Introducing G2.ai, the future of software buying.Try now

Compare OpenText Forensic (EnCase) and Palo Alto Cortex XSIAM

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
OpenText Forensic (EnCase)
OpenText Forensic (EnCase)
Star Rating
(13)4.3 out of 5
Market Segments
Small-Business (53.8% of reviews)
Information
Pros & Cons
Not enough data
Entry-Level Pricing
No pricing available
Learn more about OpenText Forensic (EnCase)
Palo Alto Cortex XSIAM
Palo Alto Cortex XSIAM
Star Rating
(473)4.3 out of 5
Market Segments
Enterprise (50.6% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Palo Alto Cortex XSIAM
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that while both OpenText EnCase Forensic and Palo Alto Cortex XSIAM have a solid star rating of 4.3, EnCase is particularly favored by small businesses, making it a more accessible option for smaller teams looking for forensic analysis tools.
  • Reviewers mention that Palo Alto Cortex XSIAM excels in ease of use with a score of 8.3 compared to EnCase's 7.6, indicating that users find Cortex XSIAM's interface more intuitive and user-friendly, which is crucial for teams with varying levels of technical expertise.
  • G2 users highlight that Cortex XSIAM outperforms EnCase in incident alerts, scoring 8.8 versus EnCase's 6.7. This suggests that Cortex XSIAM provides more timely and effective notifications, which is essential for rapid response in security incidents.
  • Users on G2 report that Cortex XSIAM also shines in anomaly detection with a score of 8.6 compared to EnCase's 6.4, indicating that Cortex XSIAM is better equipped to identify unusual patterns that could signify security threats.
  • Reviewers mention that both products have strong capabilities in incident reporting, but Cortex XSIAM's score of 8.7 versus EnCase's 8.1 suggests that users find Cortex XSIAM's reporting features more comprehensive and easier to generate, which aids in post-incident analysis.
  • Users say that while both products have solid support, Cortex XSIAM's quality of support score of 8.2 is higher than EnCase's 7.8, indicating that users feel more satisfied with the assistance and resources available for troubleshooting and guidance.
Pricing
Entry-Level Pricing
OpenText Forensic (EnCase)
No pricing available
Palo Alto Cortex XSIAM
No pricing available
Free Trial
OpenText Forensic (EnCase)
No trial information available
Palo Alto Cortex XSIAM
No trial information available
Ratings
Meets Requirements
8.0
9
8.6
326
Ease of Use
7.6
9
8.3
326
Ease of Setup
Not enough data
8.0
236
Ease of Admin
Not enough data
8.2
230
Quality of Support
7.8
9
8.2
315
Has the product been a good partner in doing business?
Not enough data
8.6
225
Product Direction (% positive)
8.7
9
8.8
309
Features by Category
Network Traffic Analysis (NTA)Hide 11 FeaturesShow 11 Features
Not enough data
8.6
112
Automation
Not enough data
8.6
69
Not enough data
8.0
72
Not enough data
8.1
74
Not enough data
8.7
78
Functionality
Not enough data
8.5
79
Not enough data
8.7
81
Not enough data
8.9
84
Not enough data
8.7
81
Incident Management
Not enough data
8.9
85
Not enough data
9.0
85
Not enough data
8.5
85
7.4
9
8.2
71
Analysis
7.4
9
8.0
48
7.2
9
7.8
49
7.7
8
7.9
48
7.1
7
8.2
49
7.2
6
8.5
23
Functionality
6.7
7
8.8
53
6.4
7
8.6
50
8.1
6
8.7
52
6.9
6
7.9
43
Remediation
8.1
6
8.7
52
7.8
6
8.1
50
8.0
5
8.5
49
Generative AI
Not enough data
6.3
9
Not enough data
6.5
9
Risk-Based Vulnerability ManagementHide 11 FeaturesShow 11 Features
Not enough data
8.3
22
Risk Analysis
Not enough data
8.7
21
Not enough data
9.5
22
Not enough data
8.5
21
Vulnerability Assesment
Not enough data
9.0
21
Not enough data
8.3
20
Not enough data
6.8
19
Not enough data
8.9
21
Automation
Not enough data
7.6
15
Not enough data
7.7
17
Not enough data
9.1
20
Not enough data
7.7
19
Cloud Security Monitoring and AnalyticsHide 13 FeaturesShow 13 Features
Not enough data
8.4
99
Activity Monitoring
Not enough data
8.5
72
Not enough data
8.2
67
Not enough data
7.9
65
Not enough data
8.5
71
Security
Not enough data
8.3
71
Not enough data
8.4
73
Not enough data
8.5
76
Administration
Not enough data
8.3
72
Not enough data
8.4
74
Not enough data
8.2
67
Agentic AI - Cloud Security Monitoring and Analytics
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
Not enough data
8.3
18
Detection & Response
Not enough data
8.1
16
Not enough data
8.3
16
Not enough data
9.3
16
Not enough data
8.9
16
Management
Not enough data
8.3
17
Not enough data
7.8
17
Not enough data
7.9
17
Analytics
Not enough data
8.4
16
Not enough data
7.9
16
Not enough data
8.4
16
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Services - Extended Detection and Response (XDR)
Not enough data
Not enough data
User and Entity Behavior Analytics (UEBA)Hide 11 FeaturesShow 11 Features
Not enough data
8.4
100
Agentic AI - User and Entity Behavior Analytics (UEBA)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
Not enough data
8.4
72
Not enough data
8.3
73
Not enough data
8.0
71
Not enough data
8.7
70
Detection
Not enough data
8.4
72
Not enough data
8.6
73
Not enough data
8.9
73
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Services - Endpoint Detection & Response (EDR)
Not enough data
Not enough data
Not enough data
8.0
190
Response
Not enough data
7.8
139
Not enough data
7.9
128
Not enough data
7.5
129
Not enough data
8.3
145
Records
Not enough data
8.8
144
Not enough data
8.4
152
Not enough data
8.2
150
Management
Not enough data
8.7
154
Not enough data
8.2
143
Not enough data
8.2
135
Generative AI
Not enough data
7.2
19
Not enough data
7.3
19
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Information and Event Management (SIEM)Hide 14 FeaturesShow 14 Features
Not enough data
8.4
239
Network Management
Not enough data
8.8
183
Not enough data
8.0
174
Not enough data
8.8
188
Incident Management
Not enough data
8.8
190
Not enough data
8.1
176
Not enough data
8.5
182
Security Intelligence
Not enough data
8.4
179
Not enough data
7.8
164
Not enough data
8.3
172
Not enough data
8.3
167
Agentic AI - Security Information and Event Management (SIEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Orchestration, Automation, and Response (SOAR)Hide 11 FeaturesShow 11 Features
Not enough data
7.9
26
Automation
Not enough data
7.6
23
Not enough data
7.8
23
Not enough data
7.8
22
Not enough data
7.8
24
Orchestration
Not enough data
8.0
22
Not enough data
8.0
24
Not enough data
7.6
23
Not enough data
8.0
23
Response
Not enough data
8.2
22
Not enough data
7.8
23
Not enough data
8.2
22
Data Breach NotificationHide 5 FeaturesShow 5 Features
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
OpenText Forensic (EnCase)
OpenText Forensic (EnCase)
Palo Alto Cortex XSIAM
Palo Alto Cortex XSIAM
OpenText Forensic (EnCase) and Palo Alto Cortex XSIAM are categorized as Digital Forensics
Reviews
Reviewers' Company Size
OpenText Forensic (EnCase)
OpenText Forensic (EnCase)
Small-Business(50 or fewer emp.)
53.8%
Mid-Market(51-1000 emp.)
30.8%
Enterprise(> 1000 emp.)
15.4%
Palo Alto Cortex XSIAM
Palo Alto Cortex XSIAM
Small-Business(50 or fewer emp.)
21.2%
Mid-Market(51-1000 emp.)
28.2%
Enterprise(> 1000 emp.)
50.6%
Reviewers' Industry
OpenText Forensic (EnCase)
OpenText Forensic (EnCase)
Computer & Network Security
30.8%
Law Enforcement
23.1%
Information Technology and Services
15.4%
Health, Wellness and Fitness
7.7%
Government Relations
7.7%
Other
15.4%
Palo Alto Cortex XSIAM
Palo Alto Cortex XSIAM
Computer & Network Security
25.7%
Information Technology and Services
18.5%
Banking
11.0%
Financial Services
7.0%
Computer Software
3.5%
Other
34.4%
Alternatives
OpenText Forensic (EnCase)
OpenText Forensic (EnCase) Alternatives
Magnet Forensics
Magnet Forensics
Add Magnet Forensics
FTK Forensic Toolkit
FTK Forensic Toolkit
Add FTK Forensic Toolkit
Autopsy
Autopsy
Add Autopsy
Cellebrite
Cellebrite
Add Cellebrite
Palo Alto Cortex XSIAM
Palo Alto Cortex XSIAM Alternatives
Wiz
Wiz
Add Wiz
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Datadog
Datadog
Add Datadog
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
Discussions
OpenText Forensic (EnCase)
OpenText Forensic (EnCase) Discussions
Monty the Mongoose crying
OpenText Forensic (EnCase) has no discussions with answers
Palo Alto Cortex XSIAM
Palo Alto Cortex XSIAM Discussions
How can I study more on IBM Security QRadar?
1 Comment
NK
Just go directly to IBM official website there you can find alll the related documents and as well as you can sign up for their IBM security learning portal...Read more
How do I monitor app resource usage on the app host
1 Comment
Jeremy G.
JG
Hi Vinnesh! There are 2 ways to monitor the app usage on the app host, both of which are downloadable apps on the IBM Security App Exchange. QRadar...Read more
How to build visualization with standard deviations?
1 Comment
Mutaz A.
MA
NothingRead more