CrowdStrike Falcon and Trellix Active Response compete in the cybersecurity category. CrowdStrike Falcon has the upper hand due to its user-friendly nature and reliability.
Features: CrowdStrike Falcon offers comprehensive threat intelligence, effective malware detection, and seamless integration with existing infrastructure. Trellix Active Response provides advanced threat hunting, real-time analytics, and in-depth threat investigation.
Room for Improvement: CrowdStrike Falcon needs enhancements in real-time alerting, reporting functionalities, and performance. Trellix Active Response requires better scalability, performance optimization, and simplified user interface.
Ease of Deployment and Customer Service: CrowdStrike Falcon features straightforward cloud-based deployment and responsive support team. Trellix Active Response has mixed reviews on deployment complexity despite comprehensive setup guidance.
Pricing and ROI: CrowdStrike Falcon incurs a higher initial setup cost but offers significant ROI through efficient threat prevention. Trellix Active Response has moderately lower setup costs with value in effective incident resolution.
While we haven't yet quantified the financial benefits, we recognize that there has been a return on investment, particularly with operational efficiencies provided by the alerts.
The CrowdStrike team is very efficient; I would rate them ten out of ten.
It has adequate coverage and is easy to deploy.
When it comes to scalability, it is entirely based on premium models according to demand.
The scalability of Active Response is satisfactory.
We are following N-1 versions across our environment, which is stable.
I have never seen instability in the CrowdStrike tool.
Another concern is CrowdStrike's GUI. It changes annually, making it hard to work and find options.
Threat prevention should be their first priority.
Simplifying the querying process, such as using double quote queries or directly obtaining logs based on IP addresses or usernames, would be beneficial.
We would like Trellix to optimize the technology for these systems similarly to how it is deployed for normal endpoints.
It is expensive compared to SentinelOne, but as the market leader, it is worth it.
Based on our evaluations, Trellix Active Response's pricing was the most feasible from a cost perspective.
I can investigate by accessing the customer's host based on the RTR environment and utilize host search to know details for the past seven days, including logins, processes, file installations, malicious processes, and network connections.
Real-time response (RTR) is a feature of EDR.
CrowdStrike has improved our incident response capabilities.
They notify us immediately of any vulnerabilities on the endpoints, allowing us to deploy a response quickly.
CrowdStrike Falcon provides endpoint protection and threat intelligence using a cloud-based platform for real-time detection and response. Its minimal impact on system performance and ease of deployment are key benefits along with advanced logging and reporting for compliance and forensic analysis.
CrowdStrike Falcon is known for its efficacy in identifying malware, ransomware, and sophisticated cyber threats. The platform's cloud-native architecture and advanced AI capabilities ensure comprehensive endpoint visibility and rapid response times. Users appreciate the lightweight agent and seamless deployment process, along with detailed reporting features. Integration with security tools and efficient customer support are essential features, although some users highlight high pricing, occasional detection delays, and challenges with integration. Frequent alerts and the mobile app's performance are areas for improvement.
What are the key features of CrowdStrike Falcon?
What are the benefits or ROI of CrowdStrike Falcon?
In industries like finance, healthcare, and retail, CrowdStrike Falcon is often used for critical security due to its robust threat detection capabilities. Financial firms value its rapid response and detailed reporting for compliance, while healthcare providers appreciate the minimal system performance impact. Retailers benefit from its comprehensive endpoint visibility and integration with other security tools.
Continuous Visibility into Your Endpoints:
Capture and monitor events, files, host flows, process objects, context, and system state changes that may be indicators of attack or dormant attack components.
Identify and Remediate Breaches Faster:
Access tools you need to quickly correct security issues. Send intelligence to analytics, operations, and forensic teams.
Target Critical Threats:
Get preconfigured and customizable actions when triggered, so you can target and eliminate threats.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.