CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no performance impact, no additional agents, hardware, scheduled scans, firewall exceptions or admin credentials.
$59.99
per endpoint/month (minimum number of endpoints applies)
FortiClient
Score 8.6 out of 10
N/A
Fortinet offers FortiClient, their endpoint security system emphasizing automated advanced threat protection, security fabric integration, secure remote access, endpoint quarantine, and a comprehensive reporting dashboard.
N/A
SentinelOne Singularity
Score 8.9 out of 10
N/A
SentinelOne is endpoint security software, from the company of the same name with offices in North America and Israel, presenting a combined antivirus and EDR solution.
$4
per agent, per month
Pricing
CrowdStrike Falcon
FortiClient
SentinelOne Singularity
Editions & Modules
Falcon Go (Small Business)
$59.99
per endpoint/month (minimum number of endpoints applies)
Falcon Go (Small Business)
$59.99
Falcon Pro
$99.99
per endpoint/month (for 5-250 endpoints, billed annually)
Falcon Enterprise
$184.99
per endpoint/month (minimum number of endpoints applies)
No answers on this topic
Singularity Ranger IoT
$4
per agent, per month
Singularity Core
$6
per agent, per month
Singularity Control
$8
per agent, per month
Singularity Complete
$12
per agent, per month
Singularity Cloud
$36
per VM/Kubernetes worker node, per month
Offerings
Pricing Offerings
CrowdStrike Falcon
FortiClient
SentinelOne Singularity
Free Trial
Yes
No
No
Free/Freemium Version
No
No
No
Premium Consulting/Integration Services
Yes
No
No
Entry-level Setup Fee
No setup fee
No setup fee
No setup fee
Additional Details
—
Specific pricing details for FortiClient services vary depending on the number of endpoints, the duration of the subscription, and the specific features included.
I have evaluated Cortex XDR and SentinelOne Singularity alongside CrowdStrike Falcon, and while all three are capable enterprise-grade solutions, Falcon ultimately stood out due to its cloud-native architecture, broader modular coverage, and stronger identity-focused detection. …
Sentinelone is bit complicated language use in there console in compare to CrowdStrike Falcon. CrowdStrike Falcon have much big modules and features but sentinelone don't. CrowdStrike Falcon have one single unified agent and in sentinelone bit confused in selection of agent …
In my opinion, CrowdStrike Falcon does a better job of detection than Carbon black in all forms. Compared to SentinelOne XDR, CrowdStrike Falcon does a better job of finding potential threats even though the machine learning based detection cause more False Positives than the …
It is superior on the following two: Advanced threat detection because AI and ML can analyze vast amounts of data to identify subtle patterns that might indicate malicious activity, even zero-day attacks (previously unknown threats).Reduced false positives because it can help …
CrowdStrike Falcon provided more capability in a consolidated manner with reduced costing overall. Additionally, they have better presence and support in Australia region for any issues that might arise.
Pricing was less, it had better ratings as well as word of mouth in the market. Works on agent-based solution rather than remote access. Finds zero day attacks very soon recently CrowdStrike found the 3cx attack which is now a critical supply chain attack. CrowdStrike falls …
The logs analysis is very easy to use as it uses splunk in the backend. The automated SOAR features helps to save time and response on the incidents. The threat intelligence is very up-to-date with the recent cyber attacks.
CrowdStrike Falcon Endpoint certainly comes in with a slight price premium compared to other offerings, but when you're talking about your last line of defense against malware it's well worth it. From a feature perspective, many players offer similar feature sets but what sets …
Crowdstrike Falcon Endpoint protection is based on AIML enhanced technology,l. It's cloud-based so users don't need to connect to their office network to get their policy synchronization done from Server to endpoints agents. Also, the Crowdstrike Falcon agent size is small and …
[Because of] its cloud-based architecture, complete set of features, LDAP integration and massive deployment options. The open integration with another security solution and it's almost native with all Windows flavors including Windows Server. Its Incident Response Team is a …
I was not part of the selection process; however after speaking with the team that did make the call, the following where the key scenarios or features that ultimately made the decision.
The number one decision from the support team was the client deployment and management of …
SentinelOne is Falcon's greatest competitor on the market at this time. The only real deficit comparing the two, is SentinelOne's ability to support legacy OS that CrowdStrike has chosen not to support. This decision results in an environment choosing to use Falcon with …
Business requirements, mainly. The most important/useful items we appreciate is ease of use and customer service and this product exceeds expectations in that regard. Other offers cover legacy systems and remain with that solution. However, the granularity that you can …
My current organization is using FortiClient and they decided to use it since longer period. The main advantages is we are using it for connect RDP and and access private URL. But main reason is one time configuration is help us to connect it any time from anywhere. It's …
Only reason for choosing SentinelOne Singularity over crowdstrike was the cost because SentinelOne Singularity was much cheaper at that time as compared to the crowdstrike. Also, SentinelOne Singularity rating in gartner was higher than the crowdstrike which also gave it an …
SentinelOne Singularity is a far superior product to Symantec Endpoint Security, which is the product we migrated from, when we purchased SentinelOne. Symantec simply missed security incidents it should have been able to catch, and support has recently changed for the worse. …
SentinelOne Singularity is also a very good product.Crowdstrike is also a leading company in EDR point of view and provide wide range of services and product.But because of last incident happen crowdstrike customer are bit hesitate going with crowdstrike.And SentinelOne …
SentinelOne had all of the major features that we were looking for. The other products either required too much administrative attention or were lacking key features. For example, one could be uninstalled by the end user. We required that the installation be password …
Crowdstrike is a unified platform for monitoring endpoint devices, whether they're workstations, servers, cloud-native machines, or even mobile devices. It uses AI/ML to monitor anomalies and suspicious behavior, including zero-day attacks. It is suitable for large organizations but may be costlier or less appropriate for smaller organizations, those who want an on-prem EDR setup, and those who need custom scanning based on compliance requirements.
Overall, my experience with the client is good, and because of its performance and lightweight, I recommend this software to my colleagues. Before this, I also used other apps for the same purpose, but my search ended when I came to Forticlient.
It works extremely well for investigating the root cause analysis of events because you can see so much detail into what was happening before, after, and around the detective incident. A weak point would be when the AI gets a little over-aggressive or doesn’t quite understand the use case for specific tools. Our RMM tool was detected as a pup.
Virtually a one-click action connection to my work network while remote. I just enter my network username & Password, click connect, and I can access all the fileshares as if I were on-site.
Speed - I have used other virtual network clients in the past, and the speed while working remote with one of them (even on a high speed connection) was easily 10x slower than if I were physically on the network. FortiClient is different, where the speed degradation is on the magnitude of only 2-3x slower - A significant and noticeable difference compared to other clients on the market.
On MacOS, FortiClient has a little toolbar icon that gives me a status, as well as actions to quickly connect or disconnect from my work network. It is a small thing, but a super handy feature!
font way too small on login, unable to select an option, for example, to see each letter of password as typed promotes errors at login
login errors and failure rate extremely high as [reported] by all our physicians and other providers: not infrequently one will have to return to office after hours in order to complete charts or access charts to answer patient after hours questions
frequent disconnects in spite of excellent internet signal
Crowdstrike has a large suite of tools built for helping the engineers triage and respond to security event whenever identified. The ability to customize the security policies and implement more granular policies to different devices based on the functionality is unmatched. Crowdstrike provides so much of ability in a decent budget which ascertains the value for money or ROI.
Because the software is very simple and easy to use, very efficient, and has a stable connection that allows the user to perform tasks without problems. Also, this software does not need to be configured by IT technicians, since it comes with a very developed and understandable set up guide.
I think it is a complete and very trustful XDR platform, with very few False Positives. It is very well supported by highly skilled professionals on all levels: from pre-sales engineers, Customer Account Managers and support engineers.
We have used Forticlient for a number of years now and have found only minor faults with the application. The fact that our end users request little to no training to be able to utilize our VPN says a lot compared to the product we previously used to use for similar tasks. The Forticlient shield is a quick way to 'demonstrate confidence in security' at a glance among our end users - if you see the shield, you are protected. The only downside we've experienced is a few false positive AV detections, but this is more linked to Fortiguard labs/signatures.
There are some minor issues with the platform that can be mildly frustrating, but the overall performance, peace of mind, and ROI make it worth using. The management console is intuitive and easy to learn, the endpoint clients are simple but give IT professionals enough data to make management easy and simple
Any time we need to engage the Crowdstrike Falcon Complete Team, their response is switch, thorough, and they are sure to not close out any request until the customer confirms that they have provided an acceptable resolution. If I ever need anything from the account team related to the product, I also get a response from them within minutes typically to address my question. Top notch customer service!
FortiClient is a security suite with which we can keep our equipment well-protected. And it is that in a system like Windows, which is always the target of all kinds of attacks, it is not enough to have a simple antivirus.
Their support is good and quick to respond. The one issue we faced was when a non-protection issue arose there was a lot of dancing around trying to figure things out. This was frustrating as it took significantly longer to figure out issues. Lots of repetitive log gathers, screen caps, uninstalls that never seemed to resolve issues. Eventually, the product would be updated and the issue seemed to be resolved, but seemed to be the only solution.
There is limited amount of learning that can be completed in an in-person training available. In my opinion, the self-paced learning provided by Falcon portal is more useful over in-person training. The support from Falcon is great and useful to overcome difficulties, if any.
The training provided by Crowdstrike Falcon is complete in terms of the depth of technical knowledge and teaches the users about going through with the platform. There are lots of jargons for different tools that Crowdstrike Falcon has and this training teaches them all which helps in managing the platform better. Plus, the regular knowledge checks are also very helpful for the end user.
It was just a legacy AV program onboarded during initial setup days. As the org. As it expanded, its threat landscape also grew, and we needed a next-gen solution to protect against evolving threat vectors. Falcon EDR was the one that solved all these in a single place.
Overally, FortiClient has less vulnerabilities than the two other products. The price is comparable to Citrix Gateway, but significantly less than Cisco AnyConnect. Much of the benefits of the FortiClient come with its ability to integrate with other Fortinet solutions. Without that, it is interchangeable with almost any other client.
SentinelOne had all of the major features that we were looking for. The other products either required too much administrative attention or were lacking key features. For example, one could be uninstalled by the end user. We required that the installation be password protected to protect against end user disabling or uninstalling. One product required manual intervention for all remediation which put to high a burden on limited staff. All products are always being revised so these may no longer be issues but they had a significant impact on our decision.
CrowdStrike Falcon's proactive threat mitigation has significantly reduced the risk of successful cyber attacks, resulting in tangible savings related to potential data breaches or system compromises.
The cloud-native architecture and automated features have improved operational efficiency.
The platform's real-time visibility and threat hunting capabilities have drastically improved incident response times.
SentinelOne has already proved its value by stopping attacks that would have gone otherwise unnoticed until much later in their infection process.
The Vigilance team has provided quick response to threats that were not easily contained via the automated response SentinelOne's agents provide. This has given us a significant piece of mind.