It's like having host firewalls to control USB connections. I think it's a wonderful tool to restrict use when connecting to our computers. Another important tool is Home Insights. That is an add-on to the Cortex solution. I like that because we can see all the vulnerabilities in the environment and control what assets are connected to our network."
"Since they've done their most recent update, the ease to isolate endpoints is valuable. If we find one where there is a virus on it, we can easily isolate it. We don't even have to contact the user. We don't have to manually take them off the network. We can easily isolate them."
"The most valuable features are incident creation, policy-based protection, IP whitelisting, and device encryption. These are beneficial for endpoint and server security."
"Traps has drastically reduced our endpoint attack surface via advanced detection capabilities, sandboxing of never before seen programs, and by drastically limiting where executables can launch in the first place."
"From a single pane of glass, you can easily manage all of your endpoints."
"The initial setup isn't too bad."
"It'll not slow down your system when compared to others."
"The interface is exceptionally clear and easy to understand."
"The product did not utilize much memory or resources from the background, which was a significant advantage."
"The most valuable aspect of this solution is that it is a complete solution, which makes cyber security very free and almost perfect. There is no such thing as perfect cyber security, but as far as it can go, sign it comes close to being perfect and holistic. Cynet is always comprehensive from the perspective of functionality, as well as from the standpoint that it encompasses not only technology but also processes and people. The triad of people, processes, and technology is crucial and should always be in place. To my knowledge, no other product or platform combines all three components into one, but Cynet does."
"For overall satisfaction, I rate Cynet between nine to ten out of ten, and I wholeheartedly recommend it to other users."
"The dashboard is beautiful, overall easy of use, and the UBA and NBA features are valued."
"Advanced detection and protection against ransomware paired with SOC monitoring are the most valuable features. They have 24/7 SOC monitoring and file activity. It is a very robust tool."
"It is a very stable solution...It is a very scalable solution...The initial setup of Cynet was easy."
"As a reseller, I believe the best functions in Cynet's product are the lightweight agent and good detection performance."
"It is a stable solution...It is a scalable solution."
"It's an excellent security tool with a user-friendly interface that's easy for anyone to use."
"The solution doesn't require the creation of rules or use cases from scratch, which assists our delivery team in installation and deployment. Its dashboard is user-friendly."
 

Cons

"It would be better if they could educate the customers more. Some sort of seminars and roadshows will help educate the customers and show what the product can do. The price could be better. It would also help if they had a team for deployment and support."
"Impact on system performance is horrible, adding a lot of delays for users."
"The tool needs to be improved in terms of integration and interface."
"Whenever the tool releases a new version when deploying the product across the organization, I feel like there are some disturbances in the CPU usage after upgrading the tool to the latest version."
"In reporting they should have a customizable dashboard due to the fact that C-level people don't like reporting to the IT department. They prefer to have a real-time dashboard. That kind of dashboard needs to have various customizations."
"There is a severe gap in functionality between Windows, Linux, and Mac versions. For example all folder restriction settings are Windows only. Traps 5.0+ does not have SAML / LDAP integration."
"Cortex XDR by Palo Alto Networks is a very good product, but financially, it is very expensive, so the company should look into that area."
"Managing the product should be easier."
"Linux servers are not supported."
"Management of the console could be simplified and made more user-friendly because right now it's not very easy to use."
"Most of their times are in Greenwich Mean Time. I would like to see more local time zones."
"One thing to note is that I highly recommend adding a deep learning-based prevention environment as an additional layer to Cynet. However, I always advise my customers to start with Cynet or XDR, for example, and then focus on the people, technology, and processes involved. This is the best approach to ensure that you are not breached with ransomware. While Cynet can prevent most attacks, there have been cases where ransomware has been quicker than Cynet's detection capabilities. In these situations, an additional tool is necessary to ensure complete protection, and that is what I sell as well."
"Maybe they should add more cloud-to-cloud integrations and also focus on integrations with local, on-premises services."
"Its dashboard is not so good. On the dashboard, they don't show the count for client endpoints, which is a failure of this product. This count should be shown on the dashboard. I have 1,000 clients, but I can't see it anywhere on the dashboard."
"Automation could be improved, and orchestration could be added to the features."
"There could be more customization options and detailed information provided in the reports."
"The tool has one limitation compared to its competitors. It does have a mobile app for NDR monitoring. Moreover, there is only operational training and not deployment training."
"From an improvement perspective, I would like LogRhythm NDR to reduce the compute size. I would also like LogRhythm NDR to improve the pricing model."
"There are opportunities for improvement, particularly in upgrading the expertise of local professionals and addressing support issues, which could potentially lead to cost reduction."
 

Pricing and Cost Advice

"It's the most expensive solution, but features-wise, it's quite strong. It's very good for protection, so the results are very good in the case of protection. I would rate it a two out of ten in terms of pricing."
"This is an expensive solution."
"Cortex XDR by Palo Alto Networks is an expensive solution."
"The price is on the higher side, but it's okay."
"It is cost-effective compared to similar solutions. It fits for the small businesses through to the big businesses."
"We didn't have to pay any additional fee for the cloud instance. It just came with the renewal, which was nice."
"The pricing is okay, although direct support can be expensive."
"It has a higher cost than other solutions, like CrowdStrike or Microsoft’s EDR tools, but it reduces the cost of our operations because it’s a new generation antivirus tool."
"We purchase the product’s yearly license."
"The price is very competitive."
"The price should not be less than $100 which is quite reasonable for this solution because you are getting multiple components."
"This solution is expensive. I would rate the price as a three out of five when compared to similar products."
"I don't have specific information about integration capabilities or licensing costs."
"The pricing was good."
"The licensing for Cynet is yearly. The solution pricing depends on the customer, but it is not very expensive."
"Cynet is cheap."
"When looking at the market and comparing it with other vendors, the cost seems relatively high."
"There are certain payments to be made towards the licensing costs attached to the product yearly. The pricing of LogRhythm NDR falls under the mid-range, in my opinion."
"The tool costs are two million rupees for 5000 users."
report
Use our free recommendation engine to learn which Network Detection and Response (NDR) solutions are best for your needs.
883,619 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
10%
Financial Services Firm
9%
Manufacturing Company
9%
Government
7%
Manufacturing Company
10%
Financial Services Firm
9%
Computer Software Company
9%
Comms Service Provider
9%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business44
Midsize Enterprise20
Large Enterprise47
By reviewers
Company SizeCount
Small Business29
Midsize Enterprise7
Large Enterprise12
No data available
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
When evaluating User Activity Monitoring, what aspect do you think is the most important to look for?
The support team that stands behind the detection and response. Is there adequate expertise and are they behind you ...
What do you like most about Cynet?
In terms of incident response, Cynet can contain attacks, offer a trial period to customers, and uninstall if not con...
What is your experience regarding pricing and costs for Cynet?
Cynet is not very costly. We can refer it to other customers because Cynet does not ask for additional costs for add-...
What needs improvement with LogRhythm NDR?
The tool has one limitation compared to its competitors. It does have a mobile app for NDR monitoring. Moreover, ther...
What is your primary use case for LogRhythm NDR?
Our use cases are mostly for mining, telco, finance, and banking industries.
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
No data available
LogRhythm MistNet
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Meuhedet, East Boston Neighborhood Health Center
EMW, Conduent, University of Massachusetts, Deloitte Canada, Central Bank of Barbados, Coalfire
Find out what your peers are saying about Darktrace, Vectra AI, TrendAI and others in Network Detection and Response (NDR). Updated: February 2026.
883,619 professionals have used our research since 2012.