CrowdStrike Falcon vs. CyberArk Privileged Access Management

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
CrowdStrike Falcon
Score 9.1 out of 10
N/A
CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no performance impact, no additional agents, hardware, scheduled scans, firewall exceptions or admin credentials.
$6.99
per endpoint/month (for 5-250 endpoints, billed annually)
CyberArk Privileged Access Management
Score 8.2 out of 10
N/A
CyberArk is a privileged account and access security suite issued by the company of the same name in Massachusetts . The Core Privileged Access Security Solution unifies Enterprise Password Vault, Privileged Session Manager and Privileged Threat Analytics to protect an organization’s most critical assets.N/A
Pricing
CrowdStrike FalconCyberArk Privileged Access Management
Editions & Modules
Falcon Pro
$6.99
per endpoint/month (for 5-250 endpoints, billed annually)
Falcon Enterprise
$14.99
per endpoint/month (minimum number of endpoints applies)
Falcon Premium
$17.99
per endpoint/month (minimum number of endpoints applies)
No answers on this topic
Offerings
Pricing Offerings
CrowdStrike FalconCyberArk Privileged Access Management
Free Trial
YesYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
YesNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional DetailsCyberArk offers a variety of Identity Security packages for different user types within an organization.
More Pricing Information
Community Pulse
CrowdStrike FalconCyberArk Privileged Access Management
Considered Both Products
CrowdStrike Falcon
Chose CrowdStrike Falcon
CrowdStrike Falcon's cloud-native architecture gives it an edge in terms of scalability, ease of deployment, and real-time threat intelligence updates. The user interface of Falcon is intuitive and offers clear visibility into our organization's threat landscape. Our team felt …
CyberArk Privileged Access Management

No answer on this topic

Top Pros

No answers on this topic

Top Cons

No answers on this topic

Features
CrowdStrike FalconCyberArk Privileged Access Management
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
CrowdStrike Falcon
8.8
70 Ratings
4% above category average
CyberArk Privileged Access Management
-
Ratings
Anti-Exploit Technology8.963 Ratings00 Ratings
Endpoint Detection and Response (EDR)9.469 Ratings00 Ratings
Centralized Management8.570 Ratings00 Ratings
Hybrid Deployment Support8.24 Ratings00 Ratings
Infection Remediation8.967 Ratings00 Ratings
Vulnerability Management8.354 Ratings00 Ratings
Malware Detection9.369 Ratings00 Ratings
Best Alternatives
CrowdStrike FalconCyberArk Privileged Access Management
Small Businesses
SentinelOne Singularity
SentinelOne Singularity
Score 9.1 out of 10

No answers on this topic

Medium-sized Companies
SentinelOne Singularity
SentinelOne Singularity
Score 9.1 out of 10
Delinea Secret Server
Delinea Secret Server
Score 8.7 out of 10
Enterprises
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 8.7 out of 10
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 8.7 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
CrowdStrike FalconCyberArk Privileged Access Management
Likelihood to Recommend
9.3
(73 ratings)
8.0
(9 ratings)
Likelihood to Renew
9.5
(2 ratings)
-
(0 ratings)
Usability
9.1
(1 ratings)
-
(0 ratings)
Support Rating
10.0
(8 ratings)
7.2
(4 ratings)
In-Person Training
9.0
(1 ratings)
-
(0 ratings)
User Testimonials
CrowdStrike FalconCyberArk Privileged Access Management
Likelihood to Recommend
CrowdStrike
I would highly recommend CrowdStrike Falcon to any organization serious about bolstering its cybersecurity defenses. The platform's effectiveness in threat detection, proactive mitigation, and scalability make it a valuable asset in today's ever-evolving threat landscape. Despite some learning curves and integration challenges, the return on investment and the overall security enhancement justify its strong recommendation.
Read full review
Cyberark
The system is great for enterprise or larger IT departments or teams where temporary or full access may be given using privileged IDs. Requirements for needing local admin access is also eliminated which can help with specific Windows workstation related tasks. It can be very useful when working with remote teams or contractors who may need temporary access to a system when required.
Read full review
Pros
CrowdStrike
  • The Log analysis is very detailed and easy to use.
  • Prevent and block all type of malwares.
  • Great threat intelligence which is very up-to-date with the recent cyber attacks
  • very user friendly in access and management
  • Automated feature of detecting, taking action and closing incidents using fusion workflow.
Read full review
Cyberark
  • Automatically discover new servers on the network and take control of the local admin password by vaulting it and ensuring nobody knows the password. A different password on every server.
  • Automatically roll the password in a configurable manner - after each use, after a certain period of time, etc.
  • Track and govern sensitive account usage by ensuring only properly authorized users can access the vault and obtain the credentials and then monitor usage.
Read full review
Cons
CrowdStrike
  • Sometimes updates to sensor versions fail, which requires manual intervention by internal staff members
  • The variety of different administrative privilege levels is vast and sometimes confusing
  • Proactive notifications confirming the health of the environment would be great instead of just reporting on potential issues
Read full review
Cyberark
  • GUI - right now everything is on one page/dashboard. Some level of folder/Safe type view would be great
  • More options when storing passwords - especially for network based passwords
  • Better integrations with vendors like Cisco so that admins dont need to really get the password from the vault (think Last Pass type add on)
Read full review
Likelihood to Renew
CrowdStrike
Crowdstrike has a large suite of tools built for helping the engineers triage and respond to security event whenever identified. The ability to customize the security policies and implement more granular policies to different devices based on the functionality is unmatched. Crowdstrike provides so much of ability in a decent budget which ascertains the value for money or ROI.
Read full review
Cyberark
No answers on this topic
Usability
CrowdStrike
I think it is a complete and very trustful XDR platform, with very few False Positives. It is very well supported by highly skilled professionals on all levels: from pre-sales engineers, Customer Account Managers and support engineers.
Read full review
Cyberark
No answers on this topic
Support Rating
CrowdStrike
Support is generally pretty fast and gets right to the issue. We haven't had to use them much, fortunately, but the issues and questions we've had are usually answered quickly. The customer success manager/account manager you're assigned will also follow up with you on a regular cadence to ensure you're getting the most out of the subscription. There's not a whole lot of room to improve, other than the general confusion about what is/what is not covered in custom packages you're subscribed to. The initial purchase took much longer because of a package name changes and realignments of different modules into those packages.
Read full review
Cyberark
Customer support and technical support have always been great when we require assistance. Especially when we come across issues that we're not familiar with.
Read full review
In-Person Training
CrowdStrike
There is limited amount of learning that can be completed in an in-person training available. In my opinion, the self-paced learning provided by Falcon portal is more useful over in-person training. The support from Falcon is great and useful to overcome difficulties, if any.
Read full review
Cyberark
No answers on this topic
Online Training
CrowdStrike
The training provided by Crowdstrike Falcon is complete in terms of the depth of technical knowledge and teaches the users about going through with the platform. There are lots of jargons for different tools that Crowdstrike Falcon has and this training teaches them all which helps in managing the platform better. Plus, the regular knowledge checks are also very helpful for the end user.
Read full review
Cyberark
No answers on this topic
Alternatives Considered
CrowdStrike
CrowdStrike Falcon's cloud-native architecture gives it an edge in terms of scalability, ease of deployment, and real-time threat intelligence updates. The user interface of Falcon is intuitive and offers clear visibility into our organization's threat landscape. Our team felt more comfortable navigating Falcon's dashboard. CrowdStrike Falcon's API and integration capabilities meant we could easily incorporate it into our existing tech stack, enhancing our other tools. Falcon's seemed more flexible for our specific needs.
Read full review
Cyberark
It is known as one of the safest products in the market. It has good support and is also available as on-premise. You can run it virtually on VMWare (and probably on other hypervisors as well). You can have a second instance on bare metal and that makes it a very safe system.
Read full review
Return on Investment
CrowdStrike
  • Centralized resource management means we need less tools to do the same job.
  • EDR data is massive and has to be factored into the overall cost of the product. You are exponentially punished for more devices.
  • CS has allowed larger coverage over devices and has discovered massive pockets of no protections.
Read full review
Cyberark
  • Decreased the probability of an external cyber attack to privileged accounts..
  • Management can control privileged account life cycle management more effectively
  • Recording privileged sessions allows our organization to play back exactly the point of a breach or malicious behavior
  • Automated system to manage and verify passwords, as privileged accounts are constantly created and deleted
  • Automatic PWD change functionality will substantially decrease probability of PWD theft or misuse.
Read full review
ScreenShots

CyberArk Privileged Access Management Screenshots

Screenshot of ISPSSScreenshot of Privilege CloudScreenshot of Identity Security IntelligenceScreenshot of Identity Security Intelligence