I am working for an MSSP. We use CrowdStrike on a daily basis for different clients across the globe for security purposes and for monitoring and remediating threats. We have installed agents on the machines of employees in different organizations. We monitor their activities and block several applications. For example, if an organization does not want its employees to use WhatsApp on company-provided laptops, we block such applications. We also monitor malicious activities. If an employee downloads a file from the internet that is not legitimate, such as a virus or malware, we connect to the machine, remove all the files, and run different scans to ensure nothing is harmed. Additionally, we use it for inventory purposes. At the end of the year, for audit and compliance, I gather information about how many devices, servers, and workstations we have and what their types are.
CrowdStrike Falcon is used primarily to enhance cloud security through a lot of automation in the platform. It provides benefits like automation, efficacy, and lower risk, allowing security analysts to focus on high-value tasks.
Learn what your peers think about CrowdStrike Falcon Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
CrowdStrike Falcon Cloud Security is a platform of cloud security solutions aimed at protecting organizations from breaches while simplifying cloud security management. The unified platform combines several cloud security functionalities for comprehensive protection. Built on the CrowdStrike Falcon Platform, it leverages the powerful agent and technology used in CrowdStrike's renowned endpoint protection solutions, extending its capabilities seamlessly to cloud environments.
CrowdStrike...
I am working for an MSSP. We use CrowdStrike on a daily basis for different clients across the globe for security purposes and for monitoring and remediating threats. We have installed agents on the machines of employees in different organizations. We monitor their activities and block several applications. For example, if an organization does not want its employees to use WhatsApp on company-provided laptops, we block such applications. We also monitor malicious activities. If an employee downloads a file from the internet that is not legitimate, such as a virus or malware, we connect to the machine, remove all the files, and run different scans to ensure nothing is harmed. Additionally, we use it for inventory purposes. At the end of the year, for audit and compliance, I gather information about how many devices, servers, and workstations we have and what their types are.
We are using CrowdStrike Falcon for endpoint protection across the organization.
I sell and resell CrowdStrike Falcon Cloud Security as part of my company's cybersecurity portfolio for endpoint detection platforms.
CrowdStrike Falcon is used primarily to enhance cloud security through a lot of automation in the platform. It provides benefits like automation, efficacy, and lower risk, allowing security analysts to focus on high-value tasks.
I use the solution in my company to collect information about protecting the endpoint, configuration assessment, and vulnerability assessment.
We give MDR services to many clients and extend the basic capabilities with these modules.