We performed a comparison between CrowdStrike Falcon and Cynet based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: CrowdStrike Falcon stands out for its minimal impact on system performance, optimal resource utilization, and precise detection of threats. Cynet offers strong ransomware protection and an intuitive interface. CrowdStrike Falcon could benefit from adding a sandbox feature and more detailed firewall management options. Cynet needs to expand device support and add customization options. Users suggest improving network monitoring and strengthening integration with other tools.
Service and Support: CrowdStrike Falcon's customer service has been commended for its promptness and assistance. Cynet's customer service is consistently lauded for its excellence. They have a dedicated support team that is available round the clock, and they also have a contingency plan for urgent incidents.
Ease of Deployment: CrowdStrike Falcon's setup is considered to be simple and efficient, with varying deployment times ranging from a few days to a month. While there may be some challenges during installation, they are generally manageable. Cynet’s setup is highly efficient, with the ability to configure thousands of devices quickly.
Pricing: Some users find CrowdStrike Falcon costly and think the price should be lowered to make it more competitive. Customers generally view Cynet's pricing and licensing experience as affordable and a good value for its features.
ROI: CrowdStrike Falcon offers cost savings by decreasing the required number of engineers and eliminating the necessity for onsite servers. Cynet yields an excellent ROI by preventing cyberattacks and safeguarding sensitive data.
Comparison Results: Our users prefer CrowdStrike Falcon because it efficiently uses system resources and offers a comprehensive analysis of endpoint devices. Users appreciate its accuracy, behavior analysis, and detection capabilities. CrowdStrike Falcon offers more features such as ransomware protection and added antivirus defense.
"The Endpoint Manager is incredible; it has a very straightforward interface and is exceedingly easy to use. Pulling out and deploying different tags or resources is a simple task across various departments with different levels of security. The notifications are also simple and satisfying; it's great to see the bubble informing us which devices are compliant and which are waiting to update."
"We also use Microsoft Sentinel, Defender for Cloud, Defender for Identity, and Microsoft Defender for Cloud Apps. They are all integrated and it was very easy to integrate them. In my experience with the integrations, it was just a click of a button and things were integrated. It's just a button."
"The unified view of the threat landscape on a central dashboard is the most valuable feature."
"It's a great threat intelligence source for us, providing alerts for things it detects on the network and on the machines. We've used it often when there is a potential incident to see what was done on a computer. That works quite nicely because you can see everything that the user has done..."
"I like 365 Defender's advanced threat hunting. The dashboard is user-friendly with templates for site policies, etc. The most important use case is evaluating the risk links and applications."
"I like Defender XDR's automation capabilities. XDR isn't automated by default, but you can automate it to respond. If an attack is performed anywhere within the organization, you can isolate that instance from the network. This is what I can figure out for it. When integrated with Sentinel, you can set up playbooks to automate all the alerts gathered on Sentinel from different Microsoft solutions. Sentinel has a wider range of capabilities than XDR."
"Having a single pane of glass for all Microsoft security services makes everything much easier. A security analyst can go to a single portal and see everything in one view. The integration of everything into one portal is a huge benefit."
"From the perspective of Microsoft 365 XDR, the main benefit is a single, centralized dashboard offering the holistic visibility organizations crave."
"The scalability is good."
"Scalability hasn't been an issue for us."
"Falcon's best feature is its detection and blocking of threats."
"The initial setup is very simple."
"It's very easy to set up."
"The threat intelligence is the most valuable feature."
"Cyberattack detection is very good. We use it for detecting different vulnerabilities, such as ransomware, virus, and malware. It is a good product today when compared to Symantec that we used previously."
"The EDR and XDR features have been most valuable."
"The feature I find most valuable, is the reality graphical user interface."
"Cynet's most valuable features are laptop and server performance, internal network monitoring, and external firewall lock management."
"We are using almost all of the features and we find it quite good overall."
"The interface is exceptionally clear and easy to understand."
"The product is very easy to use. Customers really appreciate that."
"The feature that I have found most valuable is that the configuration and the usage of the product are not so complicated. For people responsible for using this infrastructure for the first line of workstation monitoring, it's quite easy to use."
"The visibility it gives is excellent."
"Advanced detection and protection against ransomware paired with SOC monitoring are the most valuable features. They have 24/7 SOC monitoring and file activity. It is a very robust tool."
"The patching capability should be there. Patching is something that you cannot do even though you see the vulnerabilities present in your environment. For patching, you have to depend on another solution."
"For some scenarios, it provides good visibility into threats, and for some scenarios, it doesn't. For example, sometimes the URLs within the emails have destinations, and you do get a screenshot and all further details, but it's not always the case. It would be good if they did a better job of enabling that for all the emails that they identified as malicious. When you get an email threat, you can go into the email and see more details, but the URL destination feature doesn't always show you a screenshot of the URL in that email. It also doesn't always give you the characteristics relating to that URL. It would be quite good if the information is complete where it says that we identified this URL, and this is what it looks like. There should be some threat intel about it. It should give you more details."
"The management features could be improved, particularly in terms of better integration with Intune, Microsoft's cloud-based management solution."
"The Defender agent itself is more compatible with Windows 10 and Windows 11. Other than these two lines, there are so many compatibility issues. Security is not only about Microsoft. The core technical aspects of it are quite good, but it would be good if they can better support non-Microsoft solutions in terms of putting the agents directly into VMware and other virtualization solutions. There should be more emphasis on RHEL and other operating systems that we use, other than Windows, in the server category."
"Improving scalability, especially for very large tenants, could be beneficial for Microsoft Defender XDR."
"Correctly updated records are the most significant area for improvement. There have been times when we were notified of a required fix; we would carry out the fix and confirm it but still get the same notification a week later. This seems to be a delay in records being updated and leads to false reporting, which is something that needs to be fixed."
"The licensing is a nightmare and has room for improvement."
"The cost can be high if you want to build custom license packages. Another area for improvement is the policies. In Azure, we need to implement policies in JSON format, but in 365 Defender 365, it would be helpful to use a different format so we can customize the platform."
"Falcon could include more integrative features."
"The detection time has room for improvement."
"We can do a threat analysis of any machine at any time, but that threat analysis is very limited."
"The console is not user-friendly or visually appealing and has room for improvement."
"It does take more time to scan than other solutions."
"CrowdStrike Falcon by itself does not supply in-depth reporting."
"To simplify the budgeting process for our clients, CrowdStrike should consider offering bundled packages that include essential features."
"They should provide us with good visibility for everything."
"An administration feature will be useful for Cynet."
"Linux servers are not supported."
"The reporting is a little weak and could be improved. The other downside is that Cynet does not use the local time zone. It's based off of Greenwich Mean Time."
"SIEM - Although with their Centralised Log Management Cynet has created the basis for SIEM functionality, this is to be expanded in the near future."
"We'd like something that makes it easier to manage specific points."
"I think the technical support could be better."
"Management of the console could be simplified and made more user-friendly because right now it's not very easy to use."
"Cynet fails to deploy the same technology in mobile devices."
CrowdStrike Falcon is ranked 1st in Extended Detection and Response (XDR) with 107 reviews while Cynet is ranked 9th in Extended Detection and Response (XDR) with 35 reviews. CrowdStrike Falcon is rated 8.8, while Cynet is rated 8.8. The top reviewer of CrowdStrike Falcon writes "Easy to set up with good behavior-based analysis but needs a single-click recovery option". On the other hand, the top reviewer of Cynet writes "Provides memory protection, device control, and vulnerability management". CrowdStrike Falcon is most compared with Darktrace, Microsoft Defender for Endpoint, Trend Micro Deep Security, Trend Vision One and SentinelOne Singularity Complete, whereas Cynet is most compared with SentinelOne Singularity Complete, ESET Endpoint Protection Platform, Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks and Stellar Cyber Open XDR. See our CrowdStrike Falcon vs. Cynet report.
See our list of best Extended Detection and Response (XDR) vendors, best Endpoint Protection Platform (EPP) vendors, and best Endpoint Detection and Response (EDR) vendors.
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.