We performed a comparison between Code42 Incydr and Elastic Security based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Detection and Response (EDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It is stable and scalable."
"The solution was relatively easy to deploy."
"Fortinet FortiEDR's scalability is quite good, and you can add licenses to the solution."
"The stability is very good."
"The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration."
"The product detects and blocks threats and is more proactive than firewalls."
"Fortinet has helped free up around 20 percent of our staff's time to help us out."
"The product's initial setup phase is very easy."
"Backup and recovery have been great, but I love having the ability to keep the hybrid type build which they offer."
"Works in the background and users are able to perform restores."
"The solution is very stable. Very rarely do we have any issues with it. We don't have to deal with bugs or glitches. It doesn't crash or freeze. We find it to be reliable."
"It has quite a bit of flexibility in configuring backup sets."
"It required very little ongoing maintenance once setup."
"It had the ability to preseed by sending in a data drive and could restore by sending the user a data drive."
"t has a very user friendly status bar with common errors and has logs built in to the console so we can review the issues or status of CrashPlan."
"Risk factors can be adjusted for all intricate details."
"Elastic Security is very customizable, and the dashboards are very easy to build."
"The visualization is very good."
"The solution has a good community surrounding it for lots of helpful documentation for troubleshooting purposes."
"The most valuable thing is that this solution is widely used for work management and research. It's easy to jump into the security use case with the same technology."
"Enables monitoring of application performance and the ability to predict behaviors."
"The indexes allow you to get your results quickly. The filtering and log passing is the advantage of Logstash."
"The solution is quite stable. The performance has been good."
"Just the ability to do a lot more than just up-down is nice, which a lot of people take for granted."
"Cannot be used on mobile devices with a secure connection."
"Integration with Azure and SaaS provisioning tools could improve Fortinet FortiEDR."
"The solution is not user-friendly."
"FortiEDR can be improved by providing more detailed reporting."
"I haven't seen the use of AI in the solution."
"Intelligence aspects need improvement"
"The support needs improvement."
"The dashboard isn't easy to access and manage."
"Java, please get rid of Java."
"The application, written in Java, required far more system resources on a Client than other solutions."
"Due to recent changes that effectively abandoned an entire segment of their user base, I no longer trust nor can recommend Code42 products."
"I think one we can improve is the compression."
"There doesn't seem to be any feature that is lacking."
"You can't always filter out data that you'd like to."
"In a couple of instances, we had a little bit of trouble in getting it distributed throughout the organization. We ultimately managed to do it, but they talk about it being a pretty simple process, and it became a little laborious. It would just turn away. The agents were not being distributed. It was just churning and churning and churning. When we were looking for specific categories of data, it was getting bogged down, but that was not even so much Code42, although some of it was their issue."
"What I think could be improved is how I get support."
"In terms of improvement, there could be more automation in responding to and evaluating detections."
"With Elastic Security, the challenge arises from the fact that there is a learning curve in relation to queries and understanding the query language provided to extract usable data."
"Anything that supports high availability or ease of deployment in a highly available environment would help to improve this solution."
"The problem with ELK is it's difficult to administer. When you have a problem, it can be very, very difficult to rebuild indexes."
"The solution could also use better dashboards. They need to be more graphical, more matrix-like."
"We are paying dearly for the guy who is working on the ELK Stack. That knowledge is quite rare and hard to come by. For difficulty and availability of resources, I would rate it a five out of 10."
"The interface could be more user friendly because it is sometimes hard to deal with."
"It would be better if Elastic Security had less storage for data. My customers do not like this. Other vendors have local support in different countries, but Elastic Security doesn't. I would like to have Operational Technology (OT) security in the next release."
Code42 Incydr is ranked 42nd in Endpoint Detection and Response (EDR) with 78 reviews while Elastic Security is ranked 16th in Endpoint Detection and Response (EDR) with 59 reviews. Code42 Incydr is rated 9.0, while Elastic Security is rated 7.6. The top reviewer of Code42 Incydr writes "Provides comprehensive visibility and protection, helps in identifying the gaps in security, and comes with excellent onboarding support". On the other hand, the top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". Code42 Incydr is most compared with Threat Detection, Investigation & Response (TDIR) Platform, Microsoft Purview Data Loss Prevention, Morphisec, Qualys Multi-Vector EDR and Backup and Restore for SharePoint & Microsoft Office 365, whereas Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, IBM Security QRadar and Microsoft Defender for Endpoint. See our Code42 Incydr vs. Elastic Security report.
See our list of best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.