Try our new research platform with insights from 80,000+ expert users
Raj Choudahry - PeerSpot reviewer
Chief Financial Officer at Nibbi Bros., Inc.
Real User
Mar 12, 2024
Helps improve our security posture, frees up IT staff time, and is stable
Pros and Cons
  • "The response service is the most valuable as it frees up our IT staff to focus on other tasks."
  • "Like any other solution, a lower price would make CrowdStrike Falcon Complete more appealing."

What is our primary use case?

We use CrowdStrike Falcon Complete as our MSSP.

We previously relied on antivirus products like Sophos and Malwarebytes, which seemed to function adequately. However, Sophos lacked centralized management, requiring our IT team to manually review over a hundred security notifications daily. This became an unsustainable workload, prompting us to seek a solution that could automate the notification review process. That's when we began exploring different options.

How has it helped my organization?

CrowdStrike Falcon Complete has significantly bolstered our security posture. While the active monitoring itself is valuable, it was consuming resources from our IT team. Now, with CrowdStrike's Managed Detection and Response service, our IT team is freed up to focus on other critical tasks.

What is most valuable?

The response service is the most valuable as it frees up our IT staff to focus on other tasks.

What needs improvement?

Like any other solution, a lower price would make CrowdStrike Falcon Complete more appealing.

Buyer's Guide
CrowdStrike Falcon Complete MDR
March 2026
Learn what your peers think about CrowdStrike Falcon Complete MDR. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,266 professionals have used our research since 2012.

For how long have I used the solution?

I have been using CrowdStrike Falcon Complete for one month.

What do I think about the stability of the solution?

CrowdStrike is stable.

What do I think about the scalability of the solution?

CrowdStrike is scalable.

How are customer service and support?

CrowdStrike's service is excellent.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We previously used Sophos in their cloud environment. While it performed adequately for its intended purpose, it lacked managed detection and response capabilities. This meant our IT team shouldered the burden of MDR, which is why we transitioned to CrowdStrike to offload that responsibility.

How was the initial setup?

The initial deployment was straightforward. Our strategies ensure comprehensive agent deployment across all machines in the organization. Therefore, we leverage deployment tools to efficiently distribute software throughout our network.

One person from IT was required for the deployment.

What about the implementation team?

The implementation was completed in-house.

What was our ROI?

The return on investment comes from two key benefits: a more secure environment and the offloading of security log monitoring from our team to CrowdStrike's experts.

What's my experience with pricing, setup cost, and licensing?

We pay $50,000 for the 200 endpoints we have.

Which other solutions did I evaluate?

In our search for a managed security service provider, we shortlisted three vendors: SentinelOne, Carbon Black, and CrowdStrike. After consulting with some security specialists, we determined that CrowdStrike would be the best fit for our needs.

What other advice do I have?

I would rate CrowdStrike Falcon Complete eight out of ten.

The costs met our expectations. After consulting with Hamilton, CDW, and an independent security consultant, CrowdStrike Falcon Complete emerged as the leading solution in the field. We therefore decided to implement it.

The maintenance is completed by CrowdStrike.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Darrin Barnes - PeerSpot reviewer
Chief Information Officer at a tech services company with 1-10 employees
Real User
Feb 27, 2024
Gives fast results, and makes life easy with proactive monitoring and remediation
Pros and Cons
  • "I am not a CrowdStrike fanboy, but as an IT leader, they make my life easy. I like proactive monitoring and remediation, so I do not have to guess or run around. They are doing everything for me."
  • "The biggest thing is to scan into your Office 365 environment, not from a cloud access security broker standpoint, but from the Secure Access Security Edge standpoint in protecting the Copilot ecosystem. Copilot has become more widely popular than I could have imagined. You need to back up and protect your Office 365 tools anyway, and Copilot is just a high sense of awareness."

What is our primary use case?

We are using CrowdStrike Falcon Complete. We are using the managed service program, where they do proactive monitoring.

My usage usually includes logging in and looking at the dashboard for any anomalies or anything I need to know and responding to any severity alerts in red, yellow, or green. 

How has it helped my organization?

They actively stopped someone scanning our network and found vulnerabilities that we did not know. They were put to the test quickly. Pretty much after we signed the contract, they were responding to something at 1:30 in the morning.

It went live in Q4 when we acquired a hospital. I cannot even tell how many patches were down. CrowdStrike did a vulnerability scan, and as they were doing the scan, they caught a bad actor. We finalized everything at 5 PM, and at 1:30 in the morning, they caught someone.

What is most valuable?

I am not a CrowdStrike fanboy, but as an IT leader, they make my life easy. I like proactive monitoring and remediation, so I do not have to guess or run around. They are doing everything for me. Secondly, what sold the CEO on it was the insurance policy. After they do a clean slate, they are willing to issue an insurance policy for cybersecurity. They are doing something that nobody else does. Outside the technical piece, they are talking the talk and walking the walk of issuing your policy once they certify that you are fine. They issue a cybersecurity policy once they certify your environment has a clean bill of health and data protection.

Their proactive monitoring has been the most effective in stopping cyber threats. There is only so much you can do when you are in the office. There are only so many tools that you can buy that can help you. You can say what you want, but all the tools for IT are more reactive. They are not proactive. Somebody has to be on the front line.

I love their dashboards. It was more or less a paradigm shift in 2020, but now I am used to it. It was a paradigm shift because it went away from the norm.

What needs improvement?

The biggest thing is to scan into your Office 365 environment, not from a cloud access security broker standpoint, but from the Secure Access Security Edge standpoint in protecting the Copilot ecosystem. Copilot has become more widely popular than I could have imagined. You need to back up and protect your Office 365 tools anyway, and Copilot is just a high sense of awareness.

For how long have I used the solution?

We have been using CrowdStrike Falcon Complete since November 2021. 

What do I think about the scalability of the solution?

Over the last couple of years, I have seen how they have grown. I am happy with their evolution.

How are customer service and support?

I love the team. They have a fine balance of technical and service. It is a very good thing. I would rate them a nine out of ten because everybody has room to improve.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

The reason for going for CrowdStrike Falcon Complete was simple. A managed service provider was compromised. We were compromised because an attack came through our managed service provider, and the fine print of their contract said that they are not responsible for any threats that happen.

How was the initial setup?

It is a cloud solution. The endpoints are installed on each computer, but everything else is through CrowdStrike's Cloud Platform.

The installation was a paradigm shift because we moved away from the endpoint protection piece, and we were open and saw how the world has evolved where we got to have different connectors. It was just a paradigm shift of how far we have come or how much we have to do to make sure we are secure.

From start to finish, it took up to eight weeks because there were a couple of things that we missed or and they were looking for best practices. 

What about the implementation team?

We did not have the skill set to implement it on our own. We worked directly with CDW and CrowdStrike.

Three other people and I were involved in its deployment, so we had four people. From CDW and CrowdStrike, that was a team. It was like the Justice League. There were 12 people.

In terms of maintenance, you need to do what you are supposed to do. When you do not follow their playbook, you open yourself to problems. They tell you how to install and configure an endpoint. For the admin piece of it, there are reporting tools and proactive services, but you have to be open. If they are going to take the security piece off you, you have got to give them the keys to the car. You have to understand that if they are going to do this, you need to get out of the way and let them do what they do best.

What's my experience with pricing, setup cost, and licensing?

If you are looking from an IT standpoint, you get what you pay for. There is proactive monitoring in addition to the insurance policy. They do that better than others. Would you like it cheaper? Yes, but at what cost?

Which other solutions did I evaluate?

At that time, Palo Alto was not at their level. SentinelOne was always trying, but back then, the company that was backing SentinelOne was compromised itself. If you cannot protect yourself, why would I trust you to protect my environment?

What other advice do I have?

Open your mind. Understand that what you thought you knew may not be good enough. It is not a knock on you. You are now just getting professionals who do it better than what you possibly could do internally. Keep an open mind, but understand that they are the experts and industry leaders for reasons.

What a lot of clients do not take advantage of is the monthly calls where you can see what is coming down the pipe or have the best practice of using the product, and then keep the staff up to speed. You can work with their client success manager to look at your particular setup and what you can do to finetune the product. You can work with them for any anomalies or something that does not make sense.

Everybody has room to improve, but this one is different. I have to give it a ten out of ten.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Buyer's Guide
CrowdStrike Falcon Complete MDR
March 2026
Learn what your peers think about CrowdStrike Falcon Complete MDR. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,266 professionals have used our research since 2012.
Mohammad Yassien - PeerSpot reviewer
Cloud Engineer at Al-Khaleej Training and Education
Real User
Mar 12, 2024
Offers 24/7 monitoring, prevents threats from installing on our machines, and improves our response time
Pros and Cons
  • "Two of the most valuable features of CrowdStrike Falcon Complete are the remote terminal and unlimited IoCs."
  • "CrowdStrike Falcon Complete does not include patch management functionality."

What is our primary use case?

We leverage CrowdStrike Falcon Complete, our EDR solution, alongside Microsoft Defender.

We implemented CrowdStrike Falcon Complete to safeguard our end users from unwanted applications, as recommended. Its IoC technology prevents the installation of both vulnerable applications and adware.

CrowdStrike Falcon Complete is deployed in the AWS, Azure, and GCP clouds.

How has it helped my organization?

CrowdStrike Falcon Complete made our incident response and remediation effort smoother.

Deep analysis is a valuable tool because whenever an unauthorized process is executed, it provides us with a comprehensive understanding of how the attacker is behaving within our system.

CrowdStrike Falcon Complete's 24/7 monitoring simplifies security management for our organization. We receive notifications through the message center regarding any detected incidents. Additionally, their cybersecurity engineers are available for consultation via phone call should any questions arise.

Our organization has benefited significantly from CrowdStrike Falcon Complete. It allows us to easily add Indicators of Compromise and perform on-demand scans. When threats are detected during these scans, the files are automatically blocked, preventing them from executing on the machine. Additionally, the support team is responsive and helpful, offering assistance without requiring the creation of a ticket.

Our overall security response time has improved by up to 80 percent.

What is most valuable?

Two of the most valuable features of CrowdStrike Falcon Complete are the remote terminal and unlimited IoCs. Most security solutions limit IoCs to around 20, but Falcon Complete allows us to upload as many as we need. Additionally, the centralized security management system is a great feature. It lets us run on-demand scans on our devices and view the results conveniently in the cloud.

What needs improvement?

CrowdStrike Falcon Complete does not include patch management functionality.

For how long have I used the solution?

I have been using CrowdStrike Falcon Complete for eight months.

What do I think about the stability of the solution?

I would rate the stability of CrowdStrike Falcon Complete nine out of ten.

What do I think about the scalability of the solution?

CrowdStrike Falcon Complete is scalable, but to expand its capabilities, you'll need to acquire additional licenses.

The cloud-native architecture allows us to just focus on the work and not worry about the hardware.

How are customer service and support?

CrowdStrike Falcon Complete offers faster technical support compared to Microsoft, which often has long response times and redirects customers to partners.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We switched from Sophos to CrowdStrike Falcon Complete for its broader capabilities.

How was the initial setup?

The deployment process, involving six people and supported by CrowdStrike, took eight months to complete. We uninstalled our existing applications from the machines and installed the token as part of the deployment. 

What was our ROI?

We have seen a medium to high return on investment.

What's my experience with pricing, setup cost, and licensing?

While CrowdStrike Falcon Complete is expensive, it offers great features and functionality.

Which other solutions did I evaluate?

We evaluated Kaspersky and Microsoft Defender.

What other advice do I have?

I would rate CrowdStrike Falcon Complete nine out of ten.

CrowdStrike Falcon Complete is user-friendly and simple to set up, ensuring a smooth user experience without any added complexity. It automatically detects and blocks infected files or devices, protecting your end users.

I recommend CrowdStrike Falcon Complete.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Mahmoud Hanafi - PeerSpot reviewer
IT Operation Manager at Orascom Construction Industries
Real User
Feb 1, 2024
We get more visibility across the environments than we've ever had before
Pros and Cons
  • "We've seen a tremendous improvement since implementing CrowdStrike Falcon. In the past few years, we were exposed to 30 different attacks, but now our environment is completely monitored, and everything is detected. It catches threats and attacks before they occur."
  • "I think the overall user experience for the operations team could be improved. The dashboard could be more effective, like Microsoft Defender. Microsoft worked on refining the user experience. The security monitoring tools could be simpler and more user-friendly. Integration with the application layer might be another area for improvement."

What is our primary use case?

We use Falcon to protect the overall environment, including the client and the servers.

How has it helped my organization?

We've seen a tremendous improvement since implementing CrowdStrike Falcon. In the past few years, we were exposed to 30 different attacks, but now our environment is completely monitored, and everything is detected. It catches threats and attacks before they occur. We get more visibility across the environments than we've ever had before. When malicious activities are happening, we see the notifications immediately. It's a huge improvement over the response time of our previous solution.

What is most valuable?

We like the SOC teams that support the service. CrowdStrike has a huge SOC team that responds immediately when they discover any incident or risk in the environment. They conduct the forensic behind the tool, coordinating with our in-house team. 

We get an immediate response to threats and reporting about whatever actions are taken across the entire organization and the environment. Each system is reporting to CrowdStrike what happened behind the scenes. They have an impressive tool for monitoring and discovering what happens in every part of our systems.

What needs improvement?

I think the overall user experience for the operations team could be improved. The dashboard could be more effective, like Microsoft Defender. Microsoft worked on refining the user experience. The security monitoring tools could be simpler and more user-friendly. Integration with the application layer might be another area for improvement. 

For how long have I used the solution?

We have used CrowdStrike Falcon for nearly a year.

What do I think about the stability of the solution?

A good indicator of the product's stability is the stability of the environment itself. The product is highly stable. 

What do I think about the scalability of the solution?

We haven't expanded it, so I don't know what would happen if we tried. 

How are customer service and support?

I rate CrowdStrike support 10 out of 10. They have a perfect support team. When we're working with technical support, it's like you are talking into a community, not just one person talking to you about incidents. You have a community supporting you.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We previously used Trend Micro Apex One. There were too many threats in our environment that went undetected, so we saw little value from Trend Micro. 

How was the initial setup?

The portal is on the cloud, but there are on-prem agents. The deployment required about four or five people. It was straightforward and took about a week to cover all environments. Around three or four people are needed for maintenance. 

What was our ROI?

Although it's an expensive solution, we see a return because security is the top priority.

What's my experience with pricing, setup cost, and licensing?

I don't know the details of the licensing, but Falcon Complete one of the most expensive solutions we have right now.

Which other solutions did I evaluate?

We looked at a few products, including Microsoft Defender. It's a good player in the game, and we believe Defender will be the next stage.

What other advice do I have?

I rate CrowdStrike Falcon Complete 10 out of 10. I would recommend Falcon Complete to others. To those planning to implement Falcon Complete, I recommend cleaning the environment before installing the new product. You need to ensure every tool that was installed on the machines is removed.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Roberto Castilla - PeerSpot reviewer
Presales & Sales Operations at UST Global
Real User
Feb 27, 2024
Reasonably priced, continuously enhanced, and helpful for visibility
Pros and Cons
  • "The continuous improvement in detections and response times is valuable. They are more focused on threats that come from the cloud, not only that we see."
  • "There can be an application for the mobile device for the administrator of the platform to have an overview. In less than two minutes, they should be able to see what is going on and take action."

What is our primary use case?

Our customers use it, but we deliver the services. We use it for advanced endpoint protection capabilities and threat-hunting capabilities. We use it for data lakes and repositories to reduce the cost and computational efforts for submitting or uploading in the cloud.

How has it helped my organization?

By implementing CrowdStrike Falcon Complete, we wanted to improve the visibility of our operators, analysts, and engineers. We wanted to be more efficient in our operations. Instead of finding information themselves, they can use the platform to find the information automatically.

Its benefits can be seen from the beginning. It is super easy in terms of deployment, and it works perfectly with the human resources and the stack of technologies that our clients have.

Partner support is beneficial. They are a trusted partner. They plan to continue in the market by themselves. They are not expecting somebody to purchase them. It helps to build confidence with the clients, and we can trust that nothing will change in that aspect.

They continue to improve their threat-hunting capabilities, which is important for me because there are more and more advanced threats, such as zero-day attacks. If we combine these threat-hunting capabilities with endpoint detection, we have an extra layer of response. It is super strong for us. We have different agents: one for detection and monitoring and the other one for the preventing aspect, which means threat hunting and response. I can combine the telemetry for threat hunting and monitoring and respond properly.

They are working hard to continue and enhance their labs for identifying new threats and malware. They are continuously labeling them with fancy names for marketing, but they are super helpful and useful because malware and attacks are labeled as per what is happening in specific industries or at specific locations. They give you an overall idea about what is going on not only in your country but also all over the world, and more specifically, in the industry you are working with.

The team of Falcon Complete works around the clock and does monitoring around the clock. It is quite good because it is a solution that combines monitoring and response, and at the same time, it labels all the threats in the world. They are super helpful in managing the threat exposure that companies face on a daily basis. 

What is most valuable?

The continuous improvement in detections and response times is valuable. They are more focused on threats that come from the cloud, not only that we see. Five or six years ago, we were just focusing on the infrastructure. They, for sure, have better coverage for the supply chain devices or assets that are in the environment of the clients. We have better coverage of third-party vendors, and we have more visibility and more interactions with those third-party vendor solutions.

What needs improvement?

Some features can be enhanced or improved. For example, there can be more integration capabilities.

There can be an application for the mobile device for the administrator of the platform to have an overview. In less than two minutes, they should be able to see what is going on and take action. Having an overview in a mobile phone would be super helpful for the administrators because everybody has a mobile phone nowadays.

For how long have I used the solution?

I have been working with CrowdStrike Falcon Complete for four years.

What do I think about the stability of the solution?

It is stable. It is 90% compliant with what they promised.

What do I think about the scalability of the solution?

It is scalable.

How are customer service and support?

Their support is quite good. I would rate them a seven out of ten. They can add better resources or more resources locally.

How would you rate customer service and support?

Neutral

How was the initial setup?

I am not involved in its deployment, but it can be deployed on-premises and on the cloud. The cloud provider depends on the client's preference. We do not have any issues.

What's my experience with pricing, setup cost, and licensing?

It is expensive, but looking at the capabilities that it brings, it is reasonable.

There are no additional costs to the licensing costs. If you increase the number of licenses, support is included.

What other advice do I have?

I would rate CrowdStrike Falcon Complete an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. reseller
PeerSpot user
Ric Cabrera - PeerSpot reviewer
IT Consultant - Applications & Technology at Select Home Health Services
Consultant
Aug 9, 2022
Great next-generation antivirus with breach warranty and good intrusion protection
Pros and Cons
  • "One unique thing that they offer is a breach warranty. We basically have a warranty of up to $100,000 should there be any breach that they're not able to manage."
  • "The downside is that if you are using a device offline, not connected to the internet, you will potentially have exposure."

What is our primary use case?

We wanted a very high level of endpoint protection and intrusion detection. Based on all the reviews, you have a bunch of products out there to choose from. One differentiator of CrowdStrike is that it's nearly what I would call zero-touch on the workstation. You don't have to worry about upgrades and all that. Then, when something suspicious is detected, the CrowdStrike team investigates that for us. It's part of the service that we purchased from them. Basically, we use the solution for security.

How has it helped my organization?

Basically, from an overall management perspective of the devices, you really only install the sensor once, and then you set up policies on the portal to say, okay, we want to stay on the N minus one version of the sensor. If there's an update that's required, the portal pushes it to the workstation. It makes everything very easy and doesn't require any touch.

What is most valuable?

It's mainly the next-generation antivirus that we are leveraging.

In the traditional antivirus, like McAfee, for example, you'd have to maintain signature files and all that on the workstation. We don't have to do that. On top of that, the footprint on the workstation is nearly zero.

One unique thing that they offer is a breach warranty. We basically have a warranty of up to $100,000 should there be any breach that they're not able to manage.

What needs improvement?

The downside is that if you are using a device offline, not connected to the internet, you will potentially have exposure. Intrusion detection and endpoint protection is all driven using the internet. You have to be connected. If you're not connected, basically, unlike some antivirus software packages, if you introduce something, let's say through a USB port, and you are not online, you have potential exposure.

I'd like to see a capability where the solution can do offline intrusion detection if needed. For example, if you have offline workstations or devices, then there's new data introduced into the device using, I guess, portable data devices. If there was a way to detect that while the device was not connected, that would be great.

It's not a major concern for us since 100% of the time, our devices are connected to the internet because most of our business applications are using cloud-based applications.

The pricing can look expensive.

For how long have I used the solution?

We started using the solution in April or May of this year. It's only been a few months. 

What do I think about the stability of the solution?

It's stable. So far, so good. I've not had any issues around it in terms of impacting usage, et cetera. It's pretty transparent to us.

What do I think about the scalability of the solution?

It's pretty scalable. I've talked to some users from huge companies, Fortune 500 companies, so I know that it's scalable.

We don't really have any users for it. It's pretty much myself and one other person who just monitors the portal, and that's about it. In terms of devices, we have 100 to 150 devices. 

We intend to explore the other capabilities of what the sensor can provide us. However, right now, we're just focused on antivirus and intrusion detection. That's about it. 

The intent is obviously to deploy. Every time we have new devices, et cetera, we just deploy this and go.

How are customer service and support?

Support is pretty transparent for me. We've had probably five or six incidents, and they were minor, however, then those are handled by the CrowdStrike team. 

They would notify me if I needed to take action on my side. So far, they are good. I haven't needed to take any drastic action, like shutting down the device and all that.

Which solution did I use previously and why did I switch?

We had decentralized solutions. They were mainly workstation-based and was McAfee. We went to a centralized solution so that it can be centrally managed.

How was the initial setup?

The setup is pretty straightforward. We started out with a lot of effort since we didn't have managed devices when we installed it. We didn't have a device management system in place for Windows, so we had to install it at each workstation. 

The deployment probably took us a week. We had to install the sensors manually. However, the installation process is very straightforward. It takes less than five minutes.

In terms of maintenance, it's all maintained on the CrowdStrike side.

What about the implementation team?

We did the initial setup ourselves in-house.

What was our ROI?

There's potentially really no ROI. It addresses an area of risk. That is all. You're putting the investment in the service as a kind of insurance against cyber attacks, data breaches, et cetera.

What's my experience with pricing, setup cost, and licensing?

We have a subscription. 

The cost, the overall cost of the service, is something that could be improved. If you compare it to other antivirus systems, it'll seem more expensive as there's one piece that people overlook - you have a technical team monitoring for you behind the scenes.

The cost is approximately $35,000 to $40,000 a year. It covers up to 300 devices and 300 Windows or Mac OS devices, and about 150 mobile devices. There are no additional costs beyond the main fee. It's all paid on an annual lease. 

Which other solutions did I evaluate?

We looked at Microsoft Defender, McAfee, Norton, and two other solutions, however, this one came up on top. The only downside is the overall cost when you compare it to the competition.

What other advice do I have?

We are customers and end-users.

I'm not sure which version of the solution we're using. Typically, we set ourselves to N minus one. We're typically one version behind the most current.

I'd warn potential new users that they have to look at the total cost of ownership. One item that's overlooked is when you get an antivirus or a security product, you will need experts to manage and maintain it. CrowdStrike basically provides you with the software solution and the technical support behind it. If you basically add up all those things, it'll probably be on a total cost basis; it'll be reasonable.

I'd rate the solution nine out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Kunal Bhujbal - PeerSpot reviewer
Associate Director at a consultancy with 11-50 employees
Real User
Mar 6, 2024
Uses AI-powered analytics, improves security posture, and automatically remediates threats
Pros and Cons
  • "Overwatch is the most valuable feature of CrowdStrike Falcon Complete."
  • "I would like to see CrowdStrike Falcon Complete XDR integrate more effectively with other technologies."

What is our primary use case?

We are partners with CrowdStrike and implement CrowdStrike Falcon Complete for all our customers to help protect their environments against breaches and cyber incidents.

Our customers are switching to CrowdStrike Falcon Complete for several reasons. First, their current antivirus solutions are up for renewal. Second, they lack EDR capabilities, which limits their visibility into their security posture. This lack of visibility is a major challenge for them. Finally, they are seeking proactive threat hunting, a service their current Security Operations Center provider doesn't offer. Instead, they receive an unmanaged threat-hunting service, which they find inadequate.

How has it helped my organization?

CrowdStrike's Falcon Complete service simplifies endpoint security by using a single sensor we install on our devices. Once installed, CrowdStrike's managed services take care of everything, including monitoring, threat detection, remediation, and alert management. Our customers only need to handle adding new users or groups.

CrowdStrike Falcon Complete improves our ability to respond to and remediate cyber threats.

CrowdStrike Falcon Complete boasts AI-powered analytics that hold significant promise. While I haven't used it personally, we'll be implementing it with a few clients. Once their quarterly reviews are completed, we should gain valuable feedback. The generative AI capabilities seem comprehensive, which is positive for our needs.

The real-time threat-hunting capabilities stand out for us.

Falcon Complete incident response feature works in the background where a team at the threat center reviews the detections and automatically remediates the threats.

We're continually evolving our cybersecurity posture, and Falcon Complete has significantly improved our response time to cyber threats.

We don't have an in-house SOC team so Falcon Complete has been crucial in helping with threat detection and resolution.

What is most valuable?

Overwatch is the most valuable feature of CrowdStrike Falcon Complete.

Threat hunting is the most valuable feature for strengthening our cybersecurity posture.

What needs improvement?

I would like to see CrowdStrike Falcon Complete XDR integrate more effectively with other technologies. 

For how long have I used the solution?

I have been using CrowdStrike Falcon Complete for a few months.

What do I think about the stability of the solution?

CrowdStrike Falcon Complete is extremely stable.

What do I think about the scalability of the solution?

I would rate the scalability of CrowdStrike Falcon Complete ten out of ten.

How are customer service and support?

The technical support is excellent.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Before our partnership with CrowdStrike, we offered Trend Micro, McAfee, and Symantec products. We transitioned to CrowdStrike Falcon Complete due to its ideal alignment with our customer needs and its inclusion of threat hunting and cyber insurance within the service package.

How was the initial setup?

The initial deployment is straightforward. We integrated with ADR in SCCM and pushed all the software agents on all the machines. The deployment required two people.

What was our ROI?

We have seen a return on investment with CrowdStrike Falcon Complete.

What other advice do I have?

I would rate CrowdStrike Falcon Complete ten out of ten.

CrowdStrike Falcon Complete is a managed service so it does not require maintenance from our end.

I recommend CrowdStrike Falcon Complete to others.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
reviewer1619394 - PeerSpot reviewer
Group CIO at a construction company with 10,001+ employees
Real User
Apr 28, 2023
Stable and scalable solution for behavioural analysis and ransomware
Pros and Cons
  • "If someone is using the old Microsoft Office and the system is not updated, then CrowdStrike takes action on behalf of the operating system."
  • "The analysis of the investigation of the incident could be easier."

What is our primary use case?

The solution did a good job of preventing ransomware. It is used for behavioral analysis. For instance, if something appears to be suspicious then the solution blocks it.

What is most valuable?

If someone is using the old Microsoft Office and the system is not updated then CrowdStrike takes action on behalf of the operating system. So it is not only going above the application level but also the operating system level.

What needs improvement?

The analysis of the investigation of the incident could be easier. Offline scanning can be included in the next release. 

Moreover, Crowdstrike should think about making the price cheaper.

For how long have I used the solution?

I have been using it for one year.

What do I think about the stability of the solution?

It is a stable solution.

What do I think about the scalability of the solution?

The solution is scalable. Presently, in the company, there are three hundred users, and in the group, there are one thousand users.

How are customer service and support?

The technical support team is in the middle range and not very good. We have a dedicated team from CrowdStrike working for us; it is called the watch service. 

We also subscribe to EDR Plus watch service. So we have a team from CrowdStrike always monitoring things before it happens.

Which solution did I use previously and why did I switch?

Previously, I used Carbon Black EDR for three years, and I was a very happy user, but their technical support was not very relevant, so I switched.

How was the initial setup?

The initial setup was straightforward. The deployment took around two weeks. We have only one engineer helping with the deployment.

What was our ROI?

There has been a Return on Investment. We have been working with two incidents, and the support team was really helpful from their side.

What's my experience with pricing, setup cost, and licensing?

We need to pay a yearly subscription fee, which is expensive compared to others.

What other advice do I have?

Anyone using CrowdStrike should ensure that they have the watch service. Though I do not remember the name of the service, it says Crowdstrike engineers are also monitoring.

I rate the solution a nine out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free CrowdStrike Falcon Complete MDR Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2026
Buyer's Guide
Download our free CrowdStrike Falcon Complete MDR Report and get advice and tips from experienced pros sharing their opinions.