I use the solution in my company on the endpoint, and then we're using it on our point of sales in all of our franchisees' locations, and then we have about seven brands. We are deploying a new point. We are using it as our main endpoint protection. We are trying to monitor all activities happening at our franchisees' locations proactively, allowing us to realize we have to be very proactive. Most of the time, our franchisees are not as proactive. The changes in PCI DSS 4.0 are forcing everyone to be a little bit more proactive, so we have to educate and be a little more involved to ensure we have solutions in place because we are the ones who select the point of sale system. We often tell the franchisee what point of sale to use in the back end, and because of that, they feel like that is our company's responsibility, but it is really a shared responsibility. Even though we make that selection and buy the tool, they also own the responsibility of making sure they protect the brand. We decided to take that out of their hands and decide their endpoint solution. We made it a part of the package, and it got deployed, but that allows us to be proactive in protecting our brands. If they do anything that actually puts our brands in jeopardy, we are able to proactively respond and stay on top of that to avoid breaches and things of that nature.
Information Security Analyst at a retailer with 10,001+ employees
Real User
Top 20
2024-05-16T19:07:00Z
May 16, 2024
CrowdStrike Falcon Complete is our EDR solution. It has many modules including vulnerability management, discovery, account application, and assets Compared to our previous security products, CrowdStrike offers greater efficiency with its various modules that provide full functionality. We've found it to be a helpful tool overall. However, there are some challenges depending on the specific use case and industry, such as finance or retail. This is likely because we're accustomed to our legacy products and CrowdStrike is still new, requiring a learning and testing phase for our team. We implemented CrowdStrike Falcon Complete to replace the legacy solutions in our environment.
Cyber Security Engineer at a computer software company with 51-200 employees
Real User
Top 10
2024-04-08T08:11:00Z
Apr 8, 2024
I use the solution for a lot of things. It has more visibility than core tech. For example, it's better the TSC scores and that any integration visibility with Zscalar.
Chief Information Officer at a tech services company with 1-10 employees
Real User
Top 10
2024-02-20T19:47:00Z
Feb 20, 2024
We are using CrowdStrike Falcon Complete. We are using the managed service program, where they do proactive monitoring. My usage usually includes logging in and looking at the dashboard for any anomalies or anything I need to know and responding to any severity alerts in red, yellow, or green.
Our customers use it, but we deliver the services. We use it for advanced endpoint protection capabilities and threat-hunting capabilities. We use it for data lakes and repositories to reduce the cost and computational efforts for submitting or uploading in the cloud.
IT Director at a computer software company with 51-200 employees
Real User
Top 20
2024-01-30T09:28:00Z
Jan 30, 2024
CrowdStrike Falcon Complete is an XDR solution that we use for our endpoint protection. We currently don't have a complete CrowdStrike Falcon bundle; instead, we have an enterprise bundle in place. For this bundle, agents are installed on all endpoints, and we define security rules to ensure automated workflows are executed through multiple cells using pre-defined playbooks.
Learn what your peers think about CrowdStrike Falcon Complete MDR. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Senior Product Executive at a tech services company with 51-200 employees
Real User
Top 20
2024-01-10T10:34:00Z
Jan 10, 2024
We provide service to our customers based on their XDR requirements, such as multi-platform solutions or whatever they have. We use the solution to provide security for those integrated solutions and service their XDR platforms.
Information Technology Infrastructure Manager (Region 2 IT Manager) at a transportation company with 201-500 employees
Real User
Top 5
2023-05-10T20:40:59Z
May 10, 2023
Comparing CrowdStrike Falcon Complete with Bitdefender, I would say that Bitdefender was comparatively easier to use, deploy and maintain, especially for my technical resources.
IT Security & Audit Compliance Analyst at Milwaukee City and County
Real User
Top 5
2023-03-13T20:26:53Z
Mar 13, 2023
We use Crowdstrike for monitoring. The Department of Homeland Security's SOC is managing it, so I like it better than Carbon Black because we don't have to provide any support for it.
My organization is a cybersecurity company using CrowdStrike Falcon for incident response and forensic analysis. Twenty-five employees are using it now
Senior Research Analyst - Security, Privacy, Risk & Compliance at Info-Tech Research Group
Real User
Top 5
2022-11-22T16:02:03Z
Nov 22, 2022
Typically, we use the solution for detection, as we outsourced the response element to an MSSP. It also gives us visibility into security threats and allows us to find and eliminate them. For issues that outweigh our capacity, we escalate to our third-party MSSP.
Team Lead for Global Security at a non-tech company with 201-500 employees
Real User
2022-10-18T15:44:40Z
Oct 18, 2022
This is their XDR/MDR service offering. Basically, we used it as our endpoint EDR software. We also leveraged their MDR services to outsource any SOC duties for threat detection and containment. We used it in conjunction with LogicHub to have some SOAR capabilities for specific use cases in our environment, which was very useful. It really reduced time for our analysts to do simple detections or things that are triggered for basic automation rules based on a threat instance. We used it as a vulnerability dashboard for endpoint management. We deployed the agent in 95% of our endpoints. It worked much better as an endpoint management tool, like for vulnerability management to track vulnerabilities. It's more about trust and verification rather than relying on the IT Ops team to give us regular reports on the vulnerabilities on the endpoints. We relied on the CrowdStrike system to provide evidence to the IT Ops team for patching things that were not really patched. It really worked well for third-party patch management. It's not labeled for that use. However, it worked really well and really helped our patch management initiative with 24/7 coverage for all our endpoints. We used the quarantine feature as well a few times. We did a trial for it. As an end-point solution, nothing beats it, to be honest.
IT Consultant - Applications & Technology at Select Home Health Services
Consultant
2022-07-19T20:22:05Z
Jul 19, 2022
We wanted a very high level of endpoint protection and intrusion detection. Based on all the reviews, you have a bunch of products out there to choose from. One differentiator of CrowdStrike is that it's nearly what I would call zero-touch on the workstation. You don't have to worry about upgrades and all that. Then, when something suspicious is detected, the CrowdStrike team investigates that for us. It's part of the service that we purchased from them. Basically, we use the solution for security.
Assistant Vice President at a financial services firm with 10,001+ employees
Real User
2022-06-23T13:11:30Z
Jun 23, 2022
When work-from-home scenarios started in March 2020, during the pandemic, in the month of April, we were actually going through some POCs and had one ransomware attack on one of the client sites. We had to deploy the solution immediately, which actually helped us find out or not how it worked. Proactively, we could identify some threats in the environment and act on them. We were virtually identifying items and getting notifications, as well as seeing the availability of the intra. That was very helpful for the entire team.
IT Analyst at a government with 5,001-10,000 employees
Real User
2022-06-01T22:49:00Z
Jun 1, 2022
We use CrowdStrike Falcon Complete as an endpoint detection and response solution. We have over 10,000 users of this product. It requires less than 10 staff to deploy and maintain CrowdStrike. We are looking at rolling out more features of the product.
Falcon is a threat intelligence platform. In cybersecurity, there's always a chance you'll get breached and gaps that need to be addressed, but you'll never know unless there is a threat seeking to exploit that particular weakness. Most use cases for Falcon will be directly ingested into our Siemens server. The total number of users on the solution is around 1,500.
IT Operations Lead at a energy/utilities company with 5,001-10,000 employees
Real User
2022-02-28T11:58:02Z
Feb 28, 2022
We use CrowdStrike Falcon Complete for the management of endpoints, which are located onshore and offshore. CrowdStrike Falcon Complete is mainly for endpoint protection, and we used it alongside Microsoft Defender, to secure our assets, which are either domains or newgroups.
Lead Systems Engineer at a computer software company with 10,001+ employees
Real User
2021-10-25T15:25:22Z
Oct 25, 2021
We have been testing CrowdStrike Falcon Complete but we have not implemented it in our production at this time. However, we have found useful features in CrowdStrike.
Information Technology Manager and ISMS Auditor at a consultancy with 51-200 employees
Real User
2021-07-30T11:32:42Z
Jul 30, 2021
CrowdStrike Falcon Complete is used to inform the IT or security analyst if there is something happening inside the endpoint. Additionally, the EDR can take an action by itself if there is something abnormal happening inside the endpoint.
Sr Manager - Information Security & Researcher at a tech services company with 1,001-5,000 employees
Real User
2021-05-25T13:10:15Z
May 25, 2021
It's an EDR group solution. We use it for behavioral-based analysis. On our endpoints, we have signature-based and behavioral-based analyses, and we use CrowdStrike Falcon Complete for behavioral-based analyses.
Global Data Protection/Privacy Manager, FIP, CIPP/E, CIPM, CISSP at a manufacturing company with 10,001+ employees
Real User
2021-04-16T11:51:50Z
Apr 16, 2021
Currently, we're trying to understand which solution would be able to help us to block external ports on computers. We're looking at Crowdstrike and working to understand how they can help us handle this.
Partner at Fortium Partners: Interim, virtual & fractional CISO and CPO at a tech services company with 51-200 employees
Real User
2021-04-05T21:36:43Z
Apr 5, 2021
Our clients use it for protecting themselves from getting ransomware. Their use case is just to protect their endpoints because it is really bad out there. It is a hybrid deployment. You have to have agents on all the endpoints, and all the CrowdStrike AI is on the cloud.
Director Servicios Administrados de Cybersecurity at a comms service provider with 51-200 employees
Real User
2021-03-16T23:24:05Z
Mar 16, 2021
We are currently testing CrowdStrike Falcon Complete. We have just started to work with this solution. It has many options, but I haven't yet tried them. I have also used it previously in another company.
Senior security consultant at a computer software company with 51-200 employees
MSP
Top 20
2021-03-08T09:56:25Z
Mar 8, 2021
It is an advanced anti-malware solution. Our clients replace the existing traditional antivirus with this solution. We are an implementer. We sell this solution, and then I go and understand the existing environment to deploy it.
We are a solution provider and CrowdStrike Falcon Complete is one of the products that we offer to our customers. We have several different customers for which we provide this software as a service. In other cases, customers purchase licenses for it through us and we administrate it.
Director of Information Security at a computer software company with 201-500 employees
Real User
2021-02-25T11:22:33Z
Feb 25, 2021
We primarily use the solution for endpoint security. It is a very important aspect of security for us as the threat landscape is growing. There constantly needs to be better monitors of the activity on the endpoints and windows server. That's the main driver behind using this solution.
CrowdStrike Falcon Complete MDR provides advanced endpoint protection through behavioral-based analysis, threat hunting, and zero-day attack prevention for devices, servers, clients, and mobile endpoints.
Organizations utilize CrowdStrike Falcon Complete MDR for comprehensive security management, including monitoring and detecting vulnerabilities, ransomware protection, and enhancing overall security postures. It replaces traditional antiviruses and seamlessly integrates with other...
I use the solution in my company on the endpoint, and then we're using it on our point of sales in all of our franchisees' locations, and then we have about seven brands. We are deploying a new point. We are using it as our main endpoint protection. We are trying to monitor all activities happening at our franchisees' locations proactively, allowing us to realize we have to be very proactive. Most of the time, our franchisees are not as proactive. The changes in PCI DSS 4.0 are forcing everyone to be a little bit more proactive, so we have to educate and be a little more involved to ensure we have solutions in place because we are the ones who select the point of sale system. We often tell the franchisee what point of sale to use in the back end, and because of that, they feel like that is our company's responsibility, but it is really a shared responsibility. Even though we make that selection and buy the tool, they also own the responsibility of making sure they protect the brand. We decided to take that out of their hands and decide their endpoint solution. We made it a part of the package, and it got deployed, but that allows us to be proactive in protecting our brands. If they do anything that actually puts our brands in jeopardy, we are able to proactively respond and stay on top of that to avoid breaches and things of that nature.
CrowdStrike Falcon Complete is our EDR solution. It has many modules including vulnerability management, discovery, account application, and assets Compared to our previous security products, CrowdStrike offers greater efficiency with its various modules that provide full functionality. We've found it to be a helpful tool overall. However, there are some challenges depending on the specific use case and industry, such as finance or retail. This is likely because we're accustomed to our legacy products and CrowdStrike is still new, requiring a learning and testing phase for our team. We implemented CrowdStrike Falcon Complete to replace the legacy solutions in our environment.
I use the solution for a lot of things. It has more visibility than core tech. For example, it's better the TSC scores and that any integration visibility with Zscalar.
We are using CrowdStrike Falcon Complete. We are using the managed service program, where they do proactive monitoring. My usage usually includes logging in and looking at the dashboard for any anomalies or anything I need to know and responding to any severity alerts in red, yellow, or green.
Our customers use it, but we deliver the services. We use it for advanced endpoint protection capabilities and threat-hunting capabilities. We use it for data lakes and repositories to reduce the cost and computational efforts for submitting or uploading in the cloud.
CrowdStrike Falcon Complete is an XDR solution that we use for our endpoint protection. We currently don't have a complete CrowdStrike Falcon bundle; instead, we have an enterprise bundle in place. For this bundle, agents are installed on all endpoints, and we define security rules to ensure automated workflows are executed through multiple cells using pre-defined playbooks.
We use Falcon to protect the overall environment, including the client and the servers.
We commonly use it for mitigating phishing, virus, and malware attacks, making it an essential tool for such security incidents.
We provide service to our customers based on their XDR requirements, such as multi-platform solutions or whatever they have. We use the solution to provide security for those integrated solutions and service their XDR platforms.
Comparing CrowdStrike Falcon Complete with Bitdefender, I would say that Bitdefender was comparatively easier to use, deploy and maintain, especially for my technical resources.
CrowdStrike Falcon Complete is used for endpoint protection, which includes anti-malware, and some MDR capabilities, such as threat hunting.
I primarily use the solution on the could to enhance my security posture. It's used to prevent malware from getting on our systems.
We use Crowdstrike for monitoring. The Department of Homeland Security's SOC is managing it, so I like it better than Carbon Black because we don't have to provide any support for it.
I primarily use Falcon Complete to protect against threats.
My organization is a cybersecurity company using CrowdStrike Falcon for incident response and forensic analysis. Twenty-five employees are using it now
Typically, we use the solution for detection, as we outsourced the response element to an MSSP. It also gives us visibility into security threats and allows us to find and eliminate them. For issues that outweigh our capacity, we escalate to our third-party MSSP.
This is their XDR/MDR service offering. Basically, we used it as our endpoint EDR software. We also leveraged their MDR services to outsource any SOC duties for threat detection and containment. We used it in conjunction with LogicHub to have some SOAR capabilities for specific use cases in our environment, which was very useful. It really reduced time for our analysts to do simple detections or things that are triggered for basic automation rules based on a threat instance. We used it as a vulnerability dashboard for endpoint management. We deployed the agent in 95% of our endpoints. It worked much better as an endpoint management tool, like for vulnerability management to track vulnerabilities. It's more about trust and verification rather than relying on the IT Ops team to give us regular reports on the vulnerabilities on the endpoints. We relied on the CrowdStrike system to provide evidence to the IT Ops team for patching things that were not really patched. It really worked well for third-party patch management. It's not labeled for that use. However, it worked really well and really helped our patch management initiative with 24/7 coverage for all our endpoints. We used the quarantine feature as well a few times. We did a trial for it. As an end-point solution, nothing beats it, to be honest.
It is their MDR. We use CrowdStrike Falcon Complete to manage our security. It is for our endpoint protection.
We use this solution for endpoint protection of a user, a computer, a server, or a virtualization.
We wanted a very high level of endpoint protection and intrusion detection. Based on all the reviews, you have a bunch of products out there to choose from. One differentiator of CrowdStrike is that it's nearly what I would call zero-touch on the workstation. You don't have to worry about upgrades and all that. Then, when something suspicious is detected, the CrowdStrike team investigates that for us. It's part of the service that we purchased from them. Basically, we use the solution for security.
I would say it is for endpoint security, malware, antivirus, and advanced threat monitoring.
When work-from-home scenarios started in March 2020, during the pandemic, in the month of April, we were actually going through some POCs and had one ransomware attack on one of the client sites. We had to deploy the solution immediately, which actually helped us find out or not how it worked. Proactively, we could identify some threats in the environment and act on them. We were virtually identifying items and getting notifications, as well as seeing the availability of the intra. That was very helpful for the entire team.
I use Falcon Complete for scanning devices.
We use CrowdStrike Falcon Complete as an endpoint detection and response solution. We have over 10,000 users of this product. It requires less than 10 staff to deploy and maintain CrowdStrike. We are looking at rolling out more features of the product.
Falcon is a threat intelligence platform. In cybersecurity, there's always a chance you'll get breached and gaps that need to be addressed, but you'll never know unless there is a threat seeking to exploit that particular weakness. Most use cases for Falcon will be directly ingested into our Siemens server. The total number of users on the solution is around 1,500.
We use CrowdStrike Falcon Complete for the management of endpoints, which are located onshore and offshore. CrowdStrike Falcon Complete is mainly for endpoint protection, and we used it alongside Microsoft Defender, to secure our assets, which are either domains or newgroups.
This is a security solution used for its antivirus, endpoint detection, and response capabilities.
We have been testing CrowdStrike Falcon Complete but we have not implemented it in our production at this time. However, we have found useful features in CrowdStrike.
CrowdStrike Falcon Complete is used to inform the IT or security analyst if there is something happening inside the endpoint. Additionally, the EDR can take an action by itself if there is something abnormal happening inside the endpoint.
We primarily use the solution for security purposes. We use it to protect our endpoints and prevent any kind of malicious attacks on our company.
We are using this solution for endpoint protection.
It's an EDR group solution. We use it for behavioral-based analysis. On our endpoints, we have signature-based and behavioral-based analyses, and we use CrowdStrike Falcon Complete for behavioral-based analyses.
We use the solution for security.
We implemented this solution to secure everything in our environment, such as our endpoints, servers, and network.
Currently, we're trying to understand which solution would be able to help us to block external ports on computers. We're looking at Crowdstrike and working to understand how they can help us handle this.
Our clients use it for protecting themselves from getting ransomware. Their use case is just to protect their endpoints because it is really bad out there. It is a hybrid deployment. You have to have agents on all the endpoints, and all the CrowdStrike AI is on the cloud.
We are currently testing CrowdStrike Falcon Complete. We have just started to work with this solution. It has many options, but I haven't yet tried them. I have also used it previously in another company.
It is an advanced anti-malware solution. Our clients replace the existing traditional antivirus with this solution. We are an implementer. We sell this solution, and then I go and understand the existing environment to deploy it.
We are a solution provider and CrowdStrike Falcon Complete is one of the products that we offer to our customers. We have several different customers for which we provide this software as a service. In other cases, customers purchase licenses for it through us and we administrate it.
We primarily use the solution for endpoint security. It is a very important aspect of security for us as the threat landscape is growing. There constantly needs to be better monitors of the activity on the endpoints and windows server. That's the main driver behind using this solution.
We use the solution for AB protection and endpoint detection and response.
Our primary use case is an ordinary antivirus. We also use it to watch the activity on the machine.
We primarily use this solution for our clients.
We primarily use the solution for mobile and endpoint protection.
We primarily use the solution for server endpoint protection as well as client and user client endpoint protection.
We use CrowdStrike as our endpoint protection solution for all of our devices.