Skip to main content
TrustRadius
CrowdStrike Falcon

CrowdStrike Falcon

Overview

What is CrowdStrike Falcon?

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no performance impact, no additional agents,…

Read more
Recent Reviews

Why CrowdStrike

9 out of 10
May 31, 2024
Incentivized
We use a company called Act Zero as an XDR solution provider. The tool they use is CrowdStrike Falcon and we use it and they use it to …
Continue reading

Best EDR Tool

10 out of 10
May 30, 2024
Incentivized
CrowdStrike Falcon is the best in class product with the ease of use and implementation. CrowdStrike Falcon sensors are installed in all …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Popular Features

View all 7 features
  • Endpoint Detection and Response (EDR) (77)
    9.3
    93%
  • Malware Detection (77)
    9.2
    92%
  • Infection Remediation (74)
    8.8
    88%
  • Centralized Management (78)
    8.5
    85%

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing

Falcon Pro

$6.99

Cloud
per endpoint/month (for 5-250 endpoints, billed annually)

Falcon Enterprise

$14.99

Cloud
per endpoint/month (minimum number of endpoints applies)

Falcon Premium

$17.99

Cloud
per endpoint/month (minimum number of endpoints applies)

Entry-level set up fee?

  • No setup fee
For the latest information on pricing, visithttps://www.crowdstrike.com/endpoint…

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Features

Endpoint Security

Endpoint security software protects enterprise connected devices from malware and cyber attacks.

8.7
Avg 8.4
Return to navigation

Product Details

What is CrowdStrike Falcon?

CrowdStrike offers cloud-delivered endpoint protection. CrowdStrike aims to revolutionize endpoint protection by unifying next-generation antivirus (AV), endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent.

The vendor states many of the world’s largest organizations use CrowdStrike, including three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies.

CrowdStrike Falcon Features

Endpoint Security Features

  • Supported: Anti-Exploit Technology
  • Supported: Endpoint Detection and Response (EDR)
  • Supported: Centralized Management
  • Supported: Infection Remediation
  • Supported: Vulnerability Management
  • Supported: Malware Detection

CrowdStrike Falcon Video

CEO George Kurtz discusses challenges organizations face using legacy cybersecurity solutions & how easy, fast & effective the CrowdStrike Falcon platform is by comparison.

CrowdStrike Falcon Integrations

CrowdStrike Falcon Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationApple iOS, Android
Supported LanguagesEnglish, Japanese

Frequently Asked Questions

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no performance impact, no additional agents, hardware, scheduled scans, firewall exceptions or admin credentials.

Reviewers rate Endpoint Detection and Response (EDR) highest, with a score of 9.3.

The most common users of CrowdStrike Falcon are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(246)

Attribute Ratings

Reviews

(1-25 of 41)
Companies can't remove reviews or game the system. Here's why
May 31, 2024

Why CrowdStrike

Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • We are early in the journey - less than 2 years so there has not been any new innovations. Our goal was to protect our data/infrastructure/etc. and we have been able to do that.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Integrating with Our Email Protection System using their free API and use Falcon SIEM for threat hunting on files coming from email.
  • Use Exposure to detect reused credentials and help get then changed.
  • Use the Indicator Graph tool to find which endpoints are connected to a set of artifacts that are collectively known to be malicious or makes it vulnerable.
  • Crack down on third party applications causing data leaks.
Humayoon Khan | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • We integrated Falcon with our SIEM solution temporarily
  • Implemented / enforced partial information security policy through Falcon
  • Detected C2 in our internal network by using Threat Actors library in crowdstrike, where they give information about most dangerous hacking groups
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Real Time Response for many things, appart from "Response" to an infection
  • Host firewall management
  • Inventory and detailed information about users/hosts and applications
  • Finding that unmanaged hosts that you have on your network "hidden"
November 01, 2023

CrowdStrike real review.

Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Using the network threat maps and traffic analysis from Falcon, our network design team has been able to optimize the configuration of our firewalls and network segmentation, ensuring that high-risk traffic zones are appropriately isolated.
  • While Falcon is typically seen as a tool for external threat detection, we've used it in conjunction with other tools to detect potential insider threats based on unusual endpoint behaviors.
Return to navigation