Introducing G2.ai, the future of software buying.Try now

Compare Cortex Cloud and Trend Vision One

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Cortex Cloud
Cortex Cloud
Star Rating
(111)4.1 out of 5
Market Segments
Enterprise (38.5% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about Cortex Cloud
Trend Vision One
Trend Vision One
Star Rating
(224)4.7 out of 5
Market Segments
Enterprise (54.1% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Trend Vision One
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Cortex Cloud excels in its user-friendly interface, with many users appreciating its quick setup and automation features that streamline daily tasks. One user noted, "I like Cortex Cloud because it is easy to use with quick set up and its automation makes everyday tasks faster and smoother."
  • Users say that Trend Vision One stands out for its robust threat protection capabilities, particularly in ransomware and vulnerability protection. Reviewers have highlighted how these features have significantly improved their cybersecurity posture, making it a strong choice for organizations focused on security.
  • According to verified reviews, Cortex Cloud is praised for its ability to centralize data and analytics, which simplifies performance monitoring and reporting. Users have mentioned that this integration helps them make better decisions more efficiently, showcasing its effectiveness in data management.
  • Reviewers mention that Trend Vision One effectively consolidates various security layers into a single platform, enhancing overall security management. One user appreciated how it brings together different security measures, making it easier to manage and respond to threats.
  • G2 reviewers highlight that while Cortex Cloud has a solid foundation for security operations, it sometimes faces challenges in meeting specific workflow needs, with some users noting configuration difficulties. This suggests that while it is user-friendly, there may be room for improvement in customization.
  • Users report that Trend Vision One's integration of dark web sensors is a unique feature that aids in detecting account compromises, providing an additional layer of security that many find invaluable. This capability sets it apart in the competitive landscape of cybersecurity solutions.
Pricing
Entry-Level Pricing
Cortex Cloud
No pricing available
Trend Vision One
No pricing available
Free Trial
Cortex Cloud
Free Trial is available
Trend Vision One
Free Trial is available
Ratings
Meets Requirements
8.3
98
8.9
191
Ease of Use
7.7
100
8.6
194
Ease of Setup
7.6
89
8.8
155
Ease of Admin
7.9
52
8.7
155
Quality of Support
7.9
94
8.7
185
Has the product been a good partner in doing business?
8.0
48
9.0
156
Product Direction (% positive)
8.8
95
9.7
189
Features by Category
Cloud Workload Protection PlatformsHide 10 FeaturesShow 10 Features
8.7
10
Not enough data
Management
7.9
7
Not enough data
8.3
7
Not enough data
8.1
7
Not enough data
Operations
8.6
7
Not enough data
8.8
7
Not enough data
9.4
6
Not enough data
Security Controls
8.9
6
Not enough data
8.5
8
Not enough data
9.0
7
Not enough data
9.2
6
Not enough data
8.0
16
Not enough data
Administration
8.1
14
Not enough data
7.7
14
Not enough data
8.3
14
Not enough data
8.1
14
Not enough data
Monitoring
8.1
14
Not enough data
8.1
14
Not enough data
7.9
14
Not enough data
Protection
7.9
14
Not enough data
8.3
14
Not enough data
7.7
14
Not enough data
7.7
14
Not enough data
Not enough data
Not enough data
Network Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
8.4
39
Not enough data
Security
8.5
37
Not enough data
8.2
36
Not enough data
8.0
34
Not enough data
8.1
36
Not enough data
Compliance
8.5
37
Not enough data
8.3
36
Not enough data
8.3
36
Not enough data
Administration
8.7
36
Not enough data
8.6
35
Not enough data
8.5
36
Not enough data
8.7
41
Not enough data
Data Protection
8.8
36
Not enough data
9.0
39
Not enough data
8.9
37
Not enough data
8.8
38
Not enough data
9.0
36
Not enough data
Analysis
8.8
39
Not enough data
8.9
38
Not enough data
8.6
38
Not enough data
Administration
8.3
39
Not enough data
8.4
37
Not enough data
8.2
37
Not enough data
Software Composition AnalysisHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Functionality - Software Composition Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Effectiveness - Software Composition Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk-Based Vulnerability ManagementHide 11 FeaturesShow 11 Features
7.8
6
Not enough data
Risk Analysis
8.3
5
Not enough data
7.8
6
Not enough data
8.1
6
Not enough data
Vulnerability Assesment
8.3
5
Not enough data
7.5
6
Not enough data
8.0
5
Not enough data
7.0
5
Not enough data
Automation
7.3
5
Not enough data
7.0
5
Not enough data
8.3
5
Not enough data
8.3
5
Not enough data
7.7
8
Not enough data
API Management
8.3
8
Not enough data
7.7
8
Not enough data
7.9
8
Not enough data
6.7
8
Not enough data
Security Testing
7.9
8
Not enough data
7.7
8
Not enough data
6.3
5
Not enough data
Security Management
8.1
7
Not enough data
7.6
7
Not enough data
8.3
7
Not enough data
Network Detection and Response (NDR)Hide 11 FeaturesShow 11 Features
Not enough data
8.3
10
Analysis
Not enough data
8.5
9
Not enough data
8.5
9
Not enough data
7.2
9
Not enough data
7.0
9
Response
Not enough data
8.9
9
Not enough data
8.7
9
Not enough data
8.5
9
Detection
Not enough data
8.1
9
Not enough data
8.9
9
Not enough data
9.1
9
Services - Network Detection and Response (NDR)
Not enough data
Not enough data
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
Not enough data
8.7
171
Detection & Response
Not enough data
8.7
157
Not enough data
9.0
161
Not enough data
8.9
157
Not enough data
9.1
167
Management
Not enough data
8.8
152
Not enough data
8.6
151
Not enough data
9.0
154
Analytics
Not enough data
9.1
159
Not enough data
8.6
155
Not enough data
8.7
150
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
8.0
10
Not enough data
7.6
9
Not enough data
8.0
9
Services - Extended Detection and Response (XDR)
Not enough data
9.4
6
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
7.7
24
Not enough data
Configuration
7.7
20
Not enough data
7.6
21
Not enough data
7.7
21
Not enough data
7.8
18
Not enough data
7.1
20
Not enough data
Visibility
8.2
22
Not enough data
7.5
21
Not enough data
Vulnerability Management
7.8
18
Not enough data
7.9
21
Not enough data
8.0
19
Not enough data
7.8
21
Not enough data
Cloud Infrastructure Entitlement Management (CIEM)Hide 8 FeaturesShow 8 Features
8.5
10
Not enough data
Access control - Cloud Infrastructure Entitlement Management (CIEM)
8.7
9
Not enough data
8.5
10
Not enough data
8.7
10
Not enough data
8.1
8
Not enough data
Monitoring - Cloud Infrastructure Entitlement Management (CIEM)
9.0
10
Not enough data
7.8
10
Not enough data
Auditing - Cloud Infrastructure Entitlement Management (CIEM)
8.7
10
Not enough data
8.3
10
Not enough data
7.3
6
Not enough data
AI Compliance
7.5
6
Not enough data
6.7
6
Not enough data
8.1
6
Not enough data
Risk Management & Monitoring
6.4
6
Not enough data
7.8
6
Not enough data
AI Lifecycle Management
7.2
6
Not enough data
Access Control and Security
7.2
6
Not enough data
Collaboration and Communication
7.5
6
Not enough data
Agentic AI - AI Governance Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud-Native Application Protection Platform (CNAPP)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Security - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Exposure Management PlatformsHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Generative AI - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Risk Identification and Assessment - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring and Integration - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity and Access Management - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Application Visibility - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting and Policies - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
9.3
5
Services - Endpoint Detection & Response (EDR)
Not enough data
9.3
5
Data Security Posture Management (DSPM)Hide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Discovery & Classification - Data Security Posture Management (DSPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Prioritization - Data Security Posture Management (DSPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Remediation & Governance - Data Security Posture Management (DSPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Security Posture Management (AI-SPM) ToolsHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Functionality - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Assessment - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Detection and Response (CDR)Hide 4 FeaturesShow 4 Features
7.7
9
Not enough data
Agentic AI - Cloud Detection and Response (CDR)
7.8
9
Not enough data
7.0
9
Not enough data
8.3
8
Not enough data
Services - Cloud Detection and Response (CDR)
7.5
8
Not enough data
Reviews
Reviewers' Company Size
Cortex Cloud
Cortex Cloud
Small-Business(50 or fewer emp.)
30.3%
Mid-Market(51-1000 emp.)
31.2%
Enterprise(> 1000 emp.)
38.5%
Trend Vision One
Trend Vision One
Small-Business(50 or fewer emp.)
11.0%
Mid-Market(51-1000 emp.)
34.9%
Enterprise(> 1000 emp.)
54.1%
Reviewers' Industry
Cortex Cloud
Cortex Cloud
Information Technology and Services
17.4%
Computer & Network Security
11.0%
Computer Software
9.2%
Consulting
7.3%
Information Services
4.6%
Other
50.5%
Trend Vision One
Trend Vision One
Information Technology and Services
19.1%
Computer & Network Security
8.1%
Banking
6.2%
Hospital & Health Care
5.7%
Government Administration
4.8%
Other
56.0%
Alternatives
Cortex Cloud
Cortex Cloud Alternatives
Wiz
Wiz
Add Wiz
Orca Security
Orca Security
Add Orca Security
Microsoft Defender for Cloud
Microsoft Defender for Cloud
Add Microsoft Defender for Cloud
FortiCNAPP
FortiCNAPP
Add FortiCNAPP
Trend Vision One
Trend Vision One Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Add SentinelOne Singularity Endpoint
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
Microsoft Defender XDR
Microsoft Defender XDR
Add Microsoft Defender XDR
Discussions
Cortex Cloud
Cortex Cloud Discussions
Monty the Mongoose crying
Cortex Cloud has no discussions with answers
Trend Vision One
Trend Vision One Discussions
How can Trend Micro XDR solve your detection and response challenges?
1 Comment
Karl F.
KF
If your SOC is young and doesn't have the ability to investigate threats themselves, a managed solution is available from Trend (Trend MXDR).Read more
What does Trend Micro XDR allow you to do?
1 Comment
KT
TrendMicro XDR combines a Whole lot of analysis and management features its different module provides a comprehensive range of things to do such as darkweb...Read more
What is Trend Micro Vision One (XDR) used for?
1 Comment
AF
XDR (Extended Detection and Response) automatically collects and correlates data across multiple layers of security: email, endpoint, server, cloud workload,...Read more