No more typing reviews! Try our Samantha, our new voice AI agent.

Dell Data Protection - Endpoint Security Suite [EOL] vs Tanium comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 16, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
110
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Endpoint Detection and Response (EDR) (6th), Extended Detection and Response (XDR) (5th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (1st)
Dell Data Protection - Endp...
Average Rating
8.0
Reviews Sentiment
3.9
Number of Reviews
6
Ranking in other categories
No ranking in other categories
Tanium
Average Rating
7.8
Reviews Sentiment
6.2
Number of Reviews
22
Ranking in other categories
Server Monitoring (4th), Vulnerability Management (25th), Endpoint Protection Platform (EPP) (16th), Endpoint Detection and Response (EDR) (22nd), Unified Endpoint Management (UEM) (7th)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
Alexander Zhuravel - PeerSpot reviewer
Head of Network and Server infrastructure department at JSC Alfa Bank Ukraine
A highly scalable tool that ensures its users face no problems while using it as a backup system
The tool is scalable and is currently being used on over 2,000 nodes. So, our company doesn't count the number of clients we have, but we do count the number of nodes, specifically referring to file system nodes, backup nodes, database nodes, virtual machine nodes, and blockchain nodes, which we use for file-based applications. According to the traffic, a backup of five petabytes of data can be done for a month.
MA
Division Manager, Information Technology at a legal firm with 51-200 employees
Centralized policies have improved remote endpoint control and have simplified data visibility
The integration is not simple and easy. It requires experienced users or people who have done the implementation. When certain policies are applied, they do not immediately push the policies. For example, we manage endpoint device USB access. We set a policy to block it, but it does not come into effect immediately. Sometimes it takes three or four days for it to reflect. That is a pain point. I have raised this issue with support as well, but they said that I need to limit the number of devices in the policy. In terms of application deployment, for us, it was seamless.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I like the centralized console and the predictive analysis it does of malware. It is very stable and also scalable."
"The positive impacts I see from Cortex XDR by Palo Alto Networks include a complete 360-degree view of our security posture altogether, being a uniform platform where we are ingesting logs from multiple resources."
"Cortex is the best solution for avoiding security breaches, malware attacks, and other kinds of security issues."
"Cortex is the best tool for endpoint detection, and I have used it to verify hashes or domains to identify malicious activity, trigger playbooks that automate and gather endpoint logs, block malicious processes, and update incident tickets, showcasing end-to-end processes with automation in investigation and reducing the analysis workflow."
"One thing that I like about Cortex XDR by Palo Alto Networks, it is detecting all the suspicious or malicious binaries, and it has integration with Palo Alto Firewall."
"Since they've done their most recent update, the ease to isolate endpoints is valuable. If we find one where there is a virus on it, we can easily isolate it. We don't even have to contact the user. We don't have to manually take them off the network. We can easily isolate them."
"The product has an intuitive dashboard."
"We use Cortex XDR by Palo Alto Networks for its ability to detect based on behavior rather than simple virus scan to prevent malicious activities."
"Dell Data Protection has a decent service and integrates well with users' active directories."
"The backup speed and deduplication are the most valuable features."
"The most valuable features of the solution are its speed, backup speed, and restore speed."
"It is a stable solution. Our company faces no problems with the backup system…The initial setup wasn't complex."
"The security engine is effective at catching potential threats."
"Technical support is excellent."
"It is a stable solution."
"There's a really they have a really nice way to test it first. Before you adopt it. And so I would suggest trying to they they create a test site for you, and they give you a link to it, and you can basically try out all the features on your own for I think we did it for a month."
"The product is granular and can build complex roles compared to other EDR vendors."
"The interrogation piece was the most valuable feature because it was very detailed."
"Tanium has made the process of detecting threats more proactive with its detection, so the process is easier and more efficient."
"I like the fact that you can create patching campaigns depending on the area of your network that you want to address first."
"The most valuable features of this solution are the consolidation of all historical data on device endpoints, security drivers, firmware, and Software version gaps."
"Threat hunting is a very good feature on Tanium. We have just started using it and have not used it extensively."
"When I push a quick update, it's done right away, and I can rescan immediately to confirm completion within minutes."
"Tanium's most valuable feature is its instant discovery aspect."
 

Cons

"The dashboard is the area that needs to improve so that we can have the ability to drill down without having to go elsewhere to verify results."
"When it comes to core analysis, and security analysis, Cortex needs to provide more information."
"The installation should be easier and the Palo Alto pre-sales and sales teams should have more information on the product because they don't know what they are selling."
"It's very time-consuming to log support issues and the people that answer the tickets aren't very knowledgeable."
"Previously, the endpoint would leave the environment, not being on our VPN, essentially unable to interact with the server to upload files. It was unable to retrieve new file verdicts. It was using a thing called "local analysis" to determine if something was a malicious file or not. There was no dynamic analysis."
"While using Cortex, I noticed some aspects that could be improved, such as increasing the synchronization speed between XDR and Xnor."
"The product's pricing needs improvement. They could provide more discounts. Additionally, the dashboard and control panel could be enhanced."
"Previously, the endpoint would leave the environment, not being on our VPN, essentially unable to interact with the server to upload files."
"I consider the product pretty expensive, so from an improvement perspective, I would like the pricing to be better."
"Implementation in a beta environment is necessary before rollout to the larger community."
"The backup speed and deduplication are the most valuable features."
"Whenever we talk about reporting, I have a chance to look at the reporting, and in my opinion, it's not user-friendly."
"The solution could be more user-friendly."
"The restore feed needs improvement."
"The solution’s user interface should be made more user-friendly."
"Tanium’s scalability could be improved."
"I would like to have more integrations and custom plugins to input. Integration is always a big deal in a lot of different environments."
"I would like to have more integrations and custom plugins to input."
"We set a policy to block USB access. The moment a device is being set up on the network, I apply the policy, but it does not come into effect immediately."
"Most of the time, agent-relative issues have to be more equipped with self-healing features. At times, the agent is there, but for some reason, it doesn't report a status. It gives certain problems that are obviously agent-based."
"Tanium's limitations should be improved because although it is a great tool, it is limited to only a few classes during a session."
"It is not really additional functions, or the features that are needed, rather the complexity would be reduced based on the number of modules required to put together a comprehensive operational security and risk compliance model."
"When working with Tanium, there are some older devices that haven't been patched for a long time, and certain patches are not included in Tanium. I have to search outside to download patches, create bundles, and then perform the task."
 

Pricing and Cost Advice

"Our customers have expressed that the price is high."
"I don't like that they have different types of licenses."
"The return on investment is from the user side because we have seen the performance of it increase the delivery time of the product if we are using too many web-based and on-premise applications. In indirect ways, we saw the return of investment in terms of performance and user satisfaction increase."
"Cortex XDR by Palo Alto Networks is quite an expensive solution."
"It has reasonable pricing for the use cases it provides to the company."
"Traps pays for itself within the first 16 months of a three-year subscription. This is attributed to OPEX savings, as security teams spent less time trying to identify and isolate malware for analysis as a result of a reduction in malware incidents, false positives, and breach avoidance."
"Cortex XDR’s pricing is very reasonable."
"Licensing for Palo Alto Networks Cortex XDR can be costly, especially when it comes to a hundred users. A license is required for each user, and the subscription must be renewed on a yearly basis."
"It is an expensive solution."
"It is more expensive than one of its competitors."
"You'll need to pay more than the product's original price for the support."
"It is higher than some competitors in the market."
"The solution offers value for money."
"The solution is expensive but it's a good investment."
"It's an expensive solution. It would be nice if the cost were lower."
"There is an annual license required to use this solution."
"Tanium is a more expensive solution in Latin America than some of the competitors, such as BigFix."
"The product's pricing differs from region to region depending on negotiations and the number of endpoints."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
892,611 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
12%
Financial Services Firm
12%
Comms Service Provider
8%
Manufacturing Company
8%
No data available
Financial Services Firm
15%
Government
11%
Manufacturing Company
9%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business45
Midsize Enterprise20
Large Enterprise48
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise1
Large Enterprise2
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise3
Large Enterprise12
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
Ask a question
Earn 20 points
What needs improvement with Tanium?
While there is always room for improvement, I am pleased with Tanium.
What is your primary use case for Tanium?
The primary use case for Tanium ( /products/tanium-reviews ) is compliance, patching, and inventory as part of the co...
What advice do you have for others considering Tanium?
For smaller companies, Tanium is quite a big investment, and one needs to have a considerable setup to make it econom...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
DDP, ESS
Tanium Inc Cloud, Tanium XEM
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
MEIZU, TBG West, Ackerman Charter School District, Church of the Highlands
JPMorgan Chase, eBay, Amazon, US Bank, MetLife, pwc, Cerner, Delphi, MGM Grand, New York Life
Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP). Updated: April 2026.
892,611 professionals have used our research since 2012.