Skip to main content
TrustRadius
CrowdStrike Falcon

CrowdStrike Falcon

Overview

What is CrowdStrike Falcon?

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no performance impact, no additional agents,…

Read more
Recent Reviews

Why CrowdStrike

9 out of 10
May 31, 2024
Incentivized
We use a company called Act Zero as an XDR solution provider. The tool they use is CrowdStrike Falcon and we use it and they use it to …
Continue reading

Best EDR Tool

10 out of 10
May 30, 2024
Incentivized
CrowdStrike Falcon is the best in class product with the ease of use and implementation. CrowdStrike Falcon sensors are installed in all …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Popular Features

View all 7 features
  • Endpoint Detection and Response (EDR) (75)
    9.3
    93%
  • Malware Detection (75)
    9.2
    92%
  • Infection Remediation (73)
    8.8
    88%
  • Centralized Management (76)
    8.6
    86%

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing

Falcon Pro

$6.99

Cloud
per endpoint/month (for 5-250 endpoints, billed annually)

Falcon Enterprise

$14.99

Cloud
per endpoint/month (minimum number of endpoints applies)

Falcon Premium

$17.99

Cloud
per endpoint/month (minimum number of endpoints applies)

Entry-level set up fee?

  • No setup fee
For the latest information on pricing, visithttps://www.crowdstrike.com/endpoint…

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Features

Endpoint Security

Endpoint security software protects enterprise connected devices from malware and cyber attacks.

8.7
Avg 8.4
Return to navigation

Product Details

What is CrowdStrike Falcon?

CrowdStrike offers cloud-delivered endpoint protection. CrowdStrike aims to revolutionize endpoint protection by unifying next-generation antivirus (AV), endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent.

The vendor states many of the world’s largest organizations use CrowdStrike, including three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies.

CrowdStrike Falcon Features

Endpoint Security Features

  • Supported: Anti-Exploit Technology
  • Supported: Endpoint Detection and Response (EDR)
  • Supported: Centralized Management
  • Supported: Infection Remediation
  • Supported: Vulnerability Management
  • Supported: Malware Detection

CrowdStrike Falcon Video

CEO George Kurtz discusses challenges organizations face using legacy cybersecurity solutions & how easy, fast & effective the CrowdStrike Falcon platform is by comparison.

CrowdStrike Falcon Integrations

CrowdStrike Falcon Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationApple iOS, Android
Supported LanguagesEnglish, Japanese

Frequently Asked Questions

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no performance impact, no additional agents, hardware, scheduled scans, firewall exceptions or admin credentials.

Reviewers rate Endpoint Detection and Response (EDR) highest, with a score of 9.3.

The most common users of CrowdStrike Falcon are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(240)

Attribute Ratings

Reviews

(1-25 of 37)
Companies can't remove reviews or game the system. Here's why
May 31, 2024

Why CrowdStrike

Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use a company called Act Zero as an XDR solution provider. The tool they use is CrowdStrike Falcon and we use it and they use it to help protect our environment. We wanted to provide greater security across our enterprise and evalauted different soltuions. We liked CrowdStrike and that is why we chose Act Zero - they were using tool we liked.
  • Protects our endpoints
  • Provide data that is actionable
  • Comprehensive toolset
  • Better looking dashboard - better graphics
  • Better reporting capabilities
It is able to really identify the true issues we have with our endpoints. There is not a lot of noise with their tool. They provide a comprehensive toolset and they keep up to date in regards to the latest security scams/issues to protect our environment

The reporting and dashboards could be improved to provide more clarity and ease of understanding of the metrics
Score 9 out of 10
Vetted Review
Verified User
Incentivized
CrowdStrike Falcon is the Extended Detection and Response (XDR) solution we use to secure our corporate assets and production servers. It single-handedly gives us the necessary protection and visibility into all our assets. I am security engineer and I use CrowdStrike Falcon everyday. My scope is to use it to investigate abnormalities in our assets and alerts it generates. The alerts comes with a great amount of details which is mostly helpful. Furthermore, it helps us keep an eye on unwanted applications installed by users and help get rid of it.
  • The detection is CrowdStrike Falcon is quite accurate. Based on how we configured we do get false positives but as per my experience it barely missed anything that is confirmed malicious. The way it understands the context of an artifact and classifies it being benign or malicious is brilliant.
  • CrowdStrike Falcon Real-Time-Response console is very powerful and usable too. It doesn't feel much different whether the endpoint that is being remote-accessed is using Mac, Linux, or Windows. It is quite resilient to spotty connections too.
  • The agents installed on the machines are quite silent and can be set to unobtrusive both in terms of computation and notifications to user.
  • The interoperability with other AVs or EDRs is amazing too. I have seen many instances where it worked together so well without contradicting that it was hard to remember the existence of the second EDR. It only fired up when the second EDR tried to access some sensitive locations.
  • The UI although a little complicated got many things right. It handles large amount of asset information quite comfortably. Doesn't lag or freeze the browser for a regular computer too.
  • CrowdStrike Falcon keeps on changing the UI of the Falcon Management Console quite frequently. It is very hard to create instructional documents as they get deprecated that fast.
  • They lack some basic AV features like running an On-Demand Scan for anything other than some Windows versions.
  • The alerts especially the Machine Learning ones sometime give too much information to investigate and doesn't point out what in particular is suspicious. It causes us to waste time looking up hundreds of DNS, IP, etc to find the culprit
  • They don't have a manual way of quarantining a file which is again basic.
  • The behavior-based rule creation got a sharp learning curve as it is based on Logscale/Humio query language. Need a good query builder.
CrowdStrike Falcon is good for a mid-large size industry where there are many engineers and analysts are working. It got many modules and a lot of data to analyze and correlate with other tools. Also, the price vs features get justified for a mid-large company. The system is also designed for users with high technical skill level as it has a steep curve. Due to its not so good ML based detection engine it is also suitable for environment with not many lab/developer activity going on as it creates a lot of noise. The policy granularity isn't as detailed as in some other competitors like Cortex XDR.
It is not so well suited for small companies with small security team as it got too many features to manage and mostly an overkill as it will only operate on a small asset-set. Plus it is not cheap. It is also not suited for companies that does large scale development and testing involving network access or File manipulation in their environment simply because the policy options aren't much granular to tune accordingly. Cortex is definitely better in that aspect.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
CrowdStrike Falcon provides end-user security, as well as data security, and sandboxing further allowing security researchers and analysts to dig into the malware some. It is an over security solution, or stack, that allows companies to use one platform rather than multiple. What I like most though is the compliance assessment. CrowdStrike Falcon recently added HIPAA to the list of compliance frameworks that it will test your environment against so that you can see how your companies security compares to different compliance standards. For example, I need to be hipaa compliant, so I can see how my company‘s security compares to hipaa compliance requirement and if it is not hipaa compliant, it will show me what to fix and how to fix it.
  • Compliance Audit
  • End user security
  • Data protection
  • The user interface can be challenging to navigate from time to time until you get the hang of it.
CrowdStrike Falcon is a robust security suite that would do well with any company, but it is geared more towards enterprises.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
CrowdStrike is used for endpoint detection and response capability as part of our standard operating system. This ensures that anomalous activity on end user compute devices is detected and arrested before it can propogate and impact the network. Further, it allows for investigtion and response by providing a detailed map of activity to isolate, understand and identify affected systems.
  • Detecting suspect activity at the endpoint
  • Stopping potentially damaging network activity by isolating an endpoint
  • Tracing activity throughout the network to assist with investigation and remediation
  • Limitations in ability to make detailed rulesets to address edge cases
  • False positives continue to be an issue
  • Can be noisy leading to alert fatigue
The solution is relatively good as a set and forget, particularly if being operated by a small team. Similarly, the system will allow for a level of active monitoring and integrating into MSSP services; however there is a point at which the level of sophistication drops off, especially when heading down a path of automated response, etc.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
needed a new EDR as the current on was best at the time and there are way better for the same or better price point. Since our contract was up and the features that was present in the current EDR was outdated and not the best out there. We took a step back and had a look at what was on the market and came down to CrowdStrike as a short list candidate
  • better intrusion detection of external devices
  • better dash board
  • provides suggested best practices for people to follow
  • the granularity of role permissions
not the cheapest solution but the cost saving for that extra bit of knowhow that fills the gap between our old EDR and CrowdStrike is well worth the money. we modern protection is the current cost of doing business and will hopefully pay off in the extra layer of protection.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We used CrowdStrike Falcon as our main XDR platform within our organisation.
We can investigate/remediate and run scripts when we suspect any anomalies on the network. Using event search we are able to analyse events and devices on the network. We have an easy way of finding EOL devices through the asset dashboard. I can analyse user accounts and ensure that there are no strange accounts with passwords over the set period.
  • Event Search
  • Searching for unmanaged assets
  • Tagging for easier searching
  • Providing details on devices such as recently connected users and previously connected networks.
  • UI is cumbersome at times
  • Dashboard occasionally takes a while to load
  • Support is somewhat delayed
I believe CrowdStrike Falcon is great for teams who have a small security team with no 24x7 coverage. Using their Complete add-in you are covered by the 24 hours a day 7 days a week 365 days a year. This is all with a 4 minute window to remediate issues should one occur.
Humayoon Khan | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
I use CrowdStrike Falcon as the main source of monitoring threats originating from operating systems used by our servers, workstations, staff laptops and guest users machines.
Our organization being a university where thousands of students and hundreds of staff turn up daily, puts our critical assets at risk of being compromised by an insider. CrowdStrike Falcon helps us identify the source of a threat accurately, blocks the triggering file or script before it can cause damage. The AI / ML based detections are very helpful because they catch threats that other vendors may fail at. The scope of our use case is endpoint monitoring and threat management.









  • AI / ML based malicious activity detections
  • Detection information presented clearly and concisely on dashboard
  • Easy filtering of detections on hostname, detection name, severity, date, time, hash, technique etc
  • traces full process chain instead of just showing the source file or script which really helps in tracing the main security concern of machine
  • If some malicious app uses microsoft's signed binary like onedrive, cmd, wscript CrowdStrike would tag the microsoft binary as malicious and fails to provide the actual file that tried to execute these.
  • For example if a
  • malware.exe tries to run this command
  • cmd /c bitsadmin
  • CrowdStrike would tag cmd or bitsadmin as malicious and does not mention malware.exe at all sometimes
  • There are two different dashboards (updated and deprecated) which causes confusion among my team, all must be on same page and use single dashboard.
  • Support is very slow in responding to problems and depend on automated bots which really frustrates when a major issue arises.
It is best suited for organizations that have lot of machines and users, since CrowdStrike agent-based deployment is easy to manage and maintain.
CrowdStrike Falcon may be less appropriate for smaller organizations due to its cost, also a technical support team is required to install / remove agents from machines and monitor the dashboard for detections daily.
Score 10 out of 10
Vetted Review
Verified User
Our EDR and its operations utilize CrowdStrike Falcon as the cornerstone of security. Currently, people are concerned about the protection of IDs.
  • Prompt response
  • Reliable follow up
  • High detection ability
  • Enhancement of Japanese language
  • Screen configuration that requires no screen transitions as much as possible
CrowdStrike Falcon can be operated with a low operational load, and we believe it can be used by various organizations. I think there are not many organizations for which he is not suitable. Instead, I think it depends on whether or not you can trust and implement this highly complete service.
James Dilley | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We deployed CrowdStrike Falcon across our organization to strengthen our cyber defenses. The use cases ranged from endpoint protection to threat intelligence, covering a broad spectrum of security needs. The deployment was organization-wide, safeguarding endpoints and critical systems against evolving cyber threats. The reduction in manual tasks and real-time updates contribute to time savings for our security team.
  • CrowdStrike Falcon's next-gen endpoint protection consistently outperforms traditional solutions.
  • The cloud-native architecture ensures seamless scalability and real-time updates, eliminating the need for manual interventions.
  • CrowdStrike Falcon's threat intelligence and hunting capabilities are unparalleled.
  • The advanced features may pose a learning curve for users unfamiliar with modern cybersecurity tools.
  • A more transparent pricing model could assist in budget planning.
  • Expanding compatibility with a broader range of security solutions would be advantageous.
I would highly recommend CrowdStrike Falcon to any organization serious about bolstering its cybersecurity defenses. The platform's effectiveness in threat detection, proactive mitigation, and scalability make it a valuable asset in today's ever-evolving threat landscape. Despite some learning curves and integration challenges, the return on investment and the overall security enhancement justify its strong recommendation.
November 06, 2023

CrowdStrike Falcon Review

Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use CrowdStrike Falcon to detect potential malicious activity on both end user computers and servers.
  • Detects suspicious activity
  • Shows exact location and processes involved in suspicious activity
  • Isolate computers with suspicious activity
  • Setting up on MacOS was more complicated than expected (as kernel extensions were being phased out)
  • Remediation is not always as automated as some other systems (e.g. Malware Bytes)
CrowdStrike has detected some malicious activity on computers that it has stopped successfully. It works on Windows, MacOS, and Linux which is helpful for organizations with multiple OS's. It hasn't always been as great at preventing more minor adware or annoyance software. It can still sometimes be difficult to figure out exactly what a user was doing that triggered an alert.
November 01, 2023

CrowdStrike real review.

Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use it to protect all of our computers and servers.
  • Malware detection.
  • Bad behaviour detection.
  • Support on old Operatives Systems.
Protecting Windows, Linux, and MAC Operative Systems from all kinds of threats. Not only alerting but also preventing, using behavior detection and file analysis.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Fully Managed Security Service that investigates detections and either escalates or deals with them directly for us.
  • MDR
  • Vulnerability assessment.
  • Identity Protection.
  • Easier to use interface.
  • Log management.
  • Investigations
It is suited to small teams who require additional backup and assistance within the security area.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use CrowdStrike as an end-point protection application. We also use CrowdStrike's Identity Threat Protection module, which allows us to gain greater insight into and secure our end user by tying into our IAM solution. This helps us achieve our new cybersecurity goals of providing a primary focus on protecting user's identities and not putting the main focus on protecting endpoints. By implementing CrowdStrike Falcon Complete, we are able to monitor security for our endpoints and our user identities 24/7. This is a big plus for us as we are not staffed 24/7 and can rely on a reputable SOC from CrowdStrike to oversee and monitor security for all of our endpoints and our identities.
  • Protection of end points.
  • Protection of user identities.
  • Providing quick response to any identified security issues.
  • CrowdStrike can be on the more expensive side of end point and identity management, but it's worth it.
I feel CrowdStrike Falcon is well suited for anybody who takes securing their systems and employees safe. They have a $1 million breach policy, which helps give peace of mind that they stand behind their product and really believe in it. This was the big determining factor for us. Not because we needed the $1 million policy but because it shows how much they are willing to invest in their products as the best on the market.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use CrowdStrike Falcon Complete to augment our IT staff. Using complete gives us the 24X7 protection we need without burdening our already time challenged staff. The combination of CrowdStrike Falcon on our endpoints and monitoring by Crowdstrike Falcon complete gives us the coverage we need.
  • Staff did a great job pointing our IT workers to areas that needed remediation.
  • CrowdStrike Falcon Endpoint consistently blocks incursions from compromised websites and prevents PUPs from installing
  • Complete Staff is very attentive and makes whitelist changes quickly which allows our staff to be productive.
  • The Dashboard can become overwhelming at times, too much information to absorb
  • Computers that may have made it out into the field without the endpoint sensor are very difficult to find
  • As with all systems that rely on machine learning false positives occurr
I am not sure there is a scenario where CrowdStrike Falcon is less appropriate, the software does a great job of showing where the problem came from and how it was stopped by the system. A report is generated letting your staff know that a problem was found and remediated. I think if you have users that are working 24X7 or multiple time zones having Complete will take care of alot of hassles. You can work with your team to decide what level of involvement you want your complete team to take they can go from just monitoring all the way up to seeing and resolving issues with your staff being notified after resolution
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use Falcon to ensure we protect all our endpoint devices across the whole globally distributed organisation. We aim to utilise Falcon capabilities to prevent malware being distributed and exploited on all endpoint devices. Falcon Spotlight assists with getting visibility of the number of vulnerabilities we have on our endpoints to address by ensuring robust patch management capabilities.
  • Efficiently picking up and preventing malware threats on endpoints
  • Prompt notification capabilities on any issues
  • Ability to "set and forget" with minimal maintenance required
  • Falcon Spotlight integrations with automatic patching solution would be a good feature
  • LogScale with SIEM functionalities would be an added feature
  • Simplified one dashboard with all high-level information
Great product for endpoint detection and response for any sized organisations. Simple configuration and installation ensures its well suited for small and medium sized organisations.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Deployed CS Falcon in a higher education research environment. We needed to leverage a tool that can build a models and be on the advancement of technology due to the nature of higher education and BYOD. We installed the CS Falcon on all machines and worked with the CS team to build a Gov Cloud for research equipment that required a different set of cloud protocols.
  • Monitoring
  • Notification
  • Device Management
  • Have an executive dashboard
  • better reporting cadence
  • ability to tag devices with end user names
CS Falcon is suited for nearly all scenarios and deployment. The only challenge would be if devices contain protected data the need for the Gov Cloud installation would be necessary. This can split up your installation base but isn't anything that is very difficult to manage.
Itumeleng Thekiso | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use CrowdStrike Falcon as an endpoint sensor to detect vulnerabilities throughout our organizations endpoints, in this day and age vulnerabilities come in all shapes and sizes from all different kinds of directions bet it from; an e-mail that contains a malicious link, an infected file you unintensionally downloaded from the web, existing programs with old or new vulnerabilities that are installed on our endpoints etc.CrowdStrike Falcon really addresses these issues on a wider proportion making sure we stay up to date with new CVEs and that our endpoints are secured.
  • Host machine vulnerability detection
  • Threat mitigation
  • Activity monitoring
  • Constantly releases alerts or notifications
  • Behavourial analytics
  • Endpoint manual scan
  • Malware analysis needs improving
  • Requires some level of expertise to use its features
CrowdStrike is really a wide reaching EDR solution for very large organizations, it makes economical sense to deploy CrowdStrike Falcon if your organization has a large endpoint footprint, threat hunting is 24/7 so meaning if most of the security team is on holiday CrowdStrike is able to mitigate a lot of threats without the help of the security team essentially and it also does send out alerts if necessary.

However, CrowdStrike isn't your typical anti-virus solution it does not provide you with the ability to control it manually like you would with some products out there.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Crowdstrike Falcon is one of the leading NG-AV endpoint detection platforms in the market which is always up to date with the emerging threats. We use Crowdstrike Falcon to give MDR services to many of our customers. It helps to prevent, block all types of Cyber-attacks and also helps to get the detailed overview of the attack. It is very user friendly in access and management.
  • The Log analysis is very detailed and easy to use.
  • Prevent and block all type of malwares.
  • Great threat intelligence which is very up-to-date with the recent cyber attacks
  • very user friendly in access and management
  • Automated feature of detecting, taking action and closing incidents using fusion workflow.
  • The False positive alerts can be minimized
  • The UI can be made better and easy to access.
  • Customer support can be made better
It helps to detect and prevent malwares automatically which saves the response time to act. The machine learning and AI feature which helps to detect unusual behavioural based malwares which use defence evasion techniques. The fusion workflow feature which helps to automate the detection and blocking of less important files such as PUP/Adwares so the focus can be on real threats. The host logs are easy to filter and use which helps to do quick incident response.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
CrowdStrike Falcon Complete is utilized to provide managed EDR services on all server and workstation endpoints throughout our Corporate network. The software itself provides endpoint protection at the EDR level and the Falcon Complete service is leveraged as a 24x7x365 SOC MSSP to manage and remediate all endpoints plus analyze and provide proactive threat hunting capabilities for all data provided.
  • Updates are seamless and rarely fail compared to past products
  • The tool leverages the largest Cybersecurity threat database in the world
  • The response to a potential threat or inquiry by the managed services team is lightning fast
  • Extremely thorough responses from the managed services team on potential threats
  • Onboarding quick and painless
  • Sometimes updates to sensor versions fail, which requires manual intervention by internal staff members
  • The variety of different administrative privilege levels is vast and sometimes confusing
  • Proactive notifications confirming the health of the environment would be great instead of just reporting on potential issues
CrowdStrike Falcon Complete managed service is excellent for smaller organizations where staff is limited and outside SOC expertise can be leveraged to protect the organization from Cybersecurity threats. They are empowered to proactively remediate and perform threat containment 24x7x365 where as my staff is not active during overnight and weekend hours. They also leverage threat information from their huge data lake of intelligence from other customers against our data to keep us safe. If an organization has a larger Cybersecurity staff where these types of activities can be managed in-house, it can opt for the Falcon client-only option and not pay for the extra "complete" managed services portion.
April 06, 2023

EDR as it should be

Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use CrowdStrike Falcon as our EDR solution across our servers and client machines, about 200 endpoints in total.
  • We have very few false positives
  • We are alerted with a script runs, such as a powershell commands
  • It blocks rogue software from running
  • it looks for patterns such as items that spread
  • More customizable dashboards for each admin user
The client installed on the endpoints is small and non-intrusive. It monitors user endpoint behavior really well and is good at eliminating the false positives we've had with other software in the past. We spent very little time having to tweak this software to avoid all the noise. So far, it has caught and quarantined anything it found.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
CS Falcon is our primary tool of choice for endpoint protection. It has a small footprint and impact while being highly intelligent and very well supported.
With the majority of our users working in hybrid mode we needed a strong security control that could provide top-class protection with the minimum amount of False Positives (and, of course, of True Positives).
Falcon provides full visibility on processes, communication flows and all sorts of activities that are happening on the endpoints. It works smoothly with other tools that we have co-deployed, like DLP, DNS protection, SWG/CASB, App monitoring and Control.
Recently we added to our arsenal the Identity Protection and the Cloud Protection modules, driven by the business needs to reduce the number of vendors, tools and dashboards while achieving maximum protection and synergy/consolidation.
We believe that as a company, Crowdstrike sits on top of the range of security vendors that we work with, has the right vision and keeps delivering excellence.
We are quite happy with their Customer Success Management and Support Services and look forward to trialling their new functions: LogsScale and External Surface Risk Management.


  • Endpoint Security
  • Threat Detection, Protection, Reporting
  • Malware Analysis
  • Continuous fast delivery of new features and improvements
  • Customer awareness, learning and support
  • Device Control
  • Identity Protection
  • Identity Protection - plenty of small improvements which have been suggested by our side. Long list to mention them here. If needed I can forward you the email/presentation sent for the occassion to the Production team.
  • They recognised our contribution / remarks , by providing a discount on the initial offer, which we were happy to accept.
  • Our company went through an MnA with another pharmaceutical. Both companies had Crowdstrike EDR installed on endpoints, but on different Tenants.
  • Unfortunately there was not an official technical solution for migrating the endpoints to a unique tenant. We had to Uninstall the existing agent from the acquired company and then Reinstall it again, which was laborious and time-consuming. I wish they had a solution for such cases :-)
  • Attack Surface Management (demoed recently) doesn't seem to be fully matured yet, but they definitively are on a good path.
Well-suited for advanced and more mature environments, with dedicated personnel and well-versed in Threat and Incident Response.
The learning curb is a bit steep, but if time can be dedicated to attending Workshops and Learning modules on Crowdstrike University, then 3-6 months is a realistic timeframe to yield expected outcomes.
Clear blueprints for product rollout are provided to customers based on your specific environment.

Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use CrowdStrike as our endpoint protection and server protection, anti-virus, and malware product. We also leverage the firewall and USB device restrictions for our endpoint systems. We use it on both our Windows and Mac endpoints and on our Windows server infrastructure.
  • Firewall rules and policy that are cloud-managed is great to ensure devices are in compliance.
  • Low engineering time spent after implementation, we don't have to babysit the product. It just works.
  • Low amount of false positives.
  • I would like an option to be able to scan files/folders. I understand, however, that this isn't really the way the product is designed and that it is designed around actively running processes. But it would be great to have a way to scan incoming media before loading it on our systems.
I would like to see a way to be able to scan files/folders. We regularly receive data from opposing sides and it would be excellent to be able to scan all the files within production to check for anything before giving our users access to the data. Currently, we have to use another product for this use case. We like that we don't have to put a ton of time into the platform after deployment. We're able to set up policies to auto-update definitions and the client without us needing to touch it. We don't regularly get false positives that require us to take action to allow a user to keep working.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
I use the product on all of our servers and users' windows devices to protect them from being exploited. The huge problem that was solved was being monitored by CrowdStrike 24/7 365 days out of the year. You can't be looking for attackers and attack vectors 24/7 without a huge amount of increase to staff. The monitoring provides peace of mind that when you working on something else or are at home the infrastructure is safe from attacks.
  • Identify and remove 3rd party browsers like wave browser.
  • Gives a single pane of glass to access details about a particular machine.
  • Allows me to be able to stop a machine from accessing the internet once it is infected.
  • Actively blocks and takes actions without me intervening.
  • The dashboard can be overwhelming it could simplified more.
  • Making the installer package easier to remotely deploy it.
  • It is hard to come up with these. The product is amazing.
I think this product, in my honest opinion, works in any situation, no matter how small or large your company is. I think it is impossible to look at your environment 24/7 365, and attackers know this. You also can't possibly keep up with all of the newest exploits and security holes in the software and operating systems you use. This is why I would highly recommend CrowdStrike complete this gives you the best security and peace of mind when it comes to your computer systems.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Crowdstrike Falcon is used to provide a comprehensive suite of endpoint detection and response capabilities across the enterprise. It is the primary platform for detecting and preventing malicious content and actions on endpoints. Additionally, we leverage Crowdstrike Falcon Intelligence as a primary source of cyber threat intelligence to further enhance our cyber security program capabilities. The complementary set of modules and capabilities provides a robust set of functionality that allows us to better control and protect the enterprise.
  • Detecting malicious endpoint behaviors
  • Providing thorough, timely cyber threat intelligence
  • Integrate effectively between modules and with other security platforms
  • Event Search is built on Splunk which requires some SPL knowledge to be effective
  • Detections sometimes lack important information (e.g. hash of payload vs. hash of executing application)
  • Overlap between modules (e.g. Insight and Discover for login activity) aren't always presented in a unified/integrated way
There's a reason Falcon is the leader in this market space. Crowdstrike has built a very powerful combination of modules that cover a broad swath of the cyber security mission, especially as it relates to endpoint. While no security tool is a silver bullet, Falcon does a great job of tackling some of the most prevalent and impactful challenges in defending endpoints. Add in the best-in-class intelligence derived from their massive, global reach and you have a platform that pack a lot in. There will always be trade-off when it comes to UI/UX, and there is definitely a learning curve to mastering Falcon, but by no means worse than any major technology.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We had a need for a leading endpoint protection platform with EDR capabilities to protect against modern threats. Further, we had a need to have 24x7x365 coverage with subject matter experts working around the clock. Because we, as many security teams are, running very lean there was a requirement to have a fully managed solution to help ensure our alignment with best practices but to also have eyes on our environment at all times.
  • Protection against modern threats.
  • Elimination of false positives.
  • Very well-managed solution, the complete team is great to work with!
  • Device control capabilities (USB device control) are easy to implement.
  • The UI while very comprehensive is a bit cluttered.
  • Could be a little more intuitive to set up device groups.
  • A little clearer definition of what is available to admins in the complete offering would be nice.
Anyone who is looking for a leader in endpoint protection should consider CrowdStrike Falcon for sure, regardless of specific use cases. Anybody who is operating on a very lean security team that doesn't have the capability to provide 24x7x365 coverage should absolutely consider Falcon Complete. I've worked with various MSSP's in the past, but Falcon Complete is one I would definitely not lose any sleep at night knowing we're in good hands.
Return to navigation