{"id":17826,"date":"2020-12-07T21:27:16","date_gmt":"2020-12-07T21:27:16","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=17826"},"modified":"2022-08-02T04:36:37","modified_gmt":"2022-08-02T04:36:37","slug":"check-point-vs-palo-alto-edr-solutions-compared","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/","title":{"rendered":"Check Point vs Palo Alto: Compare Top EDR Solutions"},"content":{"rendered":"<p>This is one of those articles that&#8217;s fun to write because there is virtually no downside to these two endpoint detection and response (EDR) products. Check Point Software and Palo Alto Networks both offer stellar security for enterprises seeking better endpoint protection. The differences between the products lie in price, complexity and target markets.<\/p>\n<h2>EDR security testing<\/h2>\n<p>Check Point SandBlast and Palo Alto Cortex XDR both made our list of the <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">best EDR products<\/a>, and with good reason: both have posted strong scores in rigorous NSS Labs testing over the last couple of years. Both received a AA rating from NSS Labs this year, along with four other vendors, the highest grades received this year (see chart below).<\/p>\n<p>Palo Alto has an edge in independent testing, however. In our analysis, the vendor came out on top of the first two rounds of the very difficult MITRE ATT&amp;CK Evaluations, which basically measure a product&#8217;s response to a simulated Russian state-sponsored attack. Blocking about 90 percent of challenges, Palo Alto came out on top, with <a href=\"https:\/\/prf.hn\/l\/kgJAB03\" rel=\"noopener sponsored\" target=\"_blank\">F-Secure<\/a> in second.<\/p>\n<p>Check Point is only now undergoing MITRE testing, so IT security buyers will soon be able to compare the two there also.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17887\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/12\/ESP_CPvsPA_01-01.png\" alt=\"\" width=\"2376\" height=\"799\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-01.png 2376w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-01-300x101.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-01-1024x344.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-01-768x258.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-01-1536x517.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-01-2048x689.png 2048w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-01-150x50.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-01-696x234.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-01-1068x359.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-01-1920x646.png 1920w\" sizes=\"(max-width: 2376px) 100vw, 2376px\" \/><\/p>\n<h2>Pricing<\/h2>\n<p>This is where Check Point shines. At a little more than $39,000 a year for 2,500 endpoints, SandBlast isn&#8217;t as cheap as Sophos or Kaspersky, but it&#8217;s at the low end of the market, per NSS Labs. At $65,000 a year, Palo Alto is just above the midrange. For the price, Check Point packs in a lot of great features, but Palo Alto offers more in the way of advanced features that security operations centers (SOCs) require.<\/p>\n<h2>Advanced features vs. ease of use<\/h2>\n<p>In this case you get what you pay for &#8211; and that&#8217;s no knock on Check Point, which should be on the evaluation list of every small and mid-sized enterprise.<\/p>\n<p>Palo Alto offers AI and behavioral analytics, with the ability to handle advanced attacks. Cortex XDR tracks threats across endpoints, networks and the cloud, with strong alerting capabilities. The only place it falls short on is vulnerability management, but that&#8217;s often sold as a separate product by security vendors. Rogue device discovery and rollback could be better, and management can be complicated, but it&#8217;s a tool aimed at sophisticated security teams. In our opinion, Palo Alto offers the best security of all the EDR vendors we examined. Some products may shine more in ease of management and incident response &#8211; and given how overwhelmed cybersecurity professionals are these days, buyers often seem to prioritize tools that make their jobs easier. Palo Alto can help there too, but its real strength is in stopping threats. There&#8217;s no better tool for pure security.<\/p>\n<p>Check Point is remarkably full-featured for a product priced at the lower end of the market. In our analysis, SandBlast received the highest score in Ease of Use and came in second in Management. Its automated response capability is very good, making it a strong candidate for smaller companies or those with less sophisticated security teams. Better security cannot be had for the price.<\/p>\n<p>Palo Alto gets high marks from users for its management features too, but the price tag and advanced investigational features are aimed squarely at the enterprise market.<\/p>\n<p>Both products get some of the highest user review scores in the industry. Check Point users praise SandBlast&#8217;s ease of use and strong security. Palo Alto users offer plenty of praise there too, but also express appreciation for features like automated investigation and root cause analysis.<\/p>\n<p>Check Point and Palo Alto, like all our top EDR vendors, offer a unified EDR\/endpoint protection platform (EPP), machine learning-based threat detection, advanced fileless threat protection, and correlation and automatic indicators of compromise (IoC). Here&#8217;s how they break down in 10 other areas. Sophisticated security teams would bemoan Check Point&#8217;s lack of custom rules, while Palo Alto could offer its users better vulnerability and device control. Features aren&#8217;t always equal, of course. Palo Alto&#8217;s ability to detect unknown and offline attacks are a couple of the reasons why we think it offers the best security in the industry, while Check Point offers users great security at a compelling price point.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17897\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/12\/ESP_CPvsPA_01-06-2.png\" alt=\"\" width=\"2376\" height=\"619\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-06-2.png 2376w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-06-2-300x78.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-06-2-1024x267.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-06-2-768x200.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-06-2-1536x400.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-06-2-2048x534.png 2048w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-06-2-150x39.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-06-2-696x181.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-06-2-1068x278.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-06-2-1920x500.png 1920w\" sizes=\"(max-width: 2376px) 100vw, 2376px\" \/><\/p>\n<h2>The bottom line: Use cases<\/h2>\n<p>The differences between Check Point and Palo Alto are pretty clear, in our opinion. Check Point might be best for organizations with less sophisticated security skills and those on a budget. Palo Alto is for enterprises with the most critical security needs and the expertise to make the most of a high-end EDR product. Both products impressed us greatly.<\/p>\n<p>Palo Alto has a strong presence in organizations that already use Palo Alto products, while Check Point also doesn&#8217;t have the visibility it deserves. That&#8217;s a shame, because security this good should be looked at by all buyers.<\/p>\n<p>Here are our overall ratings on both products. They represent a blend of usability, features and security testing. For more info on our ratings system, see the <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/#methodology\">Methodology<\/a> section of our main EDR article.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17899\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/12\/ESP_CPvsPA_01-04-1.png\" alt=\"\" width=\"2376\" height=\"657\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-04-1.png 2376w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-04-1-300x83.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-04-1-1024x283.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-04-1-768x212.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-04-1-1536x425.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-04-1-2048x566.png 2048w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-04-1-150x41.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-04-1-696x192.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-04-1-1068x295.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-04-1-1920x531.png 1920w\" sizes=\"(max-width: 2376px) 100vw, 2376px\" \/><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6edc2bdde4-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6edc2bdde4\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6edc2bdde4\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6edc2bdde4\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6edc2bdde4\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6edc2bdde4\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6edc2bdde4\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This is one of those articles that&#8217;s fun to write because there is virtually no downside to these two endpoint detection and response (EDR) products. Check Point Software and Palo Alto Networks both offer stellar security for enterprises seeking better endpoint protection. The differences between the products lie in price, complexity and target markets. EDR [&hellip;]<\/p>\n","protected":false},"author":163,"featured_media":17892,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17],"tags":[28055,23445,2477],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[378,375],"class_list":["post-17826","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-edr","tag-endpoint-detection-and-response","tag-palo-alto-networks","b2b_audience-evaluation-and-selection","b2b_product-endpoint-security","b2b_product-security-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Check Point vs Palo Alto: Compare Top EDR Solutions<\/title>\n<meta name=\"description\" content=\"Check Point and Palo Alto Networks offer two of the best endpoint detection and response (EDR) tools on the market. Here&#039;s how they compare.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Check Point vs Palo Alto: Compare Top EDR Solutions\" \/>\n<meta property=\"og:description\" content=\"Check Point and Palo Alto Networks offer two of the best endpoint detection and response (EDR) tools on the market. Here&#039;s how they compare.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-07T21:27:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-02T04:36:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-05.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2376\" \/>\n\t<meta property=\"og:image:height\" content=\"1188\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Paul Shread\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Shread\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/\"},\"author\":{\"name\":\"Paul Shread\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\"},\"headline\":\"Check Point vs Palo Alto: Compare Top EDR Solutions\",\"datePublished\":\"2020-12-07T21:27:16+00:00\",\"dateModified\":\"2022-08-02T04:36:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/\"},\"wordCount\":858,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-05.png\",\"keywords\":[\"EDR\",\"endpoint detection and response\",\"Palo Alto Networks\"],\"articleSection\":[\"Products\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/\",\"name\":\"Check Point vs Palo Alto: Compare Top EDR Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-05.png\",\"datePublished\":\"2020-12-07T21:27:16+00:00\",\"dateModified\":\"2022-08-02T04:36:37+00:00\",\"description\":\"Check Point and Palo Alto Networks offer two of the best endpoint detection and response (EDR) tools on the market. Here's how they compare.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-05.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-05.png\",\"width\":2376,\"height\":1188},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Check Point vs Palo Alto: Compare Top EDR Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\",\"name\":\"Paul Shread\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"caption\":\"Paul Shread\"},\"description\":\"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Check Point vs Palo Alto: Compare Top EDR Solutions","description":"Check Point and Palo Alto Networks offer two of the best endpoint detection and response (EDR) tools on the market. Here's how they compare.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/","og_locale":"en_US","og_type":"article","og_title":"Check Point vs Palo Alto: Compare Top EDR Solutions","og_description":"Check Point and Palo Alto Networks offer two of the best endpoint detection and response (EDR) tools on the market. Here's how they compare.","og_url":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/","og_site_name":"eSecurity Planet","article_published_time":"2020-12-07T21:27:16+00:00","article_modified_time":"2022-08-02T04:36:37+00:00","og_image":[{"width":2376,"height":1188,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-05.png","type":"image\/png"}],"author":"Paul Shread","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Paul Shread","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/"},"author":{"name":"Paul Shread","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04"},"headline":"Check Point vs Palo Alto: Compare Top EDR Solutions","datePublished":"2020-12-07T21:27:16+00:00","dateModified":"2022-08-02T04:36:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/"},"wordCount":858,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-05.png","keywords":["EDR","endpoint detection and response","Palo Alto Networks"],"articleSection":["Products"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/","url":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/","name":"Check Point vs Palo Alto: Compare Top EDR Solutions","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-05.png","datePublished":"2020-12-07T21:27:16+00:00","dateModified":"2022-08-02T04:36:37+00:00","description":"Check Point and Palo Alto Networks offer two of the best endpoint detection and response (EDR) tools on the market. Here's how they compare.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-05.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/ESP_CPvsPA_01-05.png","width":2376,"height":1188},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-edr-solutions-compared\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Check Point vs Palo Alto: Compare Top EDR Solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04","name":"Paul Shread","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","caption":"Paul Shread"},"description":"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).","url":"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/17826"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/163"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=17826"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/17826\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/17892"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=17826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=17826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=17826"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=17826"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=17826"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=17826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}