Carbon Black App Control vs. CrowdStrike Falcon

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Carbon Black App Control
Score 8.1 out of 10
N/A
Carbon Black App Control is an application control product, used to lock down servers and critical systems, prevent unwanted changes and ensure continuous compliance with regulatory mandates.N/A
CrowdStrike Falcon
Score 9.0 out of 10
N/A
CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no performance impact, no additional agents, hardware, scheduled scans, firewall exceptions or admin credentials.
$59.99
per endpoint/month (minimum number of endpoints applies)
Pricing
Carbon Black App ControlCrowdStrike Falcon
Editions & Modules
No answers on this topic
Falcon Go (Small Business)
$59.99
per endpoint/month (minimum number of endpoints applies)
Falcon Go (Small Business)
$59.99
Falcon Pro
$99.99
per endpoint/month (for 5-250 endpoints, billed annually)
Falcon Enterprise
$184.99
per endpoint/month (minimum number of endpoints applies)
Offerings
Pricing Offerings
Carbon Black App ControlCrowdStrike Falcon
Free Trial
NoYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoYes
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Carbon Black App ControlCrowdStrike Falcon
Considered Both Products
Carbon Black App Control

No answer on this topic

CrowdStrike Falcon
Chose CrowdStrike Falcon
It's easier to manage, less time to deploy, has more integrations and better understands the business needs. False positives, visibility, sensors management, device control, detections, preventions are pretty much the differentiators with other rivals. It will have more and …
Chose CrowdStrike Falcon
XDR and Crowdstrike were about even for us. Carbon Black was the agent we were replacing due to failures.
Features
Carbon Black App ControlCrowdStrike Falcon
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
Carbon Black App Control
-
Ratings
CrowdStrike Falcon
8.7
96 Ratings
3% above category average
Anti-Exploit Technology00 Ratings9.087 Ratings
Endpoint Detection and Response (EDR)00 Ratings9.294 Ratings
Centralized Management00 Ratings8.995 Ratings
Hybrid Deployment Support00 Ratings8.24 Ratings
Infection Remediation00 Ratings8.991 Ratings
Vulnerability Management00 Ratings7.671 Ratings
Malware Detection00 Ratings9.394 Ratings
Best Alternatives
Carbon Black App ControlCrowdStrike Falcon
Small Businesses
GitLab
GitLab
Score 8.6 out of 10
ThreatLocker
ThreatLocker
Score 9.4 out of 10
Medium-sized Companies
Veracode
Veracode
Score 9.2 out of 10
BlackBerry Protect (CylancePROTECT)
BlackBerry Protect (CylancePROTECT)
Score 9.1 out of 10
Enterprises
Veracode
Veracode
Score 9.2 out of 10
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 9.9 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Carbon Black App ControlCrowdStrike Falcon
Likelihood to Recommend
10.0
(3 ratings)
9.0
(99 ratings)
Likelihood to Renew
-
(0 ratings)
10.0
(3 ratings)
Usability
-
(0 ratings)
10.0
(2 ratings)
Support Rating
-
(0 ratings)
10.0
(9 ratings)
In-Person Training
-
(0 ratings)
9.0
(1 ratings)
Implementation Rating
-
(0 ratings)
10.0
(1 ratings)
User Testimonials
Carbon Black App ControlCrowdStrike Falcon
Likelihood to Recommend
Broadcom
Cb Protect is best suited somewhere where you want to maximize the lockdown of workstations. So moving past no local admin rights to blocking specific applications and peripherals. The idea would be to have a list of applications you want to run, and then anything else is not able to be used. As stated prior, if you have a very fluid environment where you are having all sorts of new applications installed frequently (I feel for you!!) this is still do-able, but it misses the general idea. I think especially in environments that are more sensitive to new applications, like banks, healthcare systems etc, this is a good fit. The ability to look at application levels, drift, unapproved software etc is very useful.
Read full review
CrowdStrike
CrowdStrike Falcon is well suited for any size of environment. Large to small, CrowdStrike Falcon does an amazing job. The ability to have the same security as a fortune 500 company and have a solution that sees the same threats that they are seeing is amazing. I do not think that there is a company or environment that wouldn't benefit from the CrowdStrike Falcon solution.
Read full review
Pros
Broadcom
  • Controls file writes, executions of the scripts
  • Defends from process injections, memory protection
  • Visibility and lock down posibilities
Read full review
CrowdStrike
  • The Log analysis is very detailed and easy to use.
  • Prevent and block all type of malwares.
  • Great threat intelligence which is very up-to-date with the recent cyber attacks
  • very user friendly in access and management
  • Automated feature of detecting, taking action and closing incidents using fusion workflow.
Read full review
Cons
Broadcom
  • Perhaps more specific training.
Read full review
CrowdStrike
  • Support - we are often tasked with running down problems rather than being directed by support.
  • The sales staff we have dealt with are not very responsive or timely.
  • I believe this is a product built for installations of 300 users or more.
Read full review
Likelihood to Renew
Broadcom
No answers on this topic
CrowdStrike
Crowdstrike has a large suite of tools built for helping the engineers triage and respond to security event whenever identified. The ability to customize the security policies and implement more granular policies to different devices based on the functionality is unmatched. Crowdstrike provides so much of ability in a decent budget which ascertains the value for money or ROI.
Read full review
Usability
Broadcom
No answers on this topic
CrowdStrike
I think it is a complete and very trustful XDR platform, with very few False Positives. It is very well supported by highly skilled professionals on all levels: from pre-sales engineers, Customer Account Managers and support engineers.
Read full review
Support Rating
Broadcom
No answers on this topic
CrowdStrike
Any time we need to engage the Crowdstrike Falcon Complete Team, their response is switch, thorough, and they are sure to not close out any request until the customer confirms that they have provided an acceptable resolution. If I ever need anything from the account team related to the product, I also get a response from them within minutes typically to address my question. Top notch customer service!
Read full review
In-Person Training
Broadcom
No answers on this topic
CrowdStrike
There is limited amount of learning that can be completed in an in-person training available. In my opinion, the self-paced learning provided by Falcon portal is more useful over in-person training. The support from Falcon is great and useful to overcome difficulties, if any.
Read full review
Online Training
Broadcom
No answers on this topic
CrowdStrike
The training provided by Crowdstrike Falcon is complete in terms of the depth of technical knowledge and teaches the users about going through with the platform. There are lots of jargons for different tools that Crowdstrike Falcon has and this training teaches them all which helps in managing the platform better. Plus, the regular knowledge checks are also very helpful for the end user.
Read full review
Implementation Rating
Broadcom
No answers on this topic
CrowdStrike
Read the documentation
Read full review
Alternatives Considered
Broadcom
The big difference between Protect and Barkly/AMP is how exactly it goes about what it's doing. Protect is application whitelisting and program reputation. So the way it's protecting you is using a proprietary reputation service, and hash values to identify applications, and then hitting a list of whitelisted programs to decide if you are able to run that or not, based on the policy you are in. There is a LOT of value in that. We actually are working on transitioning to Cisco Advanced Malware Protection (AMP). The main reason is cost (about the same cost as Cb Protect, but with (most of) the featureset of all 3 Carbon Black products for less than 1/3 of the total spend. AMP works differently, looking at a reputation service powered by Cisco's Talos cloud. You don't really have application whitelisting, but that also reduces how many "requests" you get for applications. So I'll have to find a different way to do whitelisting and USB blocking and the like, but I'm getting more visibility across my network and also built in antivirus (TETRA engine - ClamAV with some work). Barkly is an add that we are looking to put in as it looks at behavior of programs. So specifically it watches for privilege elevation and the like. Thus far all the big name problem children (WannaCry, other ransomware problems) have been caught natively in Barkly day 0.
Read full review
CrowdStrike
It stacks on top. We love the ease of use, the third-party integration, having AI, and the CrowdStrike team was way more helpful with our team, so that adoption was within a couple of months. We also compared prices, and the value was higher, with a faster ROI, which helps our finance department start the project promptly.
Read full review
Return on Investment
Broadcom
  • App Control can ensure Continuous Compliance.
  • Solution can reduce expenses on different security software.
  • Nowadays Zero Trust approach is very important for any organization and Application control is one of the main parts of it.
Read full review
CrowdStrike
  • CrowdStrike Falcon's proactive threat mitigation has significantly reduced the risk of successful cyber attacks, resulting in tangible savings related to potential data breaches or system compromises.
  • The cloud-native architecture and automated features have improved operational efficiency.
  • The platform's real-time visibility and threat hunting capabilities have drastically improved incident response times.
Read full review
ScreenShots