Try our new research platform with insights from 80,000+ expert users

CrowdStrike Falcon vs N-able EDR comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 24, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CrowdStrike Falcon
Ranking in Endpoint Detection and Response (EDR)
1st
Average Rating
8.6
Reviews Sentiment
7.4
Number of Reviews
122
Ranking in other categories
Security Information and Event Management (SIEM) (6th), Endpoint Protection Platform (EPP) (3rd), Identity Management (IM) (6th), Threat Intelligence Platforms (2nd), Active Directory Management (2nd), Extended Detection and Response (XDR) (1st), Attack Surface Management (ASM) (1st), Ransomware Protection (1st), Identity Threat Detection and Response (ITDR) (3rd), AI-Powered Cybersecurity Platforms (1st)
N-able EDR
Ranking in Endpoint Detection and Response (EDR)
57th
Average Rating
0.0
Reviews Sentiment
9.0
Number of Reviews
2
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of January 2025, in the Endpoint Detection and Response (EDR) category, the mindshare of CrowdStrike Falcon is 16.9%, up from 12.8% compared to the previous year. The mindshare of N-able EDR is 0.4%, down from 0.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR)
 

Featured Reviews

Chintan-Vyas - PeerSpot reviewer
Easy to set up with good behavior-based analysis but needs a single-click recovery option
Most organizations are currently looking for a scheduled scan to meet their compliance needs. Other players like Symantec and Trend Micro, FireEye, et cetera, are still providing the signature-based regular scheduled scans also, which is not available in CrowdStrike. That is one parameter that we feel should be there in CrowdStrike. CrowdStrike is only working on the dynamic or the files under execution. CrowdStrike is not scanning the static files. The product could be more accurate in terms of performance. We'd like to have a single-click recovery option. With some machines getting corrupted by malware, we need an easy way to start with a blank slate if things happen. That one feature should be there in the EDR.
Yazan Albaw - PeerSpot reviewer
N-able EDR SentinelOne delivers advanced endpoint protection through real-time threat detection, automated response, and comprehensive visibility to safeguard against cyber threats.
N-able EDR SentinelOne is renowned for its exceptional detection and protection capabilities, ranked number one by Gartner and MITRE ATT&CK. It offers robust defense against various threats, including malware, fileless attacks, phishing, and insider threats. The solution excels in identifying suspicious behavior and promptly notifying engineers of potential threats. A key feature is its auto-response capability. You can configure automatic responses to threats, which significantly reduces the time and effort required to manage incidents. Enhanced by machine learning, these automated responses are both efficient and adaptive. Additionally, N-able EDR integrates seamlessly with RMM (Remote Monitoring and Management), allowing us to monitor EDR performance, detect failures, and oversee network performance from a single, unified dashboard. This integration streamlines management and enhances overall efficiency.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature of CrowdStrike Falcon is its accuracy. That's very important for me. False-positive are very bad for everyone. As we are a financial institution, it's even worse. I like Falcon because it's very accurate."
"The feature I like the most is the solution's detection."
"CrowdStrike Falcon's most valuable feature is the fact that it's not getting in the way of our workforce and their workflow."
"The solution can scale easily."
"I like the overall reports of this solution. They are crisp, and to the point."
"The key aspect of CrowdStrike Falcon is its behavioral detection approach."
"The most useful feature is that we do not need to install or keep signature files. Regular scanning that consumes a lot of computer resources is not needed."
"I like the vulnerability assessment and proactive hunting features of CrowdStrike Falcon."
"It provides visibility and a storyline to track the virus or malware's activities, showing infected processes and changes made."
"The most valuable features are the rollback feature, it's important for us. The AI models and are good."
 

Cons

"We can do a threat analysis of any machine at any time, but that threat analysis is very limited."
"The price is too high."
"The performance could be better."
"It is cloud-based, and this does make some weary of the data being held on the cloud. Privacy requirements must be taken into account."
"I would like them to improve the correlation of data in the search algorithms. When we run an investigation, malware, phishing, etc., I want to look at multiple endpoints at once to correlate that data to see the likenesses, e.g., how are they not alike or what systems and processes are running across those systems? I don't want to have to run the same search in their Spotlight module five, 10, 15, or 100 times to get 100 different results, copy that data out, and then correlate it on my own. In a very simple way, I want to be able to load up a comma-delimited list giving me the spotlight data on these X amount of hosts, letting me search for it quickly. We have had to go back to CrowdStrike, and say, "Our search are taking far too long for even one host." They did bump up the cores and that did improve performance, but it is still kind of slow to get that Spotlight data. That is probably our biggest pain point. I think that needs some help. I understand this kind of information access is probably not the easiest thing to do. It is probably a big ask depending on how their back-end is setup."
"CrowdStrike Suites and the way that it bundles things can be a bit challenging. It should be easier to integrate with the other stuff that they sell or be included with what they sell. We have one piece, then they are talking about another piece on vulnerability management all of the sudden, and we don't own that piece. We can see it in the console, but nothing shows up. It simply appears within the tool as an option, but we can't use it without purchasing it."
"It would be nice if the dashboard had some more information upfront, and looked a little better."
"Dashboard creation is one of the areas for improvement in CrowdStrike Falcon. Sometimes, management asks for a custom dashboard, so my team has to collect data from CrowdStrike Falcon, integrate that in Splunk, then create the dashboard in Splunk. The Splunk dashboard is more elaborate, so the CrowdStrike Falcon dashboard needs improvement. Another area for improvement in the tool is the malware detection report, as it needs to be more detailed and include some graphics so that if you want to present that data in a nutshell, it's easier to do. For example, the report should consist of some graphical representation that shows a month's worth of data. In terms of an additional feature I'd like CrowdStrike Falcon to have, it's the device posture assessment feature that detects the device posture within the network. Whichever device connects to the corporate network, my company should be able to analyze the device posture. Then there should be communication with the network, which means that as soon as a device connects, CrowdStrike Falcon can assess the device posture, detect its corporate asset, and decide whether it should be allowed on the network."
"We have a lot of false positives we see in the dashboard. I think this is the only problem we are facing."
"I would like to see them add support for both Android and iOS smartphones."
 

Pricing and Cost Advice

"The more endpoints an organization adds the cheaper the cost."
"The pricing is not bad. It's on the higher end of the market, but you get what you pay for."
"The price is fixed with no room for negotiation."
"The solution isn't very costly; it's affordable."
"The price is high in comparison to similar brands."
"We pay 40,000 dirhams per 100 users."
"The solution's pricing is great for us."
"Purchasing the product through the AWS Marketplace is just a click away. Since we were using the on-premise version of the product, we continued on the cloud by purchasing it through the AWS Marketplace."
"The pricing is average."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
831,158 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Financial Services Firm
10%
Manufacturing Company
9%
Government
7%
Computer Software Company
15%
Comms Service Provider
7%
University
6%
Construction Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions that are very scalable, secure, and user-friendly. Cortex XDR by Palo Alto offers ...
How does Crowdstrike Falcon compare with Darktrace?
Both of these products perform similarly and have many outstanding attributes. CrowdStrike Falcon offers an amazing user interface that makes setup easy and seamless. CrowdStrike Falcon offers a cl...
How does Microsoft Defender for Endpoint compare with Crowdstrike Falcon?
The CrowdStrike solution delivers a lot of information about incidents. It has a very light sensor that will never push your machine hardware to "test", you don't have the usual "scan now" feature ...
What needs improvement with N-able EDR?
While N-able EDR SentinelOne excels in protecting endpoints from a wide range of cybersecurity threats, it currently does not support mobile devices. Adding support for both Android and iOS smartph...
What is your primary use case for N-able EDR?
Our customers use N-able EDR SentinelOne to safeguard servers and workstations from cybersecurity threats, including malicious software, ransomware, and malware. EDR is no longer a luxury but a nec...
What advice do you have for others considering N-able EDR?
I would rate N-able EDR SentinelOne a ten out of ten for its outstanding performance and capabilities. It effectively supports Windows, Linux, and macOS, allowing us to secure servers and workstati...
 

Also Known As

CrowdStrike Falcon, CrowdStrike Falcon XDR, CrowdStrike Falcon Threat Intelligence, CrowdStrike Identity Protection, CrowdStrike Falcon Surface
No data available
 

Overview

Find out what your peers are saying about CrowdStrike Falcon vs. N-able EDR and other solutions. Updated: January 2025.
831,158 professionals have used our research since 2012.