I like that it's cloud-based instead of on-premise.
Director Of Information Technology at a financial services firm with 11-50 employees
Offers a cloud-based option and has good stability
Pros and Cons
- "The stability is good; we haven't experienced any glitches or bugs."
- "The biggest issue with Falcon as a standalone product is it doesn't have very much reporting."
What is most valuable?
What needs improvement?
I miss a feature for the USB control that they have as an add-on. I haven't gotten to the point where I want to pay for it, but the features that I miss are available.
The biggest issue with Falcon as a standalone product is it doesn't have very much reporting.
Out of the box, the only weakness is the level of reporting.
All the analytics and the telemetry are there, it's just a matter of getting to it. Other vendors offer some of that stuff right out of the box.
CrowdStrike Falcon has been very low maintenance. There are features on it that I haven't touched yet. I've got a SIEM that I haven't really had time to explore fully. I have a patch management system that does what it does. I have a firewall and IDS that do what they do, and I have an endpoint security system that does what it does.
MSPs keep asking how one person can keep up to the different solutions and alerting, if you don't have any problems, then it's pretty easy to keep up. Everything does what it does. I don't experience any of the issues that apparently a lot of people have on their network. How can I tell you what to improve if it's doing what it's supposed to do?
For how long have I used the solution?
I have been using CrowdStrike Falcon since June of 2019.
What do I think about the stability of the solution?
The stability is good; we haven't experienced any glitches or bugs.
Buyer's Guide
CrowdStrike Falcon
September 2025

Learn what your peers think about CrowdStrike Falcon. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,497 professionals have used our research since 2012.
What do I think about the scalability of the solution?
We're a small company so the scalability is fine for us.
How are customer service and support?
I don't have to talk to their technical support often. When I need help, I contact them by email. Sometimes it takes a little while to get through to them, but otherwise, when they respond the issue is resolved. Not a real concern.
Which solution did I use previously and why did I switch?
We had Vipre business on-premise, the product was being discontinued and I wanted to move away from an on-premise solution. At the time Vipre did not seem to be quite as mature as other options. I understand that they have improved quite a bit since I looked at them last.
How was the initial setup?
The initial setup was straightforward. Initial agent deployment took roughly 15 minutes. SIEM integration required some coordination between vendors, but was relatively uneventful when support teams were involved.
What's my experience with pricing, setup cost, and licensing?
Licensing cost is negotiable. There are no additional costs.
On a scale from one to ten, I would give this solution a rating of nine. I'm sure there's always something that can be improved.
Which other solutions did I evaluate?
We evaluated Vipre, Carbon Black, and a few others.
What other advice do I have?
There are half a dozen players out there that are the best of the breed. Pick one.
When it came to CrowdStrike versus Carbon Black, configuration and setup were deciding, driving factors. CrowdStrike was much easier to configure, but overall, is it better or worse? I can't make that judgment call.
All I know is what I've been told by other vendors that are trying to get my business. They tell me about issues that I've never encountered with the products that I have. In summary, take what a vendor says about another vendor's product with a grain of salt.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Executive Technology Advisor at Vitso
Good UI, performance, integration, and alerting
Pros and Cons
- "The feature that I find to be the most valuable, is being able to look at the system analysis and being able to baseline what is installed on the system."
- "I think there's an opportunity to enhance the AI or at least the traps to say, if something changes from this baseline, let us know and flag it."
What is our primary use case?
We are using this solution for advanced threat protection, over and above any antivirus for approximately 1200 end-users, or endpoints. It is able to identify any anomalies and alert on that using the AI engine. That way, there's a small security team to make them more effective, to be able to get an alert, go in and look at what's going on.
Since I have been here, I have been keying into when people fall for phishing attacks and they either get blocked going to a website or their credentials get compromised, and somebody logs in to their Office 365 account. We were able to forensically identify that in two of the cases. Most recently, since I've been here looking at the more active response, to be able to identify and act a little bit more quickly.
How has it helped my organization?
I was able to look through some rapid analysis when bad things happen. More so than having to get, especially in the distributed world of post-COVID, being able to have a central place to be able to see what's going on, on the landscape of endpoints at any given time.
What is most valuable?
The feature that I find to be the most valuable, is being able to look at the system analysis and being able to baseline what is installed on the system. What does it usually do, and is it doing anything differently?
The UI is great, and the performance was great. The way it gathers and presents the information was very good and it integrates well with things with a central log aggregator, such as Splunk. You can do more big data analytics that includes security. It seems to be fully featured in all of those areas.
What needs improvement?
I think there's an opportunity to enhance the AI or at least the traps to say, if something changes from this baseline, let us know and flag it. It's got a pretty good engine to do that on its own but it's one of the things that are important to us, so I'm just trying to increase the time-to-issue identification.
By comparison to buying into the Microsoft suite, it was definitely less costly. CrowdStrike can be costly.
For how long have I used the solution?
I have had this solution for approximately three years.
What do I think about the stability of the solution?
It seems stable. The performance is good.
What do I think about the scalability of the solution?
It's a scalable solution. They are running 1400 endpoints on it right now, and it seems to be fine.
There is only one person working at it right now and they are the security engineer/operator.
If you look at how they spend their day, a tool like that does a lot with a little and can make a one man band pretty effective or much more effective. It makes the response to an issue right when it happens way more possible with such small security.
How are customer service and technical support?
We haven't used technical support.
How was the initial setup?
The initial setup was already completed before I started with this company.
What's my experience with pricing, setup cost, and licensing?
When comparing to Microsoft, CrowdStrike Falcon is more expensive.
I'm going by the client and some of the things that are driving their decisions.
It's typical when Microsoft throws things in and it seems really cheap, even though you're spending a million and a half dollars with them. You may as well increase the value of that million and a half.
My guess is that CrowdStrike is going to maintain parity or stay ahead of Microsoft.
What other advice do I have?
As I came into this organization, they were moving away from CrowdStrike.
They upgraded their license to E5 with the security bundle from Microsoft. The goal is to start to move things.
They are paying twice for things right now, but that will be expiring. CrowdStrike comes up for renewal next year, and they want to be off of it by then.
I haven't gone into critiquing it. Since they've already made the decision and made the investment to go to defender ATP. I'm more concerned with, are we losing anything? Do we have parity when we go from one platform to another? And if any gaps emerge, what needs to be filled?
When we did go into it and walked through it with one of the security engineers, it was snappy, and it had a nice UI.
I had never been inside the product. I think I got a demo years ago in my CSO role, but I had never delved into a practical use case. The practical use case looked pretty cool.
For anyone who is interested in implementing this solution, I would say don't look for the cost compared to smaller applications. Look at what you're trying to do, and what you're trying to accomplish. The typical first cardinal sin of IT is buying a product and then figuring out how to use it as opposed to having a set of requirements, placing a value on that set of requirements, and then pursuing a solution that covers them the best.
I think they probably said we've got a gap here because something bad happened to my CrowdStrike. It's an industry leader. Three years after the issue that they were treating was over, and the pain was gone, suddenly, it seems really expensive. That is an IT 101 mistake that I've found in organizations, where it's a means to an end and then it turns this to just an eyesore on the balance sheet.
I would rate this solution an eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
CrowdStrike Falcon
September 2025

Learn what your peers think about CrowdStrike Falcon. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,497 professionals have used our research since 2012.
Senior Cyber Security Analyst with 1,001-5,000 employees
Detailed incident reporting, stable, and the technical support team is well trained
Pros and Cons
- "The most valuable feature is the indicator of compromise, which show you what file was either quarantined or removed."
- "Any kind of integration that you want to do, such as using the API to connect to a SIEM, is complex and it will be expensive to do."
What is our primary use case?
The primary use case is digital security investigations using the dashboard.
How has it helped my organization?
Every week, a manager would look at a detailed report to see what kind of CrowdStrike incidents we had.
What is most valuable?
The most valuable feature is the indicator of compromise, which shows you what file was either quarantined or removed. It shows you the malicious files in question, as well as the exact time, the machine, the endpoint, and the host IP address. Everything you need to know is right there in a single dashboard.
What needs improvement?
Any kind of integration that you want to do, such as using the API to connect to a SIEM, is complex and it will be expensive to do. It is quite a pricey product.
For how long have I used the solution?
I used CrowdStrike Falcon in my last two cybersecurity jobs, over a period of at least two years.
What do I think about the stability of the solution?
The product is stable as a rock. I have never seen any crashes. When it came to patching updates, we were always notified. It is not Windows-based, but rather Linux or Unix-based. It was more stable than any Windows product.
What do I think about the scalability of the solution?
We had a small shop, so we never had any reason to scale.
How are customer service and technical support?
The technical support is pretty good. They're trained in their product and they have a system in place where if the first line of support does not resolve the issue, they are emailing us directly back and forth, and they'll hand over the problem from one shift to the next.
It is not very difficult to get in touch with the support team, although it does require clearance from whoever handles the money aspect. You have to be really careful because they will charge you fees for any kind of solution that they provide.
I have used them twice, once for each company that I was working for. The first time, we used the CrowdStrike service to do the investigation so that we could focus our time on other products. They have teams that will act like a managed service provider to take care of incidents. We handled major incidents in-house but we let them handle the minor ones.
With the second company, we had to do the investigations as the incidents came in, so it was two totally separate vantage points. Both worked extremely well in both manners and forms.
Which solution did I use previously and why did I switch?
CrowdStrike was already in place before I arrived, at both places where I have used it.
We were also using Carbon Black, as well as other tools, but they were not being used to the same degree. I think that we were using Carbon Black for white-listing applications.
I also spent a lot of time using Nessus, which is a vulnerability scanner. I would look at scans to see what kind of vulnerabilities were present, and patch management updates with other teams.
How was the initial setup?
I was not there for the initial setup, but what I did learn was that the implementation team came in and worked with our engineering team. They set it up and then our team verified that all of the endpoints where there and that we had the visibility we needed for all of the subnets in all of the locations.
When I spoke with my teammate, I was told that it was pretty much straightforward and out of the box. The fact that it is a cloud-based deployment made it easier, too.
What's my experience with pricing, setup cost, and licensing?
Our licensing fees were between $50,000 and $60,000 per year, which was pretty expensive for a small business. It is not a one-time payment. Any upgrades that you want to do, you're going to have to pay multiple times.
What other advice do I have?
My advice for anybody who is implementing CrowdStrike Falcon is to get in touch with the vendor and then follow best practices. They have a lot of documentation and everything is there. For the most part, I would suggest looking at the technical support documentation first and then contacting a representative at the vendor to continue the process.
Most companies have it integrated with the SIEM and with their ticketing system, although I did not use it in that capacity because it costs more money.
Most of the time, you're not going to have to lay a finger. Once it finds an infected file, you might have to reboot the computer if it can't immediately remove it, or other such minor stuff. In general, however, it's never given me any issues and it's never given me a headache. Overall, it's very straightforward and just one tool out of the whole.
I would rate this solution a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior System Engineer at a computer software company with 1,001-5,000 employees
Good threat intelligence with fair pricing and good stability
Pros and Cons
- "The solution can scale easily."
- "Support, particularly related to after-sales and after deployment, could be improved a bit. If you need to connect to support, it takes at least a day to reach the support team and get a proper reply."
What is our primary use case?
We primarily use the solution for threat intelligence.
What is most valuable?
The threat intelligence on offer is the solution's most valuable aspect.
The solution is very stable.
The solution can scale easily.
The pricing is very competitive.
What needs improvement?
The solution overall is a good product, and we don't see too much room for improvement.
Support, particularly related to after-sales and after deployment, could be improved a bit. If you need to connect to support, it takes at least a day to reach the support team and get a proper reply.
The solution could use better device control.
For how long have I used the solution?
I believe I've been using the solution for the past three years.
What do I think about the stability of the solution?
The solution is very stable. We don't find there are any bugs or glitches. We haven't had it crash or freeze on us. It's quite reliable.
What do I think about the scalability of the solution?
The scalability of the solution is good. If a company needs to expand out, they can do so easily with this solution.
In our organization, we have about 2,500 people using the solution. We already use the solution at 100% capacity, meaning everyone in the company uses it. If new employees are onboarded, they also use the solution. Chances are, we will increase usage int he future.
How are customer service and technical support?
Technical support could move a bit faster. We find that it takes time - at least a day - to reach support and then get a response. Therefore, we're not completely satisfied with the level of service provided to us. It's an area that could be improved upon for sure.
Which solution did I use previously and why did I switch?
We used to use Carbon Black. We switched due to the fact that this solution offered us better partnership offers.
How was the initial setup?
The initial setup is not complex. It's very, very easy.
You can set up and deploy the product in 30 to 40 minutes. It's straightforward.
You only need a few people to handle deployment and maintenance.
What's my experience with pricing, setup cost, and licensing?
The price is very reasonable and quite competitive in the market.
Which other solutions did I evaluate?
Before choosing this solution, and switching from Carbon Black, we looked at Endgame and Kaspersky.
What other advice do I have?
We are working with all the versions for the most part, due to the fact that we are partners of CrowdStrike and we position CrowdStrike to our customers. We also use the solution for our company.
I'd recommend the solution to others, however, I would advise that they try it first as a POC so that they can first see the value of the product.
Overall, I'd rate the solution eight out of ten. If technical support could be faster and there was more device control, I would rate the solution higher.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. partner
Sr. IT Support Executive at a hospitality company with 1,001-5,000 employees
Great online learning and flawless endpoints but takes a while to scan
Pros and Cons
- "Their endpoint is pretty flawless. There is no lag on the machines at all. Even though I have a good overview of all the machines, that's pretty much the most valuable feature of CrowdStrike Falcon."
- "It does take more time to scan than other solutions."
What is our primary use case?
We primarily use the product as a security solution.
What is most valuable?
Their endpoint is pretty flawless. There is no lag on the machines at all. Even though I have a good overview of all the machines, that's pretty much the most valuable feature of CrowdStrike Falcon.
The machines are flawless. They don't have any issues. There I don't even recognize the machines which are on endpoints. Even when I go to the console to check these machines, they are working on a very good level, even though the wireless migration should detect those aspects.
The AI features are pretty good.
They've recently introduced more webinars that make remote learning of the solution very easy. For people such as myself, or even a company looking to develop their skillsets and interested in better understanding the cloud, providing good web courses is really helpful.
What needs improvement?
I'm new to the solution. Currently, I'm comparing it to other EDR solutions to see if anything is missing, however, I'm still learning the ins and outs of the product.
It may be due to the fact that I am new, however, I'm having trouble understanding their licensing.
It does take more time to scan than other solutions.
The solution should continue to make the learning curve as short as possible by providing even more training and documentation.
For how long have I used the solution?
I've been working with the solution for two months. I recently joined my company and they mostly prefer using CrowdStrike Falcon. The solution is pretty new to me.
What do I think about the stability of the solution?
The stability of the solution is excellent, especially in a market like India.
What do I think about the scalability of the solution?
The product is very scalable. The solution can scale well, especially for small setups looking to expand out in the future.
How are customer service and technical support?
If they're having an issue, we tend to stick to the team and occasionally reach out to the support team of Falcon CrowdStrike.
I've never directly been in contact with the technical support team, however, my colleagues have. I'd say that overall we are satisfied with their level of service. Typically, their technical support team will give us direct intel and then our internal team with resolve the issue, so it's a true partnership.
Also, during the pandemic, they've provided everyone with lots of webinars to help their clients understand the solution better. For me especially, being anew user, I'm benefitting from this new level of service.
Which solution did I use previously and why did I switch?
We've used different solutions in the past. It really depends on the environment. That typically dictates which solution we would implement. We use, for example, McAfee as well. I personally have worked with Amnesia.
When it comes to Amnesia, initially I was able to employ them on my on-premise machine. I have installed Falcon on the cloud and infrastructure, however, I haven't dealt with the on-premise deployment.
You can use Amnesia with McAfee. Apart from that you also have a provision for signing with McAfee and using their host software and the server software and their media solution and placing those onto an on-premise machine or onto a particular server and you would have the ability to administrate from there. That's more for a company that is into privacy and doesn't want to share their data on a cloud.
How was the initial setup?
The solution isn't complex in terms of setup. It's very straightforward, actually.
I'm sure that for small environments or a company that may scale up, the installation would be minimal. It wouldn't be a standard installation, however, we're able to implement rather easily in small environments.
What's my experience with pricing, setup cost, and licensing?
The solution is much more costly than other cloud or on-premises solutions. However, it offers good stability, so if a client can afford it, we tend to recommend it as an option.
Which other solutions did I evaluate?
I'm currently checking other EDR solutions to see what is on offer. Clients are asking about McAfee and Symantec, so I am looking at those as options.
What other advice do I have?
I'm unsure which version of the solution we are using.
I'm currently practicing my skills on this EDR solution. I have worked with this software and I've already collaborated with my seniors who are currently experts on this particular product. I'm getting pretty good help.
Most of our clients have their own infrastructure which is mostly on the cloud. They have their own solid, robust infrastructure. When it comes to small environments that are currently adapting to the cloud, CrowdStrike could be a great opportunity. The solution, for example, doesn't require a minimum installation. It can work well for very small companies as well as larger organizations.
If a company has the financial means, we tend to recommend this product. There are great security features on offer that are much better than other options in India at this time.
I'd advise companies considering this solution to check their resources. They have to choose the option between being on-premise and the cloud option. They need to try and run it before adopting any solution. It's important also to consider security and monitoring for threats.
Overall, I'd recommend companies study their environment and check and compile an e-solutions calendar. There's a lot of them. Microsoft has provided a 99GB advanced dataset collection and it is on the cloud.
I'd rate this product seven out of ten overall. While I've never had any problems with it, there are just so many other options on the market.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Dy General Manager at a real estate/law firm with 501-1,000 employees
Great user experience, very little maintenance required, and easy to set up
Pros and Cons
- "There's almost no maintenance required. It's very low if there's any at all."
- "The solution needs to have integration with on-premises security devices and security facilities. That means all the security products, including the perimeter firewall, the DMZ."
What is our primary use case?
The solution is primarily being used at our endpoint, which includes roaming users with laptops. It is being used in all of our servers at our data center. Our security team can monitor everything centrally using the Falcon dashboard. If there is an incident, our team can actually go to the root cause of the incident to try to solve it there.
What is most valuable?
The overall user experience is good. As of today, there have been no incidents that we've had to deal with and we've been using it for years.
The solution has a very good graphical interface. It makes it easy to use. The central monitoring is excellent.
There's almost no maintenance required. It's very low if there's any at all.
The solution is an AI and ML-enabled tool for protecting our endpoints. We're still able to use Symantec as an endpoint as well.
What needs improvement?
The solution needs to have integration with on-premises security devices and security facilities. That means all the security products, including the perimeter firewall, the DMZ.
I'd really like to have a complete solution. Right now most of the incidents happen on our endpoints. It is visible at the endpoint, the end server. If this can have a correlation tool that could actually give us a comprehensive dashboard, that would be useful. It could give us top-down visibility and could be from the firewall or any kind of security protection tool. It could be part of the DNS protection suite. However, that's why it's so important to have better integration capabilities.
If this endpoint is trying to get at this particular website and it is identified as DNS level protection, that also comes to this dashboard. Around 80% to 90% view of whatever it is happening with this endpoint, whatever action it is doing, can be inspected on the dashboard.
If the endpoint is protected by CrowdStrike. I am only to access this application through a CrowdStrike protected device.
For how long have I used the solution?
We have been using CrowdStrike as a tool now for the last three months.
What do I think about the stability of the solution?
The stability may be too early to judge, as we are still in a POC. However, when we see the product, it is very, very stable.
What do I think about the scalability of the solution?
We didn't go with the Basic version. We went with Superior. Even the insurance companies are also sold on this product.
We find that the solution is very, very scalable as a tool and it can completely manage and protect the endpoint. It offers around 99.99% of your protection and assurance and can scale up however much you like.
We have implemented it for approximately 200 users as a POC. We are ready to have a contract with CrowdStrike and we will be implementing it for 700 users in the end, so we will scale it from the POC when we begin to officially use it.
How are customer service and technical support?
Due to the fact that we are still running a POC, we have direct access to the principal on the contract. They have given us a lot of confidence in the product and they are always available alongside the system integrator. We basically have two layers of support.
At this initial stage, if there is any troubleshooting needed, or any type of support is required, the system integrator will provide this to us. If we need to escalate to support for some reason, we have agreed to have CrowdStrike themselves look into any issues.
So far, it's been an effective system and we are satisfied with the level of support we've received.
Which solution did I use previously and why did I switch?
We were using Symantec products, which were Symantec EndPoint Four and Five. We found that the latest modules needed additional tools to protect us. There were multiple tools needed at various levels. There was complexity in increasing users on this platform. It also took a more traditional approach to security, and we were looking for something more advanced that had advanced AI and ML capability.
We evaluated CrowdStrike and we found it satisfactory in our environment. Therefore, we decided to change to it from Symantec.
How was the initial setup?
The initial setup is very, very straightforward, and very easy to use. So far, we've found it very easy to drill down to the root cause.
This is a new area and product for us, so we decided to start using it as a POC. We started in March, or the end of February, of this year, and we have done a POC for some of our users. We'll be going forward with a full implementation and increasing our usage.
In terms of maintenance, I don't find there's much of a requirement for it. It is very easy to maintain. For monitoring and reporting purpose, we have access to a dashboard. Our security can take a look at everything themselves. We also have team members that are capable of configuring this product. That will help us to reduce the requirement of manpower in the long run.
What about the implementation team?
We had a system integrator partner that assisted us with the POC.
What's my experience with pricing, setup cost, and licensing?
I'm not sure what the exact cost of the solution is.
What other advice do I have?
We're a customer. We don't have a business partnership with this solution.
I'm not sure which version of the solution we're using right now. It is the latest, as far as I know. We're currently running a POC with it.
In today's environment, it's very crucial to protect a company from ransomware, and malware. We focus mainly on avoiding these types of attacks. We're always interested in the latest tools that have the latest techniques and are effective in our environment.
On top of that. we've noticed during the pandemic, there are even more threats happening. We need to focus most of our energy on the endpoints which are basically connected to an unprotected network.
The focus on the endpoints has to be increased at this point in time to ensure we have maximum protection. We prefer to have a cloud-based product rather than an on-premise-based product to protect our data and our endpoints. Therefore, we may need to move to a cloud-based protection suite. Other companies should also consider this. Whether they choose a product like CrowdStrike, Cortex, or Cylance is up to them.
I'd rate the solution eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Associate Director - Infrastructure Engineering at AFT
Great protection, excellent customer service, and an easy to understand UI
Pros and Cons
- "The UI is simple and self-explanatory. Everything is easy to understand."
- "Basically, they don't cover legacy OS or applications. That's the only issue we're concerned about"
What is our primary use case?
We primarily use the solution as advanced threat protection. It is used to protect all endpoints, servers, etc.
What is most valuable?
They're very good at what they do. As far as the product is, in its current state, I don't have any complaints at all right now. They do a quarterly review with us, just so they can let us know how many viruses or how much malware they've stopped, etc. Those features are quite good. They also go through the portal step-by-step to describe whatever they improved or tightened up. They will explain everything clearly and in a way that a customer can understand.
They do also ask for feedback, which is nice. They'll ask things like "The last time we changed this, how was your experience?" or "Did you get a lot of false positives?" or "Did you get any complaints?" etc. That's pretty good. Not many companies do that.
The UI is simple and self-explanatory. Everything is easy to understand.
So far, in the past three years, they've been absolutely great. They've been more proactive than the solution we had previously was. They even introduced new products in their line and they came back and told us that they could add that product to our current solution. At first, we added them, then we decided we had sufficient resources in house to manage it ourselves and removed it. They were great about the change.
They've caught quite a lot of viruses and malware that have been sent through improper links, which is very reassuring.
They report any network isolation that has been done on certain endpoints if they detect a malicious file or malware on the device that couldn't be cleaned by automation. They isolate it or us. The end-user can contact the service desk and say, "Hey, I'm not able to surf the internet. I can't do anything, so can you help me?" or we're able to look at the endpoint and see "oh, your PC is infected, that's why you aren't allowed on." It's protecting us well.
Even though the users are somewhere else, even when they're not at headquarters, we are able to remediate everything before we put them on the network again. Those network isolations are great when we detect high threat malicious items. Those are valuable tools that we appreciate.
What needs improvement?
If an operating system is stopped by support by the original vendor like Microsoft, or maybe Apple, within a few weeks, CrowdStrike will also decide they no longer support it, and they kind of move on. I understand their model. However, if we still have the OS, it's hard to keep it protected. So, for example, if Microsoft decides to stop supporting or patching a solution, Crowdstrike too will stop supporting it and making updates. It's still a useable product, it's just not getting updates or patches and therefore may be vulnerable.
The result is that we can't guarantee we're going to be able to protect that hardware or operating system. We either have to upgrade to a newer platform, which sometimes is not possible because you have a legacy application. Whatever that constraint is, sometimes we're not able to move things. We still have to rely on other products to support that. That's the only quandary I have with them.
Basically, they don't cover legacy OS or applications. That's the only issue we're concerned about.
When a file is infected or it detects a ransomware file network, when it does remediate, it should self-heal as Sophos does. That's a good feature to have, but I don't know enough pros and cons about that to kind of recommend that because if it is a false positive, that may be a problem. If it detected a valid file and if for some reason it decides, "Oh, this looks like an infection," and maybe it's not actually infected, and if it goes in and remediates it by replacing it with an older file, that may be a problem. However, I don't know, because I've never used that feature or heard anybody say that's a problem.
For how long have I used the solution?
I've been using the solution for about three years now.
What do I think about the stability of the solution?
I have two engineers that regularly watch everything. We all get alerts. We'll see if something gets isolated, or a user will tell us. We isolate the issues and work on them so nothing gets through the endpoints into the system. Within 30 minutes to an hour, an issue can be cleared.
It's therefore very stable. We're able to catch everything before it can get it. It's reliable for sure.
They're so pro-active there's very little intervention that we have to do on our end.
What do I think about the scalability of the solution?
The solution is easily scalable. A company shouldn't have any issues with that aspect of the solution.
How are customer service and technical support?
Technical support is great. We've never had to contact them at all. Instead, they've always been proactive and reached out to us.
Their quarterly review manager will contact us every three months. They schedule it months ahead and we actually jump on a Zoom or WebEx meeting. They actually go through the improvements, how much detections they go through, all of our features, anything new that has been added, anything they're seeing out in the world in terms of threats, and where we need to tighten up the roles.
They would improve the sensitivity level or they will decrease the sensitivity level for some false positives. For example, they might say "Hey, we detect these, but they're not really a threat because this is just a Word document that's produced in an older format. It's not something that's malicious." Then they would decrease the sensitivity in certain areas, to eliminate the issue going forward. They always ask permission before tweaking anything. They will come to us and say, "this is what we're considering doing it and why we want to do it. Is that okay?" We usually agree to that and then they go ahead and do it.
It's just a phenomenal company. If they ever stopped the way they handle their customer service, then I would probably move on to a different company. So far they've been pretty good. For the last three years, they contacted us always and told us about every aspect of the solution. I don't think I missed a quarterly meeting so far with them due to the fact that it's all been so valuable.
Which solution did I use previously and why did I switch?
Originally, we had Webroot. We used to get, every so often, a slew of viruses that would get through the cracks. I don't know if Webroot's definition didn't get updated in a timely manner or if they were just delayed in something, however, whatever it was, we used to get that intrusion quite a bit. Then we would patch it and we would have to remediate everything. It wasn't ideal.
We were looking for a product that would be more proactive than a reactive solution, and after doing a bunch of research, we decided on CrowdStrike.
How was the initial setup?
The solution's initial setup was very simple. The only thing we had an issue with is our network operation. Is a separate organization that manages it. We have a network operation that we used for 24 hour monitoring. They don't support CrowdStrike and they were not experts in it. They stood us we would have to manage it ourselves. In the beginning, we were kind of worried about it. However, after that initial stage, the simplicity of how to install it, configure it was like a breeze.
We manage the entire solution in house. For maintenance, we have me and two engineers, plus a second level of support. There are around five people altogether.
What's my experience with pricing, setup cost, and licensing?
I'm not sure of the exact cost of the solution. That's a detail our finance department handles.
Which other solutions did I evaluate?
We did research on Cylance. We looked at Norton as well. We went through a bunch of products and we decided CrowdStrike was probably the most advanced threat protection at that time, which was three years ago.
One of the products we were looking at is Sophos. The reason we were looking at Sophos is we were purchasing a backup and disaster recovery tool. In that tool, they had a built-in Sophos pack; they integrated Sophos in to protect the backup and replication and recovery. That way, if a backup had infections, for some reason, and they weren't picked up, and it got into our backup product, then Sophos could kick in and pick it up. It has automated remediation, meaning it reverses back the infection before infection if that makes sense.
Sophos has a self-healing technology built into it, which is an AI technology that they invented. We were looking at that because we thought that may be a better product. We were doing some homework on that and trying to figure out more about it. We're still in the process of purchasing a backup and recovery tool, so we're still doing our homework.
What other advice do I have?
We're just customers. We don't have a business relationship with the company.
I'm not sure which version of the solution we're using. The last time I checked, it was version 5.6. It is up-to-date, however. I get a report every so often saying, we've updated the sensors, or current version, etc. It's an auto-update and it does that. Whenever it's missing something or it couldn't reach an endpoint, the company will send me a report of that, saying these endpoints are not updated because we couldn't detect it on the network any longer.
The only advice I would say to others considering the solution is, if they have an unsupported operating system or legacy application, to look closely at CrowdStrike to see if the solution actually makes sense for them. This is due to the fact that they're not going to be able to support it. If they have thousands of servers and 20% of them are legacy applications, they may not want to think about CrowdStrike because the solution doesn't support legacy products. Other than that, I fully recommend CrowdStrike. The advanced threat protection they have has always been great.
I'd rate the solution a solid nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Service at Four-U Office Inc
Inexpensive, doesn't slow down devices, and an easy initial setup
Pros and Cons
- "The initial setup is very simple."
- "They don't really have anything when it comes to scanning attachments."
What is our primary use case?
We primarily use the solution for real-time ransomware protection.
What is most valuable?
The solution hasn't picked up a virus yet, so I don't know if I'm able to really discuss the most valuable aspect of the solution just yet. It's very new.
It's not costly, and it's not constantly running, it's only looking for suspicious items when it starts to take action. There's nothing constantly scanning your device, so it's not slowing anything down in that respect. That's what I liked about it the most.
It's not your traditional antivirus that just sits there constantly scanning your computer for Trojans and malware, etc. This doesn't take any action until it sees something actually going on.
The initial setup is very simple.
What needs improvement?
The solution doesn't have a whole lot of email security on offer. We did know that going into the purchase, however. We decided to get a different solution for that aspect of security.
They have a sandbox feature, but it's all they do. They have different grades. There's the Socket Pro and then there's an ADR. Then there's another one where they pretty much watch your system for you. And it's all different. It's all based on the price you want to spend. I wasn't going to drop a large amount of money.
They don't really have anything when it comes to scanning attachments. That would be something I would like.
For how long have I used the solution?
I've only been using the solution for one month. It's still a relatively new product for us.
How are customer service and technical support?
The technical support so far has just been helping with the setup via the initial webinar. The technician was very knowledgeable. He knew what each feature meant. If I had a question about it, he went into great depth. I've been quite satisfied with technical support so far. As a whole, they are very easy to work with.
Which solution did I use previously and why did I switch?
I had Bitdefender for three years before switching to this solution.
They were fine. I didn't have a lot of problems, but I'd been hit with ransomware four times while I had Bitdefender. I considered that as kind of a sign that maybe we should change things up.
The malware, as far as uninstalling, wasn't triggering the antivirus. I wanted something a little more advanced, due to the fact that the Ransomware protection just really wasn't there. The anti-virus aspect was pretty good. The email protection was pretty good, as well.
How was the initial setup?
The initial setup is pretty easy. It's very simple to work with. It's been really easy to install.
What about the implementation team?
I did one webinar with a support engineer. He showed me how to set it up, and to run with it.
We just did a screen share. He gave me insights into the best possible way to set it up and that's how I rolled it out. It was a helpful experience.
What's my experience with pricing, setup cost, and licensing?
The pricing on CrowdStrike is per license. It was about $42 per seat yearly.
Which other solutions did I evaluate?
I looked at Komodo, a Gen One antivirus. I liked their product. It was pretty good. They have what is called a sandbox feature where you could take a file or the endpoint security will take the file and dump it into like a virtual sandbox and run it to test its safety. It turned out the file was malware, the solution would remove it.
We decided not to go with it, however, due to the fact that it didn't have many reviews. Komodo is actually cheaper than CrowdStrike. I've been down the road before with bad antiviruses and had some bad experiences. Since they didn't have a whole ton of notoriety out there, you didn't see a lot on it, which kind of scared me away from it, even though I liked what they had.
CrowdStrike, it's new, however, Amazon uses it. My thoughts are if it's good enough for them, I assume it's good enough for me.
We looked at Sophos as well, however, it was very expensive. Sophos offers everything, and they are a great product, however, for us, the price was just too much.
What other advice do I have?
We're just a customer. We don't have a special relationship with CrowdStrike.
We're using the most up to date version of the solution right now.
So far, I've had good luck with this solution. That said, it hasn't hit anything. I won't get a true test until I actually get somebody that sends up malware. In the meantime, no news is good news.
I would rate the solution nine out of ten right now. They're pretty good. I haven't done anything super-advanced or to spec. There's a lot there to work with if I want to, however, I keep it pretty basic. I only have a couple of policies. It's not a huge company, so it's not real hard.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free CrowdStrike Falcon Report and get advice and tips from experienced pros
sharing their opinions.
Updated: September 2025
Product Categories
Extended Detection and Response (XDR) Security Information and Event Management (SIEM) Endpoint Protection Platform (EPP) Threat Intelligence Platforms Endpoint Detection and Response (EDR) Attack Surface Management (ASM) Identity Threat Detection and Response (ITDR) AI-Powered Cybersecurity PlatformsPopular Comparisons
Microsoft Defender for Endpoint
Fortinet FortiEDR
Splunk Enterprise Security
Microsoft Sentinel
Darktrace
SentinelOne Singularity Complete
IBM Security QRadar
Microsoft Defender XDR
HP Wolf Security
Cortex XDR by Palo Alto Networks
Fortinet FortiClient
Elastic Security
WatchGuard Firebox
Trellix Endpoint Security Platform
Buyer's Guide
Download our free CrowdStrike Falcon Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- I would like to compare CrowdStrike and Carbon Black. On what basis should I decide?
- What is the biggest difference between Carbon Black CB Defense, CrowdStrike, and SentinelOne?
- What do you recommend to choose when replacing Symantec EDR: SentinelOne or CrowdStirke Falcon?
- What is the biggest difference between CrowdStrike and Cylance?
- CrowdStrike Falcon vs Microsoft Defender ATP: Comparison of features and performance
- Is Crowdstrike Falcon better than Trend Micro Deep Security?
- What are the pros and cons of Darktrace vs CrowdStrike Falcon vs alternative EPP solutions?
- Which solution do you prefer: CrowdStrike Falcon or SentinelOne Singularity Complete?
- How does Microsoft Defender for Endpoint compare with Crowdstrike Falcon?
- How does Crowdstrike Falcon compare with FireEye Endpoint Security?