No more typing reviews! Try our Samantha, our new voice AI agent.

HP Wolf Security vs Microsoft Defender XDR comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Ranking in Endpoint Detection and Response (EDR)
6th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
110
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Extended Detection and Response (XDR) (5th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (1st)
HP Wolf Security
Ranking in Endpoint Detection and Response (EDR)
46th
Average Rating
7.8
Reviews Sentiment
3.4
Number of Reviews
8
Ranking in other categories
Endpoint Protection Platform (EPP) (17th)
Microsoft Defender XDR
Ranking in Endpoint Detection and Response (EDR)
8th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
109
Ranking in other categories
Extended Detection and Response (XDR) (4th), Microsoft Security Suite (4th)
 

Mindshare comparison

As of May 2026, in the Endpoint Detection and Response (EDR) category, the mindshare of Cortex XDR by Palo Alto Networks is 3.4%, down from 4.0% compared to the previous year. The mindshare of HP Wolf Security is 1.9%, down from 2.4% compared to the previous year. The mindshare of Microsoft Defender XDR is 2.6%, down from 2.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR) Mindshare Distribution
ProductMindshare (%)
Cortex XDR by Palo Alto Networks3.4%
Microsoft Defender XDR2.6%
HP Wolf Security1.9%
Other92.1%
Endpoint Detection and Response (EDR)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
BH
Owner at Stoneridge Engineering, LLC
Adds a layer of safety, especially for laptops operating in various environments
The tool's deployment is easy. HP Wolf Security's deployment was a swift process since it was initially compatible with Windows 10, the operating system on both machines. However, when I transitioned to Windows 11, I encountered minor issues that prompted me to delve deeper into Wolf Security to fine-tune security settings according to my preferences. While I mostly used default settings, there was an initial adjustment where I disabled the AI function related to malware. Currently, the system is running smoothly with no reported issues. Adjusting some settings raised concerns about compatibility between HP Wolf Security and Norton 360. Specifically, aspects of HP Wolf Security, such as the virtual machine component, intrigued me, but I hesitated due to potential conflicts. During my investigation, Windows 11 raised a flag, questioning the system's security settings with Norton 360 and HP Wolf Security. However, it seems that they coexist well without causing issues.
AS
Manager at Softcell Technologies Limited
Centralized threat detection has improved response times but still needs better integrations
Microsoft Defender XDR simplifies cross-domain investigations for the SOC team. Instead of switching between separate endpoint, email, identity, and cloud security tools, the analysts can investigate correlated incidents from a single console with unified telemetry and timelines. The best features Microsoft Defender XDR offers are cross-domain incident correlation, automated investigation and response, and unified visibility across endpoint, identity, email, and cloud workloads. The attack timeline and correlated incident view are especially valuable because they help analysts understand the full attack chain quickly without manually stitching data from multiple security tools. The automated investigation and response capabilities in Microsoft Defender XDR save a significant amount of manual effort for the SOC team. Routine tasks like alert correlation, endpoint isolation, malware analysis, and remediation recommendations are automated, which reduces analyst workload and improves response time for common incidents. One underrated feature in Microsoft Defender XDR is the unified attack timeline and identity correlation capabilities. It gives analysts a clear end-to-end view of user, email, data, device, and identity activity during an incident, which makes root cause analysis and lateral movement tracking much easier. Microsoft Defender XDR has improved our overall security visibility and helped reduce the time required to detect and respond to threats across endpoints, identities, email, and cloud workloads. It also improved our SOC efficiency by centralizing investigations and automating repetitive response actions, which reduced operational overhead significantly.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"From a single pane of glass, you can easily manage all of your endpoints."
"We have a complete overview of all our PCs and it's very easy to handle and to use the interface. It has a lot of benefits for us."
"It's a perfect solution. It integrates well into the environment."
"It collects and caches and the knowledge of machine learning from different customers to take to the cloud. It makes it better to use for everybody. It allows for quick learning and updates and can, therefore, offer zero-day malware security. This sharing of metadata helps make the solution very safe."
"We use Cortex XDR by Palo Alto Networks for its ability to detect based on behavior rather than simple virus scan to prevent malicious activities."
"Cortex XDR features advanced threat detection capabilities."
"Palo Alto Networks Traps improves our security posture and lowers risk by providing next-gen methods to combat against modern threats on all the major platforms."
"The solution allows us to gain remote access without the user's knowledge and take the necessary actions on the device."
"Our overall security posture has absolutely improved as a result of adding Bromium to our security stack."
"Bromium allows us to safely view images and quickly and safely surf our network so that we can take proper care of our patients efficiently, effectively, and expeditiously."
"Our overall security posture has absolutely improved as a result of adding Bromium to our security stack. We continue to have less user impact through a significantly reduced amount of malware infections. It's become a non-event."
"The isolation feature is the most important because it prevents attacks."
"It has prevented thousands of potential threats by encapsulating them within its own vSentry container, thus providing overall protection and integrity of the operating system."
"Looking at it in the big picture of the risk that you're mitigating and the protection that you're getting, it's phenomenal."
"Our security posture has improved; it has definitely contained and prevented some malicious attacks from happening."
"It has prevented thousands of potential threats by encapsulating them within its own vSentry container, thus providing overall protection and integrity of the operating system."
"Microsoft XDR's system of analysis and investigation is super convenient for our customers. It integrates with other Microsoft solutions like Defender for 365 to protect email traffic from malicious external web links and phishing."
"The feature I like the most in Microsoft Defender XDR is XDR because it has taken us a while, but we are a global company with people in a few countries, and now we can have centralized alerts that we send out to Teams messages and clean up infected computers or help people in a very short amount of time."
"Microsoft Defender XDR is a complete package of different Defender solutions, including Defender for Endpoint, Defender for Office 365, Defender for Cloud, and Sentinel SIEM, among others."
"Defender XDR enables you to scan a system remotely and get a complete inventory of its assets. You can gather more information from the asset inventory and apply threat intelligence using Office 365 or something."
"The email protection feature is the most valuable because our risks primarily lie there, and it seems to be the most popular target."
"The stability has been great."
"It saves time for us because we don't need to go through another team or get a separate team involved just for data transfers."
"Defender XDR offers richer insights into Defender XDR. It's a better overall experience."
 

Cons

"Although I would say this product is highly-rated, it could probably do more because nothing does everything that you want."
"Cortex XDR by Palo Alto Networks is a very good product, but financially, it is very expensive, so the company should look into that area."
"Impact on system performance is horrible, adding a lot of delays for users."
"The solution could improve by providing better integration with their own products and others."
"The solution should add unwanted malicious hash values to a block list so that whenever the action is triggered, it will automatically prevent the malicious content."
"We have found that there are times Cortex XDR by Palo Alto Networks does not detect some of the viruses, we have to use another protection solution called Kaspersky."
"It is not easy to sell Cortex XDR, not because it isn't a good tool. Its marketing needs to be improved."
"While using Cortex, I noticed some aspects that could be improved, such as increasing the synchronization speed between XDR and Xnor."
"I did not find this to be an out-of-the-box solution, it required planning and alignment across many groups."
"I did not find this to be an out-of-the-box solution, it required planning and alignment across many groups."
"The tool behaves differently when I ported to Windows 11."
"They have always struggled with usability. The endpoint protection that it offers you is tremendous, but there's definitely an impact with use of resources on the computer."
"They need to improve the compatibility with other applications and its stability."
"Reporting is one of the shortcomings of the product. We do mine the data that's in there from a forensics perspective... It becomes very difficult because you have to spend a lot of time digging through the volumes of data. Reporting is absolutely the biggest shortcoming."
"Initially, when we came in contact with Bromium a few years ago, it had a nice threat analyst, or a LAVA Pop, which is what they used to call it. Once it detected malware, it would show us the malware's path... I don't see that on the computers now. We only get to see that in the console. I would like to still see that on the individual machines because when we go out to look at a machine, we don't necessarily have access to the console."
"When you deploy, not only is the user asked to reboot their computer, they are also asked to wait for 20 minutes while it sits there and initializes. It definitely impacts the end-user. It takes time away from their day."
"Troubleshooting in Microsoft 365 Defender can be inefficient."
"Sometimes, digging into the information and knowing where to go can be difficult. It would be better if much of that information were immediately visible, especially when looking at endpoints or users."
"The logs could be better."
"The capability to not only thwart attacks but also to adapt to evolving threats is crucial."
"Offboarding latency should be reduced. Even after a device has been successfully offboarded using a particular offboarding script, it still shows up as onboarded."
"The only issue I've had is, when it comes to deployment, the steps I must take around policy setup. That is challenging."
"There should be better information for experts on features in the solution. What I see when reading about features in Microsoft 365 Defender is that it is always general information. If Microsoft could go deeper into details for the experts about how to use the tools, usage of it would be more familiar and it would be easier to use."
"Their response time is okay, it works fine, but the time it takes to resolve escalated cases needs improvement."
 

Pricing and Cost Advice

"The cost depends on your chosen license type, like Pro or other licenses."
"We pay about $50,000 USD per year for a bundle that includes Cortex XDR."
"This is an expensive solution."
"Very costly product."
"I don't like that they have different types of licenses."
"If one wishes to work with another team or large number of users at a future point, he must purchase a license for them."
"This is an expensive solution."
"I don't recall what the cost was, but it wasn't really that expensive."
"Pricing is reasonable."
"The pricing is very fair compared to the competition. The licensing is straightforward."
"I think the pricing is a good value. All of these security products are always going to be very expensive, but I don't think Bromium is unreasonable. I think Bromium is decently priced. It’s a tiered licensing platform. The more you buy, the cheaper gets per unit, and I think their tiers are very well defined. I think they're fair."
"The product's pricing is a good value. We only run it on our internet-facing workstations, we don't run it on everything in our environment. We are very selective. Some organizations may want to consider doing something like that to reduce their license count."
"The product came as a bundle with the machine."
"The product is fairly priced for what we get from it."
"It is fairly priced because we get complete integrated services with the E5 license."
"We've managed to navigate it effectively through our enterprise agreement, and Microsoft's academic discounts have proven to be quite generous."
"The pricing of Microsoft 365 Defender is definitely on the costly side, but with the features and services that Microsoft provides, such as the seamless integration of all the Defender tools, while the price is on the higher side, there is no alternative."
"I find the pricing to be quite competitive, especially considering its inclusion in our E5 subscription, which provides a comprehensive set of functionalities."
"Sometimes 365 Defender is expensive, but it can be moderate, depending on the organization's size and the license type. We're satisfied with the cost because it gives us a product that protects our entire environment with DLP. To compromise some cost, of course, we are to complete the most secure environment."
"Microsoft 365 Defender offers competitive pricing."
"The price could be better. Normally, the costs depend on the country you're located in for the license. When we were in the initial stage, we went with the E5 license they call premium standard. It cost us around $5.20 per month for four users."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
893,244 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Construction Company
12%
Comms Service Provider
9%
Manufacturing Company
8%
Comms Service Provider
10%
Manufacturing Company
8%
Computer Software Company
8%
Financial Services Firm
7%
Computer Software Company
11%
Financial Services Firm
9%
Manufacturing Company
7%
Comms Service Provider
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business45
Midsize Enterprise21
Large Enterprise48
By reviewers
Company SizeCount
Small Business3
Large Enterprise5
By reviewers
Company SizeCount
Small Business46
Midsize Enterprise29
Large Enterprise40
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
Ask a question
Earn 20 points
What do you like most about Microsoft 365 Defender?
Microsoft Defender XDR provides strong identity protection with comprehensive insights into risky user behavior and p...
What is your experience regarding pricing and costs for Microsoft 365 Defender?
My experience with the pricing, setup costs, and licensing of Microsoft Defender XDR is that we are on an E5 license,...
What needs improvement with Microsoft 365 Defender?
From my perspective, Microsoft Defender XDR can be improved with better visibility in certain areas where I can trigg...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Bromium vSentry
Microsoft 365 Defender, Microsoft Threat Protection, MS 365 Defender
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Valspar
Accenture, Deloitte, ExxonMobil, General Electric, IBM, Johnson & Johnson and many others.
Find out what your peers are saying about HP Wolf Security vs. Microsoft Defender XDR and other solutions. Updated: April 2026.
893,244 professionals have used our research since 2012.