Falcon helps my client improve productivity. About 5,000 users at the client company are using the product.
Cybersecurity solution architect Individual Contributor at IQSEC SA
The agent is light, so it doesn't require many resources on the machines
Pros and Cons
- "CrowdStrike enables the infrastructure managers to visualize all the events and get information about the network."
- "There are some areas where some customers would prefer a different service."
What is our primary use case?
How has it helped my organization?
CrowdStrike enables the infrastructure managers to visualize all the events and get information about the network.
What is most valuable?
It's important for the customer to have surety that all the workstations are protected.
What needs improvement?
There are some areas where some customers would prefer a different service.
Buyer's Guide
CrowdStrike Falcon
December 2024
Learn what your peers think about CrowdStrike Falcon. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,053 professionals have used our research since 2012.
For how long have I used the solution?
About four months ago, I and my other partners started preparing a presentation to propose CrowdStrike to a client.
What do I think about the stability of the solution?
Falcon is a highly stable product.
How are customer service and support?
I rate CrowdStrike's support 10 out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We worked with other solutions, like Trend Micro. CrowdStrike's advantage is that the agent is light, so it doesn't require many resources on the machines. It's easy to install, and the results are useful to the organization.
How was the initial setup?
I'm not directly involved with the setup. I prepare a proposal, and another department deploys the solution. Falcon doesn't require maintenance because the product runs in a cloud environment.
What about the implementation team?
We use a reseller and an integrator.
What was our ROI?
I rate CrowdStrike Falcon 10 out of 10 for ROI.
What's my experience with pricing, setup cost, and licensing?
My customers pay for yearly licenses. I rate CrowdStrike Falcon 10 out of 10 for affordability.
What other advice do I have?
I rate CrowdStrike Falcon 10 out of 10.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Cyber Security Analyst at a tech vendor with 10,001+ employees
Excels at identifying suspicious activity, helps mitigate potential security breaches, and is easy to use
Pros and Cons
- "The detection and response console is the most valuable feature."
- "We encounter occasional issues, such as when disabling network access for a host that uses CrowdStrike."
What is our primary use case?
We use CrowdStrike Falcon to investigate security detections for malicious activities in our environment.
CrowdStrike utilizes machine learning algorithms and detection rules to generate alerts for suspicious activity within our environment. We then investigate these detections individually, analyzing the details of each event.
In addition to automated detection, CrowdStrike allows for custom queries. For instance, if we need to investigate a specific host, we can leverage a cloud security language to examine its activity. Similarly, we can use CrowdStrike to search for activity related to particular users or hosts.
How has it helped my organization?
CrowdStrike Falcon provides significant additional value. It excels at identifying suspicious activity the moment an application appears in the environment, immediately bringing these incidents to the attention of our response team. Upon receiving an alert, our team can investigate and take appropriate action if anything malicious is found. In essence, CrowdStrike Falcon acts as a strong barrier against attackers.
In the past 3 years, we have encountered many scenarios where CrowdStrike Falcon has helped mitigate potential security breaches.
What is most valuable?
The detection and response console is the most valuable feature.
What needs improvement?
We encounter occasional issues, such as when disabling network access for a host that uses CrowdStrike. In these cases, the access disable process can be quite slow.
I'm using CrowdStrike Query Language, and I've noticed an issue with event backups. Searches exceeding a certain event threshold aren't capturing all results. For instance, if I run a search that returns 10,000 events in a single day, only 2,000 events are backed up. This limitation with CrowdStrike Query Language needs to be investigated.
For how long have I used the solution?
I have been using CrowdStrike Falcon for over 3 years.
What do I think about the stability of the solution?
CrowdStrike Falcon is generally stable, although event searches may occasionally experience slow performance.
What do I think about the scalability of the solution?
CrowdStrike Falcon's scalability is dependent on the license acquired.
How are customer service and support?
The technical support live chat can experience long wait times. Submitting a ticket may result in a quicker response.
Which solution did I use previously and why did I switch?
The company was using Carbon Black before I joined. When I came on board, they decided to switch to CrowdStrike.
What other advice do I have?
I would rate CrowdStrike Falcon 9 out of 10.
CrowdStrike Falcon is deployed across multiple end-user systems and locations.
I recommend CrowdStrike Falcon. It's a wonderful security platform that's easy to use and requires minimal effort to maintain.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: Apr 24, 2024
Flag as inappropriateBuyer's Guide
CrowdStrike Falcon
December 2024
Learn what your peers think about CrowdStrike Falcon. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,053 professionals have used our research since 2012.
Director Of Information Technology at TollPlus LLC.
An AI-driven solution that self-activates to find issues and provide alerts
Pros and Cons
- "The solution is silent and sits on your system as one single agent."
- "Technical support could be better than what is currently offered."
What is our primary use case?
Our company's line of business includes financial transactions with an insurance policy that requires EDR protection. Compliance is part of our policy and agreement with customers.
We currently have 1,100 users of the solution.
What is most valuable?
The solution is silent and sits on your system as one single agent.
Only one or two MB of memory are consumed which is much less than other products.
The solution is AI-driven so it self-activates to find issues and provide alerts or notifications rather than running all the time.
The portal is very user-friendly so it is not difficult to manage.
The solution doesn't require system restarts. That is one disadvantage of Symantec or Kaspersky because they require restarts when you uninstall or reinstall.
What needs improvement?
Technical support could be better than what is currently offered.
For how long have I used the solution?
I have been using the solution for three months.
What do I think about the stability of the solution?
The solution is stable with no issues.
We have only used the solution for three months so will continue to monitor stability for the next several months.
I rate stability an eight out of ten.
What do I think about the scalability of the solution?
The solution is scalable. We do not yet have the requirement to take an in-depth look at scalability.
I rate scalability an eight out of ten.
How are customer service and support?
Technical support could be better because there are ownership issues.
For example, when you raise a support case there is not much communication between the account manager and support. The account manager is supposed to own the case but instead is disconnected from it.
I rate support a six out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We previously used Symantec and Kaspersky.
How was the initial setup?
The setup is pretty easy to walk through without much trouble.
I rate setup an eight out of ten.
What about the implementation team?
We utilized a third-party for implementation. They helped us with the admin console, training, and the pilot setup that we eventually took over. Our internal team included two security staff and four support staff.
We were moving from Symantec and Kaspersky. We targeted our servers first because Symantec is difficult to uninstall and there is an interim process for removal. Once completed, we installed the solution.
It took about two months to complete implementation across all systems.
What was our ROI?
We did our homework in advance for cost or other things to calculate ROI. The solution met our expectations so ROI is rated a seven out of ten.
What's my experience with pricing, setup cost, and licensing?
The pricing is competitive and includes all features and support.
I rate pricing an eight out of ten.
Which other solutions did I evaluate?
We evaluated Microsoft Defender, Sophos, Symantec, and Trend Micro before choosing CrowdStrike Falcon.
What other advice do I have?
I recommend using the solution and rate it an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Information Security Assurance Engineer at School District of Lee County
Robust threat hunting and great ability to do on-keyboard remote response and quarantining of devices
Pros and Cons
- "It's ability to do threat hunting is really great, quite robust, and even allows you to do hygiene stuff."
- "The ability to receive text alerts natively in the console would be kind of cool."
What is our primary use case?
We integrate the data from this solution with ExtraHop, which is an NDR. Being able to move between both platforms and have network-level data and transactions over the network feed into XDR CrowdStrike is really powerful. It helps us make better decisions, it makes better decisions without human intervention, and it hones the analytics a little bit. The EDR aspect of it works almost exactly the same as the regular Falcon product. I will say that it's probably a lot better at scale than what we're using it for. I work at a school district, so for the individual schools, it's nice to see and isolate issues and have reports built by individual school locations rather than just everything looking like a whole hodgepodge of computers.
What is most valuable?
It's ability to do threat hunting is really great, quite robust, and even allows you to do hygiene stuff, like look for old versions of applications that maybe you forgot about or find stuff that people are running that maybe you don't want on your network, and it lets you get rid of those. Also, its ability to do on-keyboard remote response and run PowerShell script through the sensor is pretty sick. It's ability to quarantine devices is also pretty great.
What needs improvement?
The ability to receive text alerts natively in the console would be kind of cool. Some people put their email on quiet hours, so having it natively in the system would be nice.
I know that they offer an identity piece and a firewall piece and we haven't subscribed to or purchased either of those, but having some of that data in the base program would be good, and then if you want more control, you pay for it. There's times where I want to look at an internet history of a device that's remote, or I want to see logins, successful or unsuccessful. I don't want to manage identity and I don't want CrowdStrike to alert on it, but it would be nice if the ability to see the data was included with the base product. Then that could kind of get your foot in the door with having the ability to look at that information, but not being able to do anything actionable with it.
For how long have I used the solution?
I have been using this solution for two years.
What do I think about the stability of the solution?
The solution has never failed. The only false positives that we get are ones that we test with. I do true and false positive testing every month to make sure stuff is working correctly and the solution picks up on it.
What do I think about the scalability of the solution?
The solution is very scalable. Our proof of concept was a few devices and now at full scale we have 50,000 devices. It's a cloud console, so if you do the implementation right and the sensor is put on in an automated process, it doesn't matter how many computers you have. It just runs. They have sensors for every kind of device: Macs, Windows, Linux, and I think even Android.
How are customer service and support?
The support is great. They're quick to respond and you see the same names pretty consistently. They probably do it by region or account or something like that, so it's not just a random person every time.
How was the initial setup?
The setup is as complex as you want to make it. They have engineers that help you. We did a proof of concept first and that was pretty seamless. If you want to build out a bunch of dynamic groups and have different policies affect the different groups separately, you can. If you want to purchase a bunch of licenses for integration with different products, they partner with a bunch of different security vendors and you can make it as complex or simple as you want. If you just want NextGen AV, you can just have NextGen AV and it's super simple and the sensor just sits on a computer, but if you have a bunch of data and want it to be really complicated and want to be able to do whatever you want, you can do that too. It's pretty flexible, in that sense.
What about the implementation team?
Getting it off the ground took myself, one CrowdStrike engineer, and we could have done it with one systems engineer, but we had two because one was on the client side for the Windows hosts and one was for enterprise for the data center and servers. We did it with four people, and me and one other guy manage it ourselves.
What other advice do I have?
We pay for Overwatch, which is kind of like a sock where someone that works for CrowdStrike monitors certain aspects of your network, and then they can make notes and quarantine devices for you, and they'll alert you at 2:00 in the morning. It's really great, but it takes two people to manage the alerts after a bit of tuning to make sure that the stuff that is on your network that you want to be there, that's getting picked up by CrowdStrike, is excluded. I get maybe ten alerts a day, but that comes from having good hygiene in other areas. If you're not preventing those alerts or fixing the problems that CrowdStrike is picking up, you're going to have a lot of work to do, but if you use CrowdStrike as a hygiene tool, it's a lot easier to manage.
My advice would be to automate as much of the management as you can. Sensor deployment can be really annoying, but if you figure out how to automate it in your environment, that will make it way easier. That way, as the devices are provisioned, they have the sensor on them and they just pop up into your console. I know some people do it by hand and that's a nightmare.
I would rate this solution as a nine out of ten. It's really good.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Information Security Engineer at a non-tech company with 10,001+ employees
Provides real-time response, helps reduce malware risk, and provides advanced investigation capabilities
Pros and Cons
- "The most valuable features of CrowdStrike Falcon include Falcon Fusion workflows and endpoint detection capabilities."
- "I've found that CrowdStrike's technical support could benefit from increased technical expertise."
What is our primary use case?
Our organization uses CrowdStrike Falcon for a variety of security tasks, including incident response, investigations, malware analysis, and threat hunting. This comprehensive platform excels at detecting malware across various technologies and endpoints within our environment.
CrowdStrike Falcon functions as a threat detection platform. It identifies malware based on pre-defined signatures and rules. Upon detection, it triggers a response and provides a dashboard for further analysis. This allows us to assess if the malware poses a risk to our organization or if it's a false positive. For confirmed threats, we can then delve deeper for a thorough investigation to uncover any underlying malicious intent.
Our primary goal is to prevent malware-related risks proactively. By leveraging CrowdStrike Falcon, a premium endpoint detection and response tool, we can safeguard our organization from malware exploitation attempts employed by hackers.
How has it helped my organization?
The primary advantage of CrowdStrike Falcon is twofold: reducing malware risk and providing advanced investigation capabilities. Traditional antivirus solutions struggle to keep pace with ever-evolving malware threats. CrowdStrike Falcon utilizes cutting-edge technology to proactively prevent these threats, minimizing the risk of infection. Falcon also features a threat intelligence platform that keeps us informed about the latest global malware threats and compromised tactics. This real-time awareness empowers us to proactively prevent threats before they impact our environment.
Recently CrowdStrike Falcon detected and mitigated malware that would have compromised several vulnerabilities in our environment.
Falcon's real-time response capability ensures we can quickly access any compromised host. This is a valuable advantage over other EDR tools.
What is most valuable?
The most valuable features of CrowdStrike Falcon include Falcon Fusion workflows and endpoint detection capabilities.
What needs improvement?
I've found that CrowdStrike's technical support could benefit from increased technical expertise. In my experience, their representatives haven't been able to resolve my issues as effectively as I would have liked.
For how long have I used the solution?
I have been using CrowdStrike Falcon for 1.5 years.
What do I think about the stability of the solution?
I would rate the stability of CrowdStrike Falcon nine out of ten.
What do I think about the scalability of the solution?
I would rate the scalability of CrowdStrike Falcon eight out of ten.
How are customer service and support?
I've found the technical support staff to be less knowledgeable than I'd expect. Ideally, they should have expertise in all CrowdStrike modules, as we utilize a wide range of them.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We previously used security solutions from Symantec, Trend Micro, Trellix, and Mandiant. However, CrowdStrike Falcon stood out as a more premium offering. Its advanced capabilities and comprehensive approach to security ultimately led us to switch providers after careful consideration of several factors.
How was the initial setup?
The initial deployment was straightforward and took less than 15 days to complete.
There were between 30 to 40 people involved in the deployment.
What about the implementation team?
Our security engineering team implemented CrowdStrike Falcon entirely in-house. We also received some support from our internal desktop team and leveraged the expertise of an internal managed service provider team. No third-party vendors were involved in the deployment.
What's my experience with pricing, setup cost, and licensing?
CrowdStrike Falcon is more expensive than other EDR solutions with similar features.
What other advice do I have?
I would rate CrowdStrike Falcon nine out of ten.
After deployment, there are some simple maintenance tasks to keep everything functioning well.
New users should learn about the different modules of CrowdStrike Falcon and their functionalities to work effectively with the tool.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: Mar 28, 2024
Flag as inappropriateChief Security Officer at a financial services firm with 201-500 employees
Protects employees wherever they are and offers visibility into what machines need patching, but the deployment process needs improvement
Pros and Cons
- "The OverWatch is the most valuable feature to me. It's a 24x7 monitoring service, and when they see anything suspicious in my environment, they will investigate."
- "If we have a dashboard capability to uninstall agents, I think that would be great."
What is our primary use case?
We have several use cases including threat management, EDR, AV, and a SOC with 24x7 monitoring.
How has it helped my organization?
The fact that CrowdStrike is a cloud-native solution is very important. We don't have to deal with any upgrades on the appliances or console. The only thing we have to deal with is the upgrade of the agents. The SaaS model works very well for smaller companies like us.
The flexibility and always-on protection that is provided by a cloud-based solution are important to us. The cloud is everywhere. So, with the agent on the laptop, wherever the user may go, including home, office, or traveling, it's protected 24x7, all the time. That's what we require and this is what we got.
We haven't had cases where we have quarantined any material stuff yet, because we are relatively small and we don't see a lot of malware in our environment. In this regard, it has been relatively quiet.
In terms of its ability to prevent breaches, if you look at the cyber kill chain, the sooner you detect malicious activity, the better you are in responding as opposed to waiting for a data breach. I think CrowdStrike is capable of identifying malicious activity throughout the whole cyber kill chain. Step one is establishing when they have a foothold in the environment, and then detect whether they are moving laterally. The sooner they are discovered, the better we are at stopping data breaches.
CrowdStrike has definitely reduced our risk of data breaches. It reduces the risk of ransomware and it gives us comfort that someone is watching our back.
We had some end-of-life workstations that were running Windows 7 and for some reason, related to PCI compliance, CrowdStrike rejected them. This helped us in terms of maintaining our PCI compliance.
What is most valuable?
The OverWatch is the most valuable feature to me. It's a 24x7 monitoring service, and when they see anything suspicious in my environment, they will investigate. Essentially, they're an extension of my team and I like that. We're a small company and we only have a base of approximately 260 employees. As such, we cannot afford to hire skilled security people. So this makes sense for a smaller company like us.
There is a helpful feature to look into the vulnerability of the endpoint, which allows us to see which PCs have been patched and which ones have not. That helps my team to focus on those PCs that require their attention.
What needs improvement?
The deployment process is an area that needs to be improved. For some reason, CrowdStrike does not provide any help in terms of how to deploy the agent in a more efficient manner. They just don't provide the support there, which leaves their customers to figure out how to push agents out, either through GPO or through BigFix or through SCCM, and there was no support on that side. Not being able to complete the deployment in an efficient manner is one of the huge weaknesses.
It would be good if they had a feature to remove agents. We're in a transaction processing environment and if CrowdStrike is affecting a transaction processing server, we need to uninstall that agent pretty fast. Right now, the uninstall has to be done manually, which is not great. If we have a dashboard capability to uninstall agents, I think that would be great.
The dashboard seems a little bit too clunky in the sense that it's spread out in so many ways that if you don't log in on a daily basis, you're going to forget where things are. They can do a better job in organizing the dashboard.
For how long have I used the solution?
I have been using CrowdStrike Falcon for approximately five months.
What do I think about the stability of the solution?
I haven't had any issues for five months since we've installed it, which is good to know. No users have complained about any CPU spikes or false positives, which we like.
What do I think about the scalability of the solution?
If you have a way to deploy agents in a rapid manner, I think the scalability is there. As we buy and acquire companies, we have to roll out agents to those places. Right now, it's still very manually intensive and it slows down the process a lot. So, I think the scalability can be improved with a rapid deployment feature.
Our strategy right now is just to install CrowdStrike for PCs and laptops. Once we get comfortable with the technology, we can start testing the servers. It's just that we haven't finished the deployment to PCs and workstations yet.
We have approximately 260 endpoints and we're probably about 20% complete in terms of deployment.
How are customer service and technical support?
We've raised support tickets such as the request for rapid deployment capabilities. However, we only received responses to the effect that they do not support anything like it. In that regard, the support has not been great.
That said, we don't use the support site a lot because we haven't had any issues with CrowdStrike. So, I can't say much about that.
Which solution did I use previously and why did I switch?
Prior to CrowdStrike, we used Carbon Black Threat Hunter.
There is a huge difference between the two products. CrowdStrike is quiet. I think that Carbon Black Threat Hunter just locks everything that has to do with the endpoint. You generate a lot of noise, but it means nothing. Whereas CrowdStrike is more about real threats and we haven't seen much from it.
On the other hand, with Carbon Black Threat Hunter, we were able to deploy pretty fast and we could uninstall agents pretty quickly from the dashboard.
I had originally heard about CrowdStrike Falcon from my peers. A lot of CSOs that I have roundtable discussions with speak highly about it.
How was the initial setup?
The sensor deployment is a manual process right now, where we have to log into every workstation, every server, and install it manually. It's very time-consuming.
It's an ongoing process across our organization.
What about the implementation team?
One of our security engineers is in charge of deployment. However, we don't have someone on it full time. He works on this when he has time available, so we probably only have one-third of a person working on it.
What's my experience with pricing, setup cost, and licensing?
We completed a PoC using the trial version, and it was pretty easy to do. It took us less than an hour to deploy. It was just a matter of downloading a trial agent and setting it up.
Having the trial version was important because the easier the PoC is, the better the chances are of us buying the tool.
At approximately 40% more, Falcon is probably too expensive compared to Cisco AMP and Cylance, although that is because of the OverWatch feature. If you took out the OverWatch feature then they should be about the same. There are no costs in addition to the standard licensing fee.
Which other solutions did I evaluate?
We evaluated other products including Cisco AMP and Cylance. Neither of these products has the Overwatch feature that CrowdStrike has. The reason why we chose CrowdStrike was that we need to have 24x7 monitoring of our endpoints. That's the main difference.
In terms of ease of use, CrowdStrike is not so great. Cisco AMP has a better, cleaner dashboard and they're more mature in the way that you navigate. It's as though they have spent time getting customers to click on features and then figured out which is the quickest way to get to what you want, whereas CrowdStrike is not there in that sense.
Cylance is even better in terms of ease of use. They dumb it down to only a small number of menus and dashboards. There are probably only five dashboards that I look at on Cylance, whereas with CrowdStrike, I have to look at many.
What other advice do I have?
My advice for anybody who is considering CrowdStrike is definitely to start with a PoC, and then definitely to subscribe to OverWatch. I think that OverWatch is the main benefit to it.
The biggest lesson that I have learned from CrowdStrike is about the different threats that are out there. They have a nice dashboard with information about threats, and you can read it and learn from it.
I would rate this solution a seven out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
CTO at GM Modular
The integration is flexible, helps identify required patches, and excels in external media control
Pros and Cons
- "The most valuable aspects of CrowdStrike Falcon for me are its device observability, identification, and software and OS recognition."
- "If CrowdStrike can further expand its support for XDR compatibility, that would give it an edge over all the other competing new products."
What is our primary use case?
CrowdStrike Falcon is our platform for IT security, encompassing endpoint security, cloud security, and EDR capabilities.
How has it helped my organization?
CrowdStrike protected us from a cyberattack. That's why I believe it's a very effective product. It's already prevented attacks on 2 occasions. It successfully quarantined suspicious files, essentially making our organization much safer.
We also leverage CrowdStrike Falcon Overwatch, a managed threat-hunting service offered by CrowdStrike. This service complements CrowdStrike's EDR functionality, which provides automated detection and response capabilities against external attacks. In our case, CrowdStrike successfully identified and automatically contained a cyberattack launched against our organization.
Our CrowdStrike Falcon integration with our SIEM is proving to be flexible.
What is most valuable?
The most valuable aspects of CrowdStrike Falcon for me are its device observability, identification, and software and OS recognition. It also excels in external media control, particularly USB access. The ability to disable USB access to flash drives significantly improves security.
Furthermore, Falcon helps identify patches needed for Windows, Mac, and other operating systems. This provides valuable reports and insights into our system vulnerabilities, allowing us to proactively address them.
What needs improvement?
If CrowdStrike can further expand its support for XDR compatibility, that would give it an edge over all the other competing new products.
For how long have I used the solution?
I have been using CrowdStrike Falcon for 2 years.
What do I think about the stability of the solution?
I would rate the stability of CrowdStrike Falcon 8 out of 10.
What do I think about the scalability of the solution?
We've deployed CrowdStrike Falcon across all 3,000 of our endpoints, and it has demonstrated excellent scalability. Therefore, scalability is not a concern for CrowdStrike in terms of performance or its ability to handle growth.
I would rate the scalability a 9 out of 10.
How was the initial setup?
The deployment was straightforward, taking 2 months for 3,000 endpoints. We implemented it directly where needed. The process was simple and easy. We believe this approach offers advantages due to its lower complexity compared to other methods. Careful planning was essential, and with a clear plan for sensor installation, we were able to execute the deployment successfully.
What about the implementation team?
While a third party handled the implementation, the OEM provided us with direct training on Falcon alongside CrowdStrike.
What was our ROI?
CrowdStrike Falcon has demonstrably provided a positive return on investment. We've already encountered two specific instances where, without CrowdStrike, the company would have faced millions in damages. In one case, we would have likely lost our entire SAP system.
What's my experience with pricing, setup cost, and licensing?
The pricing of CrowdStrike Falcon is competitive.
Which other solutions did I evaluate?
After evaluating SentinelOne, we found CrowdStrike to be a superior solution. CrowdStrike offers advantages in dashboard compatibility and a feature called Overwatch, which gives it a competitive edge.
What other advice do I have?
I would rate CrowdStrike Falcon 8 out of 10.
CrowdStrike Falcon is deployed in multiple branches across India.
No maintenance is required from our end.
I recommend CrowdStrike Falcon. It is not a solution we need to think twice about using.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: Mar 28, 2024
Flag as inappropriateCyber Security Manager at a healthcare company with 10,001+ employees
Provides great protection and can crosscheck environments. Helpful in investigating any alerts
Pros and Cons
- "It provides very good protection and the ability to crosscheck environments."
- "Falcon could include more integrative features."
What is our primary use case?
We use the EDR feature.
What is most valuable?
This is unlike any other EDR solution that I am familiar with. It provides very good protection and the ability to crosscheck environments. It's really helpful in investigating any alerts and is easy to use. You can use some of the Splunk language to search.
What needs improvement?
We've tried some integrations with solutions, closing off false positives and things like that. Falcon could include more features in that area. In addition, some features are modularized and we're unable to buy them as we're in the healthcare field and limited in the amount we can invest.
For how long have I used the solution?
I've been using this product for close to 18 months.
What do I think about the stability of the solution?
We haven't had any stability issues.
What do I think about the scalability of the solution?
The solution is very scalable but we had issues with some groups, that manage their own devices and wanted to have access to self-manage them. We weren't able to do that, unfortunately.
How are customer service and support?
My team has interacted with tech support and I believe the issues were resolved in a timely manner.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used other solutions such as Setinel One.
How was the initial setup?
The initial setup was very straightforward and smooth.
What's my experience with pricing, setup cost, and licensing?
Falcon is more expensive than every other solution on the market. That said, they do have a better product than anyone else.
What other advice do I have?
Some of the default settings are set to 'easy' which isn't sufficient. We had some conversations around this and the recommendation was to change some of these settings to more aggressive ones on the policy side. I know some organizations have had issues automatically updating CrowdStrike to the latest version. I recommend going through the change process but saving it at minus one for a while to avoid all the negative downtimes where you might need to roll back to the previous update.
When we switched to CrowdStrike, we didn't expect it to find anything that was already on the computer because the primary reason we swapped was because of EDR. But it did find things that were dormant as well as other things.
I rate this solution nine out of 10.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free CrowdStrike Falcon Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2024
Product Categories
Endpoint Detection and Response (EDR) Security Information and Event Management (SIEM) Endpoint Protection Platform (EPP) Identity Management (IM) Threat Intelligence Platforms Active Directory Management Extended Detection and Response (XDR) Attack Surface Management (ASM) Ransomware Protection Identity Threat Detection and Response (ITDR) AI-Powered Cybersecurity PlatformsPopular Comparisons
Microsoft Defender for Endpoint
Fortinet FortiEDR
Cisco Secure Endpoint
SentinelOne Singularity Complete
Microsoft Defender XDR
IBM Security QRadar
Elastic Security
Intercept X Endpoint
Trend Vision One Endpoint Security
Kaspersky Endpoint Security for Business
Check Point Harmony Endpoint
Trend Vision One
VMware Carbon Black Endpoint
Buyer's Guide
Download our free CrowdStrike Falcon Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- I would like to compare CrowdStrike and Carbon Black. On what basis should I decide?
- What is the biggest difference between Carbon Black CB Defense, CrowdStrike, and SentinelOne?
- What do you recommend to choose when replacing Symantec EDR: SentinelOne or CrowdStirke Falcon?
- What is the biggest difference between CrowdStrike and Cylance?
- CrowdStrike Falcon vs Microsoft Defender ATP: Comparison of features and performance
- Is Crowdstrike Falcon better than Trend Micro Deep Security?
- What are the pros and cons of Darktrace vs CrowdStrike Falcon vs alternative EPP solutions?
- Which solution do you prefer: CrowdStrike Falcon or SentinelOne Singularity Complete?
- How does Microsoft Defender for Endpoint compare with Crowdstrike Falcon?
- How does Crowdstrike Falcon compare with FireEye Endpoint Security?