Try our new research platform with insights from 80,000+ expert users
Senior security engineer at Frontdoor
Real User
Top 20
Accelerated incident response with real-time threat management
Pros and Cons
  • "The most valuable features are the real-time response, which allows me to log into a machine to pull files and check signatures for malicious activities, and the ability to restrict USB block storage usage on endpoints by policy."
  • "There is room for improvement in the solution's ability to handle Linux systems."

What is our primary use case?

I have been using CrowdStrike Falcon Cloud Security extensively for maintaining endpoint security. It is mainly used to protect systems against malicious binaries. In our cloud environment, we use it by deploying agents on our cloud instances operating in AWS and GCP to protect these instances from malicious binaries.

How has it helped my organization?

The solution has significantly enhanced our incident response times when dealing with malware or possible malicious file activities. It allows me to log into machines and pull copies of suspected files, eliminating the need to physically obtain the machines for analysis.

What is most valuable?

The most valuable features are the real-time response, which allows me to log into a machine to pull files and check signatures for malicious activities, and the ability to restrict USB block storage usage on endpoints by policy.

What needs improvement?

There is room for improvement in the solution's ability to handle Linux systems. It does well for Windows, but it relies on binary scanning for Linux and lacks comprehensive rules for detecting suspicious behavior. I have had to develop my own custom rules in CrowdStrike for Linux.

Buyer's Guide
CrowdStrike Falcon Cloud Security
February 2025
Learn what your peers think about CrowdStrike Falcon Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.

For how long have I used the solution?

I have been using this product extensively for about the past four years.

What do I think about the stability of the solution?

Apart from the recent media attention for causing some instability worldwide, the solution is quite stable and I haven't had any major concerns.

What do I think about the scalability of the solution?

The solution scales very well, with the only limitation being the licensing purchased.

Which solution did I use previously and why did I switch?

I have used Carbon Black extensively in the past.

How was the initial setup?

The initial setup is mostly straightforward. They provide a simple way to deploy the endpoint, simplifying the installation process for users.

What's my experience with pricing, setup cost, and licensing?

The solution is quite expensive. The pricing fluctuates based on various factors such as company size, and there is room for negotiation, but it is generally expensive enough that most midsize companies find it difficult to afford.

What other advice do I have?

I would advise first-time users to monitor the number of endpoints regularly to ensure they are checking in. Additionally, they should add custom detections for Linux to identify unexpected behaviors, as the default detection for Linux is not very comprehensive.

I'd rate the solution nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
ICT Director at The Ministry of Justice
Real User
Lightweight and has login features like multi factor authentication
Pros and Cons
  • "The solution has login features like multi factor authentication."
  • "The tool could give us more templates so that people who are not updated with the platform can easily get acquainted with how to secure and utilize the product more."

What is our primary use case?

I use the solution for protection on the go for end-user computers, identity management, proactive awareness of devices on the network, and statistical collection on the devices.

What is most valuable?

The solution's most valuable feature is that the solution for IT security is not based on the on-premises solution; it is available on demand. It is lightweight and can be held on a mobile device. The solution has login features like multi factor authentication. The tool facilitates data collection of the equipment on the network, including solutions on whether to remove or keep some computers.

The solution interacts with the domain controller and gives an update on what specifics may be harmful to the environment so that we can tag it to the users before they actually contact the IT team for support.

What needs improvement?

While it may be able to show the user in the drill zone, it could have a listed column at a higher level. That way, it would help the IT team do targeted interventions rather than having to drill into the details. The tool could give us more templates so that people who are not updated with the platform can easily get acquainted with how to secure and utilize the product more.

The only thing I don't like about the application is when a computer name changes, the CrowdStrike app maintains the two devices. The name or the MAC address was different. I'm unsure if the solution can flush the database based on the similarities in the MAC address.

The solution lists the equipment but maintains the tool name on to something else. If we have renamed the equipment that joined the platform before, we just delete it manually. So, we know which one is now the new name.

For how long have I used the solution?

I have been using CrowdStrike Falcon Cloud Security for more than two years.

What do I think about the scalability of the solution?

We are confident that the solution should be able to scale well based on the current features and the modular programming that it appears to be doing. The idea of scalability is that it can handle volumes of data requests outside of what our environment is doing. We not only deploy the solution in one domain controller, but what we can see on the domain controller is based on our environment setup. Based on the hybrid point of view, I think the solution is very scalable.

We have around 500 users working with the solution in our environment. In my environment, we're testing to see if we need to increase usage. If not, the other solution would be mobile device management to handle the other exceptions we currently see.

I rate the solution’s scalability an eight out of ten.

How are customer service and support?

When we recently got the licenses, we were told to do something. When we observed that we didn't want to transfer where we were, they did something else to help with the solution. The technical team is not just technical; they're also human in that they're adaptable to customer needs and provide guidance.

How would you rate customer service and support?

Positive

How was the initial setup?

The team was awesome at implementing the tool. When we transferred to the paid version, the technician or engineer from CrowdStrike transferred to the new tenant without redeploying the endpoint, which was awesome for me.

On a scale from one to ten, where one is difficult and ten is easy, I rate the solution's initial setup a nine out of ten.

What was our ROI?

I can't give you a percentage of the return on investment. The solution protects me from the cybersecurity threats, which is very good for me and my team. So, I'm giving you a qualitative response as opposed to a quantitative response.

What's my experience with pricing, setup cost, and licensing?

It's an expensive package but does what it says it will do. Specialists are usually not cheap, so you expect to have a great package. They help you customize it, so I think it is worth it. The solution's pricing is in the same range as FortiEDR's. We paid over five million dollars for our package based on the number of subscriptions and the other add-ons to the package bundle.

The licensing fee we pay for the solution doesn't include managed services because my technical team and I were able to handle the product. It's very easy to maneuver. There's no additional cost for us to use the product outside the bundle we've requested. We ask for the basics, and then we include add-ons for the identity and server management. That will be the only add-ons cost that is manageable.

I rate the solution’s pricing an eight out of ten.

What other advice do I have?

The dashboard gives an overview of the last login for somebody besides you. You know what is going on at a high level since you don't always have to have one operating system or environment. The suggestion and the data dictionary or the look of the threat environment are also helpful because they help us prepare against the threat landscape once it is known.

Based on how the organization is listed, you could classify the equipment according to an organizational unit to identify the component. That is helpful because if you're being attacked, you can see where the entry point comes from based on the response coming from the panel. This response can be emailed to the team.

The solution is deployed on the cloud. Before buying the solution, understand the technology gap so that you can look for the features you need. Any lightweight product that can be accessed on a mobile device on the go or outside the office is a great product for security specialists. The solution offers good availability and multi factor authentication. Some security concerns are built into the tool's security package.

It helps you understand the ecosystem of lurking threats waiting to come to your network or already on it. It is a great product for those who want inventory insight into their network. It gives you a lot of details that you probably wouldn't have captured if you didn't have great inventory management from an IT perspective.

The tool can also help you plan your next product or procurement of equipment to get better feedback on what's going on from your user experience. For me, the solution's statistics insight is great. The dashboard is awesome because you don't have to look for something. It can tell you exactly which computers are online and which haven't come online for a long time.

From a technological point of view, you can call and find out why equipment is not online to make a proactive decision.

I believe AI has always been a part of the package we've been using for a time. The proactive threat hunt based on statistics in the environment is a part of the AI search feature in the portal. From a cybersecurity point of view, if the product can detect a threat lurking in your network, it helps you sleep better at night because you don't have to look for it all the time.

The statistics provided via email or in the CrowdStrike environment point you in a direction so you can do something. If you don't want to do it yourself, the tool can be trained to do it automatically for you if you allow the settings.

Overall, I rate the solution a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Flag as inappropriate
PeerSpot user
Buyer's Guide
CrowdStrike Falcon Cloud Security
February 2025
Learn what your peers think about CrowdStrike Falcon Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
Ravikant Kaware - PeerSpot reviewer
Lead Engineer at a tech services company with 10,001+ employees
Real User
Top 5
Boasts a wide range of features while remaining exceptionally lightweight and improves our security posture
Pros and Cons
  • "CrowdStrike utilizes signatureless technology, eliminating the need for regular signature updates on endpoint systems."
  • "The CrowdStrike dashboard currently lacks a username field."

What is our primary use case?

We use CrowdStrike Falcon Cloud Security for our client's endpoint security in the manufacturing, banking, and IT industries.   

How has it helped my organization?

CrowdStrike Falcon Cloud Security has helped improve our security operations. When facing signatureless attacks, CrowdStrike's EDR solution, which also incorporates SOAR capabilities, can prevent attacks in real-time. The SOAR engine detects malicious activity and suspicious file or transaction behavior on the network. Based on this detection, CrowdStrike proactively prevents these attacks. Additionally, features like Spotlight, a valuable tool for vulnerability management, provide remediation actions. Spotlight identifies the specific patches or knowledge base (KB) articles needed to mitigate these types of attacks.

To experience the full value of CrowdStrike Falcon Cloud Security, we recommend deploying the Falcon Agent on at least 500 systems and monitoring their activity for 15 days to a month. This deployment will provide comprehensive visibility into whether CrowdStrike can detect suspicious activity that might be missed by other third-party antivirus solutions and firewalls.

What is most valuable?

The CrowdStrike platform boasts a wide range of features while remaining exceptionally lightweight. Compared to traditional antivirus software, its impact on system resources is minimal. In terms of specific figures, CPU utilization typically ranges from one to two percent, while memory usage falls between 12 and 15 MB. This translates to a very small footprint on our system.

CrowdStrike utilizes signatureless technology, eliminating the need for regular signature updates on endpoint systems. It provides protection based on processes and activity behavior observed on the endpoint. The platform collects raw telemetry data from the endpoint and leverages it to proactively offer prevention and EDR capabilities. This approach offers multiple benefits, including eliminating the need for manual scans and providing broader protection against both known and unknown threats.

What needs improvement?

Due to the time zone difference, we in India experience delays in accessing immediate support for L2 and production-related issues until engineers become available in their respective time zones.

The CrowdStrike dashboard currently lacks a username field. This creates a gap for customers who manage multiple systems under a single username, making it difficult to identify individual systems based on username alone. Adding a dedicated username column to the dashboard would greatly improve its functionality in this regard.

For how long have I used the solution?

I have been using CrowdStrike Falcon Cloud Security for five years.

What do I think about the stability of the solution?

I would rate the stability of CrowdStrike Falcon Cloud Security ten out of ten. We have not received any complaints from our multiple customers related to stability.

What do I think about the scalability of the solution?

I would rate the scalability of CrowdStrike Falcon Cloud Security ten out of ten.

How are customer service and support?

While there may be delays due to time zones, the technical support itself is good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

In collaboration with a security partner, we work with several other OEMs, including Symantec, McAfee, and Trend Micro.

How was the initial setup?

The initial deployment is straightforward.

We utilize several third-party deployment tools for our installations, including Microsoft GPO, SCCM, and solutions offered by other market OEMs. These tools allow us to deploy the CrowdStrike Falcon Agent across all endpoints. Before deployment, we confirm the absence of any existing antivirus software. If the customer is already employing legacy antivirus solutions, we typically configure Falcon prevention policies to operate in "monitor mode." This means Falcon will monitor for threats without actively interfering with the existing antivirus. We refrain from uninstalling the legacy software until it becomes necessary. Once uninstalled, the Falcon prevention mode is switched to "aggressive mode," enabling it to function as the primary antivirus on the endpoint. This approach ensures a smooth transition while safeguarding endpoint security.

What other advice do I have?

I would rate CrowdStrike Falcon Cloud Security ten out of ten.

CrowdStrike Falcon Cloud Security is deployed in multiple locations and departments.

No maintenance is required.

CrowdStrike Falcon Cloud Security offers flexible integration with various third-party security products, including SIEM and proxy solutions. This capability significantly enhances our organization's overall security posture by facilitating seamless integration with existing tools via its robust API functionality.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
Intekhab Ahmad. - PeerSpot reviewer
Senior System and cyber security administration at Tankeenhr
Real User
Top 5Leaderboard
Automatic updates and user-friendly reporting features, ensuring robust protection against a wide range of cyber threats
Pros and Cons
  • "The most significant benefit is how quickly malware and other malicious attacks are detected."
  • "The only challenge lies in token verification."

What is our primary use case?

Many different types of data flow into our organization from various sources, each serving different purposes and reaching different departments. For security reasons, we've opted for CrowdStrike Falcon, and it has proven to be highly effective. It consistently detects and removes unwanted viruses and miscellaneous threats from our network and systems. Additionally, we've deployed it on our servers, where it continues to provide robust protection against malware.

It's been employed within our organization to detect and respond to threats in our cloud workload. Upon detection of any issues on a machine, we promptly receive notifications or can view details on the portal, confirming which machines are affected. Additionally, it offers a plethora of features such as investigative tools and deep information sandboxing, enhancing our ability to address security concerns effectively.

How has it helped my organization?

Cloud-native threat intelligence is invaluable to me. The information provided is easily accessible through a dedicated tab, offering a wealth of valuable insights and recommendations. This includes various implementations and suggestions for enhancing security measures. Additionally, there's the option for sandboxing, which proves useful on occasion.

Our security operations have greatly benefited from the real-time response capabilities. Upon verification, potentially harmful downloads are promptly blocked and removed automatically. We have several dialer configurations, including medium, moderated, high, and low, with automated settings deployed across most machines. For servers, I opt for a moderated configuration, considering the occasional lack of generated signatures when deploying new software.

Our results clearly show the impact on our incident response time. Whenever an incident occurs, we receive comprehensive information promptly. Sometimes, we even receive emails providing updates and recommendations on how to address the situation effectively.

What is most valuable?

The most significant benefit is how quickly malware and other malicious attacks are detected. I've extensively tested it on my machine and server by simply double-clicking various files. In many cases, the detection is immediate, preventing the file from running and displaying a message indicating that it contains malware. Additionally, when downloading files for testing purposes, especially from third-party sources, CrowdStrike Falcon often detects potential threats instantly and sometimes even removes them automatically.

What needs improvement?

The only challenge lies in token verification. Generating the token is crucial, and if it doesn't match, it causes problems. However, this issue mainly arises when new users or inexperienced administrators are involved. They may inadvertently remove the token and struggle with the installation process. Initially, there were some challenges with the portal's user-friendliness, particularly when generating reports, but these issues have since been addressed.

For how long have I used the solution?

I have been using it for four years now.

What do I think about the stability of the solution?

It's highly stable with no reported issues. I would rate it ten out of ten.

What do I think about the scalability of the solution?

It provides excellent scalability capabilities. I would rate it nine out of ten.

Which solution did I use previously and why did I switch?

In my previous role at a different company, I managed Symantec Endpoint Protection hosted on local servers rather than in the cloud. We encountered issues related to the HES file and their engines, as they only added virus definitions without making significant changes to their main framework or engine.

How was the initial setup?

The initial setup is straightforward, especially for experienced users who find it easy to handle. However, for newcomers with only a month or two of experience, there might be a learning curve as they familiarize themselves with the process.

Implementing the tool itself poses no issues. I've successfully created the GPO and installed it without any problems.

What about the implementation team?

We've deployed it using two different methods. First, I established a Group Policy Object to deploy it, and second, we utilized Intune. Following deployment, the machines are promptly visible on the portal. However, configuring additional settings is not a one-day task; it requires understanding user requirements and preferences. The complexity of the setup depends on the level of detail and customization desired.

Initially, I deployed the solution on ten testing machines, comprising both servers and local devices. It took approximately two days to configure and fine-tune the setup before finalizing it for deployment across the organization. As the sole manager responsible for both security and system management, I oversaw the entire process. With multiple branches across different locations, totaling eighteen, efficiency was crucial. One notable advantage is the small footprint of the endpoint engine, typically ranging from forty to seventy megabytes, ensuring minimal bandwidth and resource consumption compared to other antivirus solutions. Maintenance is minimal. I typically monitor the machines to ensure they remain active. If a machine has been inactive for more than ten days, it's flagged and moved to a separate section on the portal for review.

What was our ROI?

We've observed a positive return on investment. Additionally, we utilize Microsoft Defender Endpoint with our Microsoft Elastic 365 license. Despite having multiple options, it's noteworthy that the CrowdStrike Falcon solution often detects threats before Microsoft Defender.

What's my experience with pricing, setup cost, and licensing?

The pricing is reasonable, neither overly expensive nor excessively cheap, making it competitive compared to other market options. The best aspect is that there's a single price for all types of endpoints. There's no need to purchase separate licenses for servers and Windows systems.

What other advice do I have?

I would recommend it, particularly for its robust reporting capabilities, which provide access to a wealth of data. Additionally, the automatic updates feature ensures that the software stays current without requiring manual intervention. This eliminates the need to manually update each machine, as the updates are deployed automatically whenever a new version is available. Overall, I would rate it nine out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Oleg Cherevko - PeerSpot reviewer
Information security & IT technology Engineer at SI BIS LLC
Real User
Top 10
Streamlined malware detection with hassle-free cloud integration and responsive support
Pros and Cons
  • "I find the easy installation process, quick detection capabilities, and the cloud-based console very useful for this solution."
  • "The pricing is very high and should be improved."

What is our primary use case?

I sell and resell CrowdStrike Falcon Cloud Security as part of my company's cybersecurity portfolio for endpoint detection platforms.

How has it helped my organization?

CrowdStrike Falcon Cloud Security assists in detecting malware and provides effective security solutions without the need for hardware servers, saving resources on infrastructure.

What is most valuable?

I find the easy installation process, quick detection capabilities, and the cloud-based console very useful for this solution.

What needs improvement?

CrowdStrike had a significant issue with Windows integration two months back. The pricing is very high and should be improved.

For how long have I used the solution?

I have been working with and reselling CrowdStrike Falcon Cloud Security for five years.

What do I think about the stability of the solution?

CrowdStrike Falcon Cloud Security is very stable, and I would rate it at ten out of ten for stability.

What do I think about the scalability of the solution?

CrowdStrike Falcon Cloud Security is scalable. I would rate its scalability as seven out of ten.

How are customer service and support?

The technical support is very easy to reach and helpful; I would rate it as ten out of ten.

How would you rate customer service and support?

Positive

What about the implementation team?

My company is an integrator, and I handle the deployment and implementation process personally.

What's my experience with pricing, setup cost, and licensing?

The pricing of CrowdStrike Falcon Cloud Security is very high, and I would rate the current pricing as four out of ten.

Which other solutions did I evaluate?

I also work with Microsoft and ESET as part of my company's cybersecurity portfolio for endpoint detection platforms.

What other advice do I have?

I recommend CrowdStrike Falcon Cloud Security because it provides excellent services for endpoint security and is very effective as a security solution.

I'd rate the solution nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer:
Flag as inappropriate
PeerSpot user
Pedro Barros - PeerSpot reviewer
Security Analyst at a energy/utilities company with 1,001-5,000 employees
Real User
Top 10
The user interface designs are highly user-friendly with interesting settings
Pros and Cons
  • "The RTR feature stands out as particularly valuable to me due to its capability to log into machines."
  • "Incorporating threat intelligence into the system would be a valuable addition."

What is our primary use case?

CrowdStrike Falcon serves as our go-to tool for endpoint detection and response. We often leverage scripts to implement actions such as blocking and isolating specific machines. These scripts help us pinpoint and flag machines within the system that require investigation. Our focus involves delving into logs, scrutinizing identities, and ensuring a secure cloud posture through effective cloud posture management.

What is most valuable?

The primary focus lies in the swift and effective response to potential threats. CrowdStrike's Remote Threat Response feature allows remote access to machines under investigation, provided they are online. This capability significantly aids in expediting the investigative process. Additionally, the tool supports threat hunting within the Falcon framework. An aspect worth noting is the tool's proficiency in making correlations within internal data, including both machine and user logs.

The RTR feature stands out as particularly valuable to me due to its capability to log into machines. Whether it's a Linux machine, allowing me to execute native Linux commands, or a Windows machine, where I can use PowerShell commands, it empowers me to seamlessly proceed with my investigations. This flexibility is a key factor that enhances the overall effectiveness of my work.

What needs improvement?

I tend to focus more on the forensic aspects, believing there's potential for additional improvements in that area. I've noted that CrowdStrike recently introduced a new feature in their latest update, aimed at enhancing forensic capabilities. Incorporating threat intelligence into the system would be a valuable addition.

For how long have I used the solution?

I have been working with it for two months.

What do I think about the stability of the solution?

The stability of the platform has been consistently reliable, with no instances of downtime or issues encountered during installations. The process has been remarkably smooth, and I have not encountered any problems so far.

What do I think about the scalability of the solution?

The scalability is quite impressive. With thousands of endpoints in our environment, we can effortlessly deploy additional agents on any new endpoint integrated into our system.

How are customer service and support?

Regarding technical support, the response time typically takes a few hours. The speed of response may be influenced by the specific licensing arrangements in place. I would rate it seven out of ten.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

In my previous role, we predominantly relied on Azure solutions. Microsoft Advanced Threat Protection, encompassing Defender for Endpoint, Sentinel for Identity, and Security for Cloud Apps, constituted the core components of our security arsenal.

What about the implementation team?

The deployment spans various locations and departments, encompassing all our endpoints. This includes multiple nationwide locations and extends to different continents. Maintenance is not a significant requirement. While we do make occasional updates to rules, our Security Management service takes care of this aspect. Updates, including new rules, are automatically implemented during the update process. Duplicative rules are removed in the course of these updates. Although we have some custom rules, the entire process is managed as part of a service, ensuring seamless and well-controlled cycles.

Which other solutions did I evaluate?

I have a stronger inclination towards Microsoft ATP. However, since joining this company just three months ago, CrowdStrike Falcon has become a part of my toolkit.

What other advice do I have?

The user interface designs are highly user-friendly with some interesting settings. I would wholeheartedly recommend it to anyone not specifically seeking a source solution but rather a comprehensive Security Orchestration, Automation, and Response platform. The flexibility it offers to analysts is noteworthy, especially when utilizing the RTR feature. This allows seamless remote access to computers, where analysts can execute commands natively without disrupting user activities. It provides a valuable capability for conducting investigations discreetly and efficiently. Overall, I would rate it eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Product Manager at Softcell Technologies Limited
Real User
Top 5Leaderboard
It's a cloud-based solution so it's light on resource usage
Pros and Cons
  • "Falcon is a cloud-based technology, so its resource usage is light. You deploy the agents to your endpoints, but the processing is done on the cloud, so you're CPU utilization is only about 2 percent. Some others solutions use between 30 to 60 percent."
  • "Customers would benefit it CrowdStrike adopted some of SentinelOne's technologies."

What is our primary use case?

We use Falcon as a cloud-based security platform.

What is most valuable?

Falcon is a cloud-based technology, so its resource usage is light. You deploy the agents to your endpoints, but the processing is done on the cloud, so your CPU utilization is only about 2 percent. Some other solutions use between 30 to 60 percent. 

CrowdStrike has some of the best threat detection capabilities you can get. It's a market leader.

What needs improvement?

Customers would benefit if CrowdStrike adopted some of SentinelOne's technologies.

For how long have I used the solution?

I have used Falcon for two years.

What do I think about the stability of the solution?

I rate Crowdstrike 10 out of 10 for stability.

What do I think about the scalability of the solution?

CrowdStrike Falcon is 100 percent scalable. I've had no issues.

How are customer service and support?

I rate CrowdStrike support eight out of 10.

What's my experience with pricing, setup cost, and licensing?

CrowdStrike Falcon is very expensive.

What other advice do I have?

I rate CrowdStrike Falcon Cloud Security eight out of 10. If you're looking for something more advanced than traditional antivirus, I recommend CrowdStrike. It's more adaptable and stable. Falcon is one of the best solutions on the market. 

Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
Flag as inappropriate
PeerSpot user
Mahmoud_Yassin - PeerSpot reviewer
CTSO at Cyb3r
Real User
Top 5Leaderboard
Offers reliable threat intelligence features with AI capabilities and excellent stability
Pros and Cons
  • "The threat intelligence is the most vital feature"
  • "The file integrity monitoring feature should be enhanced and offered more control"

What is our primary use case?

The solution is used for endpoint management and profiling. CrowdStrike Falcon Cloud Security offers protection against security threats or attacks. 

What is most valuable?

The threat intelligence is the most vital feature of CrowdStrike Falcon Cloud Security. 

What needs improvement?

Certain endpoint management features, such as encryption and extensive file integrity monitoring, should be added to the solution. The file integrity monitoring feature should be enhanced and offered more control. The functionality of DLP also needs to be enhanced. 

For how long have I used the solution?

I have been using CrowdStrike Falcon Cloud Security for two years. 

What do I think about the stability of the solution?

The solution exhibits impressive stability. I would rate the stability a nine out of ten. 

What do I think about the scalability of the solution?

In our company, about 20 clients use CrowdStrike Falcon Cloud Security, and the total number of end-users combining all clients exceeds 1000. I would rate the scalability an eight out of ten. 

How are customer service and support?

Support is provided based on the service level availed from CrowdStrike. I would rate the basic tech support a six out of ten. An advanced service contract with the vendor includes more available support members for rapid response, I would rate the advanced support from the vendor an eight out of ten. 

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I have worked with Trend Micro, Symantec and McAfee. CrowdStrike Falcon Cloud Security is a more enhanced and cost-effective solution than Trend Micro. 

How was the initial setup?

The solution can be easily deployed. If numerous endpoints are involved in the deployment, automation tools like SCM can push the packages, which then start communicating with the servers. 

Our company offers security service management, therefore we manage the license renewals and facilitate the regular maintenance. One product manager from our company and a team of three professionals are needed to maintain CrowdStrike Falcon Cloud Security. 

What's my experience with pricing, setup cost, and licensing?

It's an expensive product. The solution costs around $60 for a single user on a yearly basis. I would rate the pricing a four out of ten. 

What other advice do I have?

The solution's threat intelligence features enhance endpoint detection and security to a great extent. The aforementioned feature quickly detects new malware based on behavior with the assistance of an AI learning model. 

The solution acts as a single agent with multiple capabilities, but some features don't perform optimally, including DLP and file integrity monitoring, which aren't extensive enough. 

The product enhances endpoint security and management of global threats. The solution's AI module learns from behavior and it's able to detect behavior inconsistencies, facilitating rapid threat detection and mitigation. 

I would definitely recommend the product to other users. CrowdStrike Falcon Cloud Security is slightly more expensive than other competitor solutions. Every customer of our company can't afford CrowdStrike Falcon Cloud Security, and there isn't always a need for its high-end features, so we recommend a different solution. I would rate the product a nine out of ten. I believe some features are still missing from the solution. 

Disclosure: My company has a business relationship with this vendor other than being a customer:
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free CrowdStrike Falcon Cloud Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: February 2025
Buyer's Guide
Download our free CrowdStrike Falcon Cloud Security Report and get advice and tips from experienced pros sharing their opinions.