Overview
What is CrowdStrike Falcon?
CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no performance impact, no additional agents,…
Best EDR Tool
CrowdStrike Falcon: The most balanced and feature-rich XDR
Great Edr for companies
After using CrowdStrike Falcon for one year, here is what I learned…
Great all round endpoint protection solution
beyond the F1 sponsor, it's best in breed EDR
Excellent purchase not once regretted it.
We can investigate/remediate and run scripts when we suspect …
CrowdStrike Falcon Complete has been nothing short of awesome!
A Comprehensive Look at the Fabulous EDR CrowdStrike Falcon
CrowdStrike Falcon review for companies
Fantastic reduction in EDR operations
Great product, great performance, you get what you pay for (not cheap but worth it)
We were using other solution and we were forced …
The do everything endpoint protection tool
- Default endpoint protection tool on all servers and laptops.Laptops
- local firewall, and device lockdown (USB drives blocked)
- Spotlight
- …
Strengthening cyber defenses with CrowdStrike Falcon
How CrowdStrike Falcon Differs From Its Competitors
Consolidation of Tools
Breadth of Solutions
Consolidation of Tools
Consolidation of Tools
- Thousand Eyes Endpoint tool was replaced using a combination of CrowdStrike Falcon and WorkSpaceOne as it was redundant.
- HaveIbeenPawned API subscription was removed as CrowdStrike Falcon Exposure …
Breadth of Solutions
- Protection endpoints from all kinds of host/network based threats.
- Keeping an eye on what applications users are installing and removing if it violates compliance.
- Discovering exposed user information on …
Consolidation of Tools
Breadth of Solutions
Consolidation of Tools
Breadth of Solutions
Consolidation of Tools
Breadth of Solutions
Consolidation of Tools
Breadth of Solutions
Consolidation of Tools
Breadth of Solutions
Consolidation of Tools
Breadth of Solutions
Breadth of Solutions
Breadth of Solutions
Consolidation of Tools
Also if you have some host firewall management system, it can be replaced with CS firewall management
Remote connection (not interactive or RDP like) can be also be replaced, with RTR
Breadth of Solutions
Also, it ofers so many other things, that can be easily implemented (same agent... just increases costs) and are really interesting. You can start with a "basic" package and start growing from …
Consolidation of Tools
Breadth of Solutions
Consolidation of Tools
Breadth of Solutions
Consolidation of Tools
Breadth of Solutions
Consolidation of Tools
Breadth of Solutions
Consolidation of Tools
Breadth of Solutions
Breadth of Solutions
Consolidation of Tools
Breadth of Solutions
Breadth of Solutions
Consolidation of Tools
Breadth of Solutions
Consolidation of Tools
Breadth of Solutions
Consolidation of Tools
Breadth of Solutions
Consolidation of Tools
Breadth of Solutions
Consolidation of Tools
Breadth of Solutions
Automated protection and remediation
Improved threat intelligence
Awards
Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards
Popular Features
- Endpoint Detection and Response (EDR) (75)9.393%
- Malware Detection (75)9.292%
- Infection Remediation (73)8.888%
- Centralized Management (76)8.686%
Reviewer Pros & Cons
Pricing
Falcon Pro
$6.99
Falcon Enterprise
$14.99
Falcon Premium
$17.99
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Features
Endpoint Security
Endpoint security software protects enterprise connected devices from malware and cyber attacks.
- 8.8Anti-Exploit Technology(69) Ratings
In-memory and application layer attack blocking (e.g. ransomeware)
- 9.3Endpoint Detection and Response (EDR)(75) Ratings
Continuous monitoring and response to advanced internet threats by endpoint agents.
- 8.6Centralized Management(76) Ratings
Centralized management supporting multi-factor authentication, customized views, and role-based access control.
- 8.2Hybrid Deployment Support(4) Ratings
Administrators should be able to choose endpoint security on-premise, cloud, or hybrid.
- 8.8Infection Remediation(73) Ratings
Capability to quarantine infected endpoint and terminate malicious processes.
- 8.2Vulnerability Management(57) Ratings
Vulnerability prioritization for fixes.
- 9.2Malware Detection(75) Ratings
Detection and blocking of zero-day file and fileless malware.
Product Details
- About
- Integrations
- Competitors
- Tech Details
- FAQs
What is CrowdStrike Falcon?
CrowdStrike Falcon Features
Endpoint Security Features
- Supported: Anti-Exploit Technology
- Supported: Endpoint Detection and Response (EDR)
- Supported: Centralized Management
- Supported: Infection Remediation
- Supported: Vulnerability Management
- Supported: Malware Detection
CrowdStrike Falcon Video
CrowdStrike Falcon Integrations
- Akamai Enterprise Application Access
- Cloudflare
- Attivo ThreatDefend Detection & Response Platform (a brand)
- Exabeam Fusion
- Splunk Enterprise Security (ES)
- Sumo Logic
- Swimlane
- AttackIQ Security Optimization Platform
- EclecticIQ Platform
- IntSights Cyber Intelligence, from Rapid7
- ThreatConnect SOAR (discontinued)
- Armis
- The Forescout Platform
- Claroty
- ThreatQuotient
- Panther
- Forescout
- Illusive Networks
- Netskope
- Okta
- Proofpoint
- Vectra
- zscaler
- ExtraHop
- Mimecast
- ServiceNow
- IBM Resilient Security Orchestration
- Automation and Response (SOAR)
- Arcsight Interset
- DF Labs
- LogRhythm
- Securonix
- Anomali
- Centripetal
- King & Union
- ThreatStop
- Dragos
- Medigate
CrowdStrike Falcon Competitors
CrowdStrike Falcon Technical Details
Deployment Types | On-premise, Software as a Service (SaaS), Cloud, or Web-Based |
---|---|
Operating Systems | Windows, Linux, Mac |
Mobile Application | Apple iOS, Android |
Supported Languages | English, Japanese |
Frequently Asked Questions
Comparisons
Compare with
Reviews and Ratings
(240)Attribute Ratings
Reviews
(1-3 of 3)- Compliance Audit
- End user security
- Data protection
- The user interface can be challenging to navigate from time to time until you get the hang of it.
- Anti-Exploit Technology
- 100%10.0
- Endpoint Detection and Response (EDR)
- N/AN/A
- Centralized Management
- N/AN/A
- Infection Remediation
- N/AN/A
- Vulnerability Management
- N/AN/A
- Malware Detection
- N/AN/A
- CrowdStrike Falcon helped me with some hipaa compliance issues. I was at about 90-92 percent hipaa complaint now I am setting at 98-99 percent.
- With their machine learning, I installed in a research server that I have, and have been writing malware to test its detection and help the machine learning.
- End user protection
- Malware analysis
- Data integrity
- Dedicated malware research
- Education tool
- Cloud Solutions
- Scalability
- Ease of Use
- Implemented in-house
- Integration in the cloud environment
- Installing the sensors on servers and other endpoints
- Managing groups
- Integration into cloud environments
One-stop solution for malware protection
- Endpoint Detection and Response
- Great communication to the security operations teams for triaging a security event
- Customizable policies which can be globally applied
- Ease of integration with SIEM
- Ability to query endpoint logs within the Falcon portal itself
- Sandbox can get better in my opinion.
- Detection of source of infection in case of lateral movements recommended
- Browser based logs/ DNS queries for getting to the root of the issue
- Anti-Exploit Technology
- 90%9.0
- Endpoint Detection and Response (EDR)
- 100%10.0
- Centralized Management
- 100%10.0
- Infection Remediation
- 90%9.0
- Vulnerability Management
- 80%8.0
- Malware Detection
- 90%9.0
- Prevents malware infection for known malware signatures
- AI based engine which can detect and prevent potential infections
- Affordable in comparison with the compensation a firm might owe to the customers in case of a breach
- Integration with SIEM
- Integration with SOAR tool
- Integration with internet proxy solution enhancing network security
- Reporting and metrics generation
- McAfee Total Protection, Symantec Advanced Threat Protection and Microsoft 365 Defender
- Malware detection and analysis
- Triaging of any alert
- Ability to measure the compliance within the organization
- Analysis of a file within a sandboxed environment
- Vulnerability Management
- Controlling DNS policies
- Identity protection for the end users
- Online Training
- In-Person Training
- Threat Inteligance
- Low CPU and RAM usage
- Malware mitigation
- Vulnerability managment
- Hunting
- Ease of use
- Identity protection
- Air-Gapped networks
- Mobile protection
- Anti-Exploit Technology
- 90%9.0
- Endpoint Detection and Response (EDR)
- 100%10.0
- Centralized Management
- 90%9.0
- Infection Remediation
- 90%9.0
- Vulnerability Management
- 70%7.0
- Malware Detection
- 90%9.0
- Thin SecOps team needed for maintenance
- Slow to meet the demand for security of serverless cloud
- Systems and runtime protection for container workloads
also i removed Cynet protection from the organization. CrowdStrike provide a better incident response platform, with a wider malware protection suite and zero trust architecture readiness.
since our team is a slim team, the ability to get immediate help from CrowdStrike support team reduces the impact of any security incidents and make it easier to secure our company.
- great threat intelligence
- identity protection
- McAfee endpoint security, McAfee ePolicy Orchestrator, McAfee Threat Intelligence Exchange and Symantec Advanced Threat Protection
Identity protection feature is a huge step towards zero trust implementation.
- incident response
- identity protection
- malware protection
- device control
- vulnerability management
- Mobile protection
- CSPM