CrowdStrike Falcon and CyberArk Identity are leading products in the cybersecurity field. CrowdStrike Falcon has a notable edge in endpoint protection due to its AI-driven features, while CyberArk Identity excels in identity and access management, particularly for complex environments.
Features: CrowdStrike Falcon provides in-depth endpoint visibility, AI-driven detection, and a cloud-native architecture that enables real-time threat analysis with minimal performance impact. CyberArk Identity is known for its robust identity management, privileged account control, and seamless integration with various security platforms.
Room for Improvement: CrowdStrike Falcon can enhance integration with other technologies, improve dashboard reports, and support legacy OS better. Improvements in its GUI and response times could augment user experience. CyberArk Identity should enhance its MDM features, improve UI, and scale its solutions for larger deployments.
Ease of Deployment and Customer Service: CrowdStrike Falcon offers flexibility across cloud environments and proactive customer service, though it can improve response times. CyberArk Identity supports varied environments, but its technical support could be quicker. Both products are commended for their quality customer services, but CrowdStrike offers a more consistent experience.
Pricing and ROI: CrowdStrike Falcon is priced at a premium due to its comprehensive EDR capabilities but offers significant ROI through reduced resource demands and threat mitigation. CyberArk Identity is perceived as expensive, reflecting its focus on identity management and security, offering substantial value for organizations with stringent access requirements. Both solutions deliver clear ROI through enhanced security and resource efficiency, with CrowdStrike noted for manpower savings and CyberArk valued for rigorous access management.
By the second month, we started seeing the benefits and achieved a return on investment.
We do not contact their technical support directly because we have a service agreement already in place with them with some dedicated and some non-dedicated resources.
The CrowdStrike team is very efficient; I would rate them ten out of ten.
They resolved the problem immediately after I reported it, on the same day, within one hour.
I have had conversations with them twice, and their technical support team was not that good.
There are times when there is a delay in handling my inquiries via email.
It has adequate coverage and is easy to deploy.
When it comes to scalability, it is entirely based on premium models according to demand.
We can use it on different phones and computers, demonstrating its scalability.
By addressing the issues I have highlighted, such as stability and making it bug and lag-free, along with improving customer support, they can enhance its scalability.
I have never seen instability in the CrowdStrike tool.
We are following N-1 versions across our environment, which is stable.
When you have it in the cloud, you have CyberArk every time you need it.
There is a timeout period that I do not like, requiring repeated verification.
With respect to stability, I find that stability is very good.
The biggest issue, which is the reason why we are transitioning from their product to SailPoint, is the overall user experience.
Simplifying the querying process, such as using double quote queries or directly obtaining logs based on IP addresses or usernames, would be beneficial.
Another concern is CrowdStrike's GUI. It changes annually, making it hard to work and find options.
Threat prevention should be their first priority.
Integration or deployment is extremely difficult for CyberArk Identity.
Something they could improve is the management of multifactor authentication.
To enhance the product, they can consider improving the user interface of the software.
They are lower than some of their competitors.
It is expensive compared to SentinelOne, but as the market leader, it is worth it.
I compared it with other products, and it does not require a heavy investment.
Regarding pricing, it can be quite a lot for small companies.
The pricing is acceptable.
Technically, the product does everything one would expect from an identity and access management platform.
I can investigate by accessing the customer's host based on the RTR environment and utilize host search to know details for the past seven days, including logins, processes, file installations, malicious processes, and network connections.
The machine learning behavior for anomaly detection is a valuable feature.
Real-time response (RTR) is a feature of EDR.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
It protects our platform, application, network, and infrastructure resources on any device.
It is the most powerful access management system.
Omada Identity is an identity governance and administration (IGA) solution designed to help organizations manage and secure digital identities and access across their IT environments. It focuses on enhancing security, compliance, and efficiency by automating identity management processes.
Omada Identity offers a robust set of features that streamline identity lifecycle management, access governance, and compliance reporting. It integrates with a wide range of IT systems, applications, and data sources, providing a centralized platform for managing user identities and access rights. The solution enables organizations to enforce security policies, ensure regulatory compliance, and reduce the risk of unauthorized access.
What are the critical features of Omada Identity?
What benefits or ROI items should users look for in the reviews when evaluating Omada Identity?
Omada Identity is widely adopted across various industries, including healthcare, finance, and manufacturing. In healthcare, it helps protect patient data and comply with regulations like HIPAA. In finance, it ensures compliance with SOX and other financial regulations. In manufacturing, it secures access to sensitive production data and intellectual property.
Pricing and licensing for Omada Identity are typically based on the number of users and the specific features required. Customer support is available through various channels, including online resources, support tickets, and professional services for implementation and customization.
In summary, Omada Identity is a comprehensive IGA solution that enhances security, compliance, and efficiency in managing digital identities and access.
CrowdStrike Falcon provides endpoint protection and threat intelligence using a cloud-based platform for real-time detection and response. Its minimal impact on system performance and ease of deployment are key benefits along with advanced logging and reporting for compliance and forensic analysis.
CrowdStrike Falcon is known for its efficacy in identifying malware, ransomware, and sophisticated cyber threats. The platform's cloud-native architecture and advanced AI capabilities ensure comprehensive endpoint visibility and rapid response times. Users appreciate the lightweight agent and seamless deployment process, along with detailed reporting features. Integration with security tools and efficient customer support are essential features, although some users highlight high pricing, occasional detection delays, and challenges with integration. Frequent alerts and the mobile app's performance are areas for improvement.
What are the key features of CrowdStrike Falcon?
What are the benefits or ROI of CrowdStrike Falcon?
In industries like finance, healthcare, and retail, CrowdStrike Falcon is often used for critical security due to its robust threat detection capabilities. Financial firms value its rapid response and detailed reporting for compliance, while healthcare providers appreciate the minimal system performance impact. Retailers benefit from its comprehensive endpoint visibility and integration with other security tools.
CyberArk Identity is a versatile identity management solution suitable for a wide range of enterprises. It is designed to enhance enterprise security and improve user experience. Its focus on security, compliance, and operational efficiency, combined with positive user feedback, makes it a strong contender in the identity management space.
CyberArk Identity offers a robust suite of features to manage user identities and access privileges. It focuses on securing access to resources across various environments, including cloud and on-premises applications. Its capabilities include single sign-on (SSO), multi-factor authentication (MFA), lifecycle management, and privileged access management. These features are engineered to streamline access control, enhance security, and ensure compliance with regulatory standards.
According to our user interviews, CyberArk Identity is praised for its reliability and user-friendly interface. IT professionals highlight the ease of integration with existing systems, while business executives appreciate the visibility it provides into access and identity management across the organization. Users also commend the responsive customer support, which is crucial for enterprise-level solutions.
IT Professionals found that CyberArk Identity's focus on multi-layered security significantly reduced the risk of data breaches and unauthorized access. With a centralized dashboard and automation features, you can streamline identity and access management tasks, saving time and reducing complexity. Finally, it helps meet various compliance requirements.
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.