No more typing reviews! Try our Samantha, our new voice AI agent.

HP Wolf Security vs Microsoft Defender XDR comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Ranking in Endpoint Detection and Response (EDR)
6th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
110
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Extended Detection and Response (XDR) (5th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (1st)
HP Wolf Security
Ranking in Endpoint Detection and Response (EDR)
46th
Average Rating
7.8
Reviews Sentiment
3.4
Number of Reviews
8
Ranking in other categories
Endpoint Protection Platform (EPP) (17th)
Microsoft Defender XDR
Ranking in Endpoint Detection and Response (EDR)
8th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
109
Ranking in other categories
Extended Detection and Response (XDR) (4th), Microsoft Security Suite (4th)
 

Mindshare comparison

As of May 2026, in the Endpoint Detection and Response (EDR) category, the mindshare of Cortex XDR by Palo Alto Networks is 3.4%, down from 4.0% compared to the previous year. The mindshare of HP Wolf Security is 1.9%, down from 2.4% compared to the previous year. The mindshare of Microsoft Defender XDR is 2.6%, down from 2.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR) Mindshare Distribution
ProductMindshare (%)
Cortex XDR by Palo Alto Networks3.4%
Microsoft Defender XDR2.6%
HP Wolf Security1.9%
Other92.1%
Endpoint Detection and Response (EDR)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
BH
Owner at Stoneridge Engineering, LLC
Adds a layer of safety, especially for laptops operating in various environments
The tool's deployment is easy. HP Wolf Security's deployment was a swift process since it was initially compatible with Windows 10, the operating system on both machines. However, when I transitioned to Windows 11, I encountered minor issues that prompted me to delve deeper into Wolf Security to fine-tune security settings according to my preferences. While I mostly used default settings, there was an initial adjustment where I disabled the AI function related to malware. Currently, the system is running smoothly with no reported issues. Adjusting some settings raised concerns about compatibility between HP Wolf Security and Norton 360. Specifically, aspects of HP Wolf Security, such as the virtual machine component, intrigued me, but I hesitated due to potential conflicts. During my investigation, Windows 11 raised a flag, questioning the system's security settings with Norton 360 and HP Wolf Security. However, it seems that they coexist well without causing issues.
AS
Manager at Softcell Technologies Limited
Centralized threat detection has improved response times but still needs better integrations
Microsoft Defender XDR simplifies cross-domain investigations for the SOC team. Instead of switching between separate endpoint, email, identity, and cloud security tools, the analysts can investigate correlated incidents from a single console with unified telemetry and timelines. The best features Microsoft Defender XDR offers are cross-domain incident correlation, automated investigation and response, and unified visibility across endpoint, identity, email, and cloud workloads. The attack timeline and correlated incident view are especially valuable because they help analysts understand the full attack chain quickly without manually stitching data from multiple security tools. The automated investigation and response capabilities in Microsoft Defender XDR save a significant amount of manual effort for the SOC team. Routine tasks like alert correlation, endpoint isolation, malware analysis, and remediation recommendations are automated, which reduces analyst workload and improves response time for common incidents. One underrated feature in Microsoft Defender XDR is the unified attack timeline and identity correlation capabilities. It gives analysts a clear end-to-end view of user, email, data, device, and identity activity during an incident, which makes root cause analysis and lateral movement tracking much easier. Microsoft Defender XDR has improved our overall security visibility and helped reduce the time required to detect and respond to threats across endpoints, identities, email, and cloud workloads. It also improved our SOC efficiency by centralizing investigations and automating repetitive response actions, which reduced operational overhead significantly.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The live terminal is probably the best thing ever. It gives you the access to get straight onto any machine."
"Technical support is the best in class, in my opinion, because they have invested heavily in research and development."
"The ability to kind of stitch everything together and see the actual complete picture is very useful. I guess you'd call it a playbook. Some people call it the forensics analysis of what was happening on particular endpoints when they detected some malicious behavior, and what transpired before that to cause that. It is also very user friendly. The way they have done everything and integrated all the solutions that they've purchased over the years to make it a very seamless, effective product is very good. One thing about Palo Alto is that they take the products or services that they purchase and make them seamless for the end user as compared to some companies that purchase other companies and then just kind of have their products off to the side or keep different interfaces. Palo Alto doesn't do that."
"Provides behavior-based detection which offers many benefits over signature-based detection."
"Palo Alto is the best security solution in the market."
"It collects and caches and the knowledge of machine learning from different customers to take to the cloud, it makes it better to use for everybody, it allows for quick learning and updates and can, therefore, offer zero-day malware security, and this sharing of metadata helps make the solution very safe."
"Threat identification and detection are the most valuable features of this solution."
"One of the things that I enjoy the most is using policy extensions. It's like having host firewalls to control USB connections. I think it's a wonderful tool to restrict use when connecting to our computers. Another important tool is Home Insights. That is an add-on to the Cortex solution. I like that because we can see all the vulnerabilities in the environment and control what assets are connected to our network."
"Bromium allows us to safely view images and quickly and safely surf our network so that we can take proper care of our patients efficiently, effectively, and expeditiously."
"We've been able to isolate and prevent malicious code from external email attachments and from downloaded internet files. Those are the two big areas that have really made an impact."
"It has prevented thousands of potential threats by encapsulating them within its own vSentry container, thus providing overall protection and integrity of the operating system."
"Our overall security posture has absolutely improved as a result of adding Bromium to our security stack."
"It has reduced the number of virus and malware incidents and calls we have received compared to prior to deploying this product, and our overall security posture has improved."
"The most valuable feature is the process isolation because it simply stops malware from infecting the machines."
"It has prevented thousands of potential threats by encapsulating them within its own vSentry container, thus providing overall protection and integrity of the operating system."
"Our security posture has improved; it has definitely contained and prevented some malicious attacks from happening."
"In our company,we have faced multiple attacks over the last few months, but none of them have been successful, and I think Microsoft Defender XDR has played a major role in it."
"Microsoft 365 Defender is a good solution and easy to use."
"The support provides a 24 hrs service which I am completely satisfied with."
"Microsoft Defender XDR is scalable."
"The integration with other Microsoft solutions is the most valuable feature."
"We are able to consolidate licences and make use of many Microsoft products using this solution. If we have any Microsoft customers, we encourage them to use this solution for enterprise defence."
"Many people don't realize that Microsoft Azure, Exchange Online, and the security and compliance portal all sync together. For instance, within the Azure portal you can set security restrictions and policies to help secure your tenants... The good part of it is that these products have already been integrated. When you sign on as an admin you have global admin rights and that gives you access to all these features."
"Setting up Microsoft 365 Defender is easy. It's a user-friendly solution that provides threat protection. It has good stability and scalability."
 

Cons

"There are some false positives. What our guys would have liked is that it would have been easier to manipulate as soon as they found a false positive that they knew was a false positive. How to do so was not obvious. Some people complained about it. The interface, the ESM, is not user-friendly."
"There are some third-party solutions that are difficult to integrate with, which is something that can be improved."
"It'll help if customization was easier."
"Dashboards do not allow everyone to see what's happening."
"They've been having some issues with updating their endpoint agents, and it has been quite frustrating."
"There are some third-party solutions that are difficult to integrate with, which is something that can be improved."
"Currently, we are monitoring all USB drives and ports but we would like to improve our device control capabilities."
"For working with the solution, you only really need a web browser, however, we've found that working on Chrome, for example, is horrible."
"They need to improve the compatibility with other applications and its stability."
"Initially, when we came in contact with Bromium a few years ago, it had a nice threat analyst, or a LAVA Pop, which is what they used to call it. I would like to still see that on the individual machines because when we go out to look at a machine, we don't necessarily have access to the console."
"Room for improvement would be keeping up with the rate of change, specifically on Windows platforms."
"Reporting is one of the shortcomings of the product. We do mine the data that's in there from a forensics perspective... It becomes very difficult because you have to spend a lot of time digging through the volumes of data. Reporting is absolutely the biggest shortcoming."
"They have always struggled with usability. The endpoint protection that it offers you is tremendous, but there's definitely an impact with use of resources on the computer."
"Room for improvement would be keeping up with the rate of change, specifically on Windows platforms. There are a lot of updates that come out for Microsoft Windows operating systems and the Bromium product needs to be able to keep up quickly with those updates and all the browser updates that are coming out. It's hard to do, but that's really where they need to be more responsive because we end up with problems and then we have to call support to get patches, etc."
"Initially, when we came in contact with Bromium a few years ago, it had a nice threat analyst, or a LAVA Pop, which is what they used to call it. Once it detected malware, it would show us the malware's path... I don't see that on the computers now. We only get to see that in the console. I would like to still see that on the individual machines because when we go out to look at a machine, we don't necessarily have access to the console."
"The tool behaves differently when I ported to Windows 11."
"While the XDR platform offers valuable functionalities, it falls short of other solutions in its ability to deliver a cohesive identity experience."
"Defender also lacks automated detection and response. You need to resolve issues manually. You can manage multiple Microsoft security products from a single portal, and all your security recommendations are in one place. It's easy to understand and manage. However, I wouldn't say Defender is a single pane of glass. You still need to switch between all of the available Microsoft tools. You can see all the alerts in one panel, but you can't automate remediation."
"Microsoft Defender XDR can be improved as a solution because it's still quite costly; it's part of E5, E5 security, so the cost is still quite high, especially considering SME and C customers, or SMB customers."
"I haven't really come across the incident Q assistant helping improve the efficiency of my SOC workflow."
"There are other SIEM solutions that are easier to use, mainly based on the creation of rules, use cases, and groups."
"The interface could be improved. For example, if you want to do a phishing simulation for your employees, it can take a while to figure out what to do. The interface is a bit messy and could be updated. It isn't too bad, but doing some things can be a long process."
"There are a few technical issues with Defender XDR that can be improved. Sometimes, the endpoint devices are not reporting properly to the Defender 365 portal. When you're getting all the information from the Microsoft portal, the devices are sometimes not in sync. We have hundreds of endpoint devices, some needing to be onboarded again."
"The documentation on their website is somewhat outdated and doesn't show properly. I wanted to try a query in Microsoft Defender 365. When I opened the related documentation from the security blog on the Microsoft website, the figures were not showing. It was difficult to understand the article without having the figures. The figures were there in the article, but they were not getting loaded, which made the article obsolete."
 

Pricing and Cost Advice

"The pricing is a little bit on the expensive side."
"The cost of Cortex XDR by Palo Alto Networks is $55 to $90 USD per endpoint per month."
"It's about $55 per license on a yearly basis."
"It has a yearly renewal."
"The price was fine."
"The pricing is a little high. It is per user per year."
"Compared to CrowdStrike, Cortex XDR is an expensive solution."
"When we first bought it, it was a bit expensive, but it was worth it. The licensing was straightforward."
"I think the pricing is a good value. All of these security products are always going to be very expensive, but I don't think Bromium is unreasonable. I think Bromium is decently priced. It’s a tiered licensing platform. The more you buy, the cheaper gets per unit, and I think their tiers are very well defined. I think they're fair."
"The product came as a bundle with the machine."
"The product's pricing is a good value. We only run it on our internet-facing workstations, we don't run it on everything in our environment. We are very selective. Some organizations may want to consider doing something like that to reduce their license count."
"The pricing is very fair compared to the competition. The licensing is straightforward."
"Pricing is reasonable."
"The solution is too expensive."
"Microsoft Defender XDR is already included in our Office 365 licensing. It is better because we're saving money by using it."
"The licensing fee for Microsoft 365 Defender is fair."
"Defender XDR is included in the E5 license, but it's a bit too expensive."
"The price of the solution is high compared to others and we have lost some customers because of it."
"Sometimes 365 Defender is expensive, but it can be moderate, depending on the organization's size and the license type. We're satisfied with the cost because it gives us a product that protects our entire environment with DLP. To compromise some cost, of course, we are to complete the most secure environment."
"Microsoft Defender falls within a mid-tier price range compared to other security solutions."
"I find the pricing to be quite competitive, especially considering its inclusion in our E5 subscription, which provides a comprehensive set of functionalities."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
893,438 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Construction Company
12%
Comms Service Provider
9%
Manufacturing Company
8%
Comms Service Provider
10%
Manufacturing Company
8%
Computer Software Company
8%
Financial Services Firm
7%
Computer Software Company
11%
Financial Services Firm
9%
Manufacturing Company
7%
Comms Service Provider
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business46
Midsize Enterprise20
Large Enterprise49
By reviewers
Company SizeCount
Small Business3
Large Enterprise5
By reviewers
Company SizeCount
Small Business46
Midsize Enterprise29
Large Enterprise41
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
Ask a question
Earn 20 points
What do you like most about Microsoft 365 Defender?
Microsoft Defender XDR provides strong identity protection with comprehensive insights into risky user behavior and p...
What is your experience regarding pricing and costs for Microsoft 365 Defender?
My experience with the pricing, setup costs, and licensing of Microsoft Defender XDR is that we are on an E5 license,...
What needs improvement with Microsoft 365 Defender?
From my perspective, Microsoft Defender XDR can be improved with better visibility in certain areas where I can trigg...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Bromium vSentry
Microsoft 365 Defender, Microsoft Threat Protection, MS 365 Defender
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Valspar
Accenture, Deloitte, ExxonMobil, General Electric, IBM, Johnson & Johnson and many others.
Find out what your peers are saying about HP Wolf Security vs. Microsoft Defender XDR and other solutions. Updated: April 2026.
893,438 professionals have used our research since 2012.