CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no performance impact, no additional agents, hardware, scheduled scans, firewall exceptions or admin credentials.
$59.99
per endpoint/month (minimum number of endpoints applies)
Malwarebytes
Score 8.8 out of 10
N/A
Malwarebytes is a antimalware application for home and small businesses, which blocks viruses, malware, hackers, viruses, and malicious websites.
$119.99
per year 3 devices
SentinelOne Singularity
Score 8.9 out of 10
N/A
SentinelOne is endpoint security software, from the company of the same name with offices in North America and Israel, presenting a combined antivirus and EDR solution.
$4
per agent, per month
Pricing
CrowdStrike Falcon
Malwarebytes
SentinelOne Singularity
Editions & Modules
Falcon Go (Small Business)
$59.99
per endpoint/month (minimum number of endpoints applies)
Falcon Go (Small Business)
$59.99
Falcon Pro
$99.99
per endpoint/month (for 5-250 endpoints, billed annually)
Falcon Enterprise
$184.99
per endpoint/month (minimum number of endpoints applies)
Teams - Sole proprietor
$119.99
per year 3 devices
Teams - Boutique business
$399.99
per year 10 devices
Teams - Small office
$799.99
per year 20 devices
Singularity Ranger IoT
$4
per agent, per month
Singularity Core
$6
per agent, per month
Singularity Control
$8
per agent, per month
Singularity Complete
$12
per agent, per month
Singularity Cloud
$36
per VM/Kubernetes worker node, per month
Offerings
Pricing Offerings
CrowdStrike Falcon
Malwarebytes
SentinelOne Singularity
Free Trial
Yes
No
No
Free/Freemium Version
No
No
No
Premium Consulting/Integration Services
Yes
No
No
Entry-level Setup Fee
No setup fee
No setup fee
No setup fee
Additional Details
—
All plans include a 60-day money back guarantee. 1st year discount available for the Small office plan.
—
More Pricing Information
Community Pulse
CrowdStrike Falcon
Malwarebytes
SentinelOne Singularity
Considered Multiple Products
CrowdStrike Falcon
Verified User
Director
Chose CrowdStrike Falcon
We still utilize Malwarebytes, CrowdStrike has proven to catch more malware than Symantec (although with more false positives). CrowdStrike has not to date caused any issues with applications running on our endpoints and is not even noticed by our end users. Deployment seems to …
I have evaluated Cortex XDR and SentinelOne Singularity alongside CrowdStrike Falcon, and while all three are capable enterprise-grade solutions, Falcon ultimately stood out due to its cloud-native architecture, broader modular coverage, and stronger identity-focused detection. …
Sentinelone is bit complicated language use in there console in compare to CrowdStrike Falcon. CrowdStrike Falcon have much big modules and features but sentinelone don't. CrowdStrike Falcon have one single unified agent and in sentinelone bit confused in selection of agent …
In my opinion, CrowdStrike Falcon does a better job of detection than Carbon black in all forms. Compared to SentinelOne XDR, CrowdStrike Falcon does a better job of finding potential threats even though the machine learning based detection cause more False Positives than the …
It is superior on the following two: Advanced threat detection because AI and ML can analyze vast amounts of data to identify subtle patterns that might indicate malicious activity, even zero-day attacks (previously unknown threats).Reduced false positives because it can help …
At the time we evaluated the products, CrowdStrike was clearly leading in this space. It's possible since that time so other products have added additional features and may be equivalent.
CrowdStrike Falcon provided more capability in a consolidated manner with reduced costing overall. Additionally, they have better presence and support in Australia region for any issues that might arise.
Pricing was less, it had better ratings as well as word of mouth in the market. Works on agent-based solution rather than remote access. Finds zero day attacks very soon recently CrowdStrike found the 3cx attack which is now a critical supply chain attack. CrowdStrike falls …
The logs analysis is very easy to use as it uses splunk in the backend. The automated SOAR features helps to save time and response on the incidents. The threat intelligence is very up-to-date with the recent cyber attacks.
CrowdStrike Falcon Endpoint certainly comes in with a slight price premium compared to other offerings, but when you're talking about your last line of defense against malware it's well worth it. From a feature perspective, many players offer similar feature sets but what sets …
Crowdstrike Falcon Endpoint protection is based on AIML enhanced technology,l. It's cloud-based so users don't need to connect to their office network to get their policy synchronization done from Server to endpoints agents. Also, the Crowdstrike Falcon agent size is small and …
[Because of] its cloud-based architecture, complete set of features, LDAP integration and massive deployment options. The open integration with another security solution and it's almost native with all Windows flavors including Windows Server. Its Incident Response Team is a …
I was not part of the selection process; however after speaking with the team that did make the call, the following where the key scenarios or features that ultimately made the decision.
The number one decision from the support team was the client deployment and management of …
SentinelOne is Falcon's greatest competitor on the market at this time. The only real deficit comparing the two, is SentinelOne's ability to support legacy OS that CrowdStrike has chosen not to support. This decision results in an environment choosing to use Falcon with …
Crowdstrike has a much lower memory footprint than most traditional antivirus platforms and has a much more modern interface. The centralized portal gives data which feels like it actually represents reality. We feel we can be confident that Falcon actually works but we have …
Business requirements, mainly. The most important/useful items we appreciate is ease of use and customer service and this product exceeds expectations in that regard. Other offers cover legacy systems and remain with that solution. However, the granularity that you can …
Only reason for choosing SentinelOne Singularity over crowdstrike was the cost because SentinelOne Singularity was much cheaper at that time as compared to the crowdstrike. Also, SentinelOne Singularity rating in gartner was higher than the crowdstrike which also gave it an …
SentinelOne Singularity is a far superior product to Symantec Endpoint Security, which is the product we migrated from, when we purchased SentinelOne. Symantec simply missed security incidents it should have been able to catch, and support has recently changed for the worse. …
SentinelOne Singularity is also a very good product.Crowdstrike is also a leading company in EDR point of view and provide wide range of services and product.But because of last incident happen crowdstrike customer are bit hesitate going with crowdstrike.And SentinelOne …
Webroot is a great product but did not provide the versatility that we really were desiring. It allowed to us to centrally manage, but required policy-based management, and not the endpoint detail we wanted. SentinelOne's central management provides a variety of options for …
SentinelOne had all of the major features that we were looking for. The other products either required too much administrative attention or were lacking key features. For example, one could be uninstalled by the end user. We required that the installation be password …
Compared to the competition there really is no comparison. While there are many far better known endpoint protection products that have been around many years longer, SentinelOne puts them all to shame. It is the most solid endpoint/anti-virus product that I have used in over …
Crowdstrike is a unified platform for monitoring endpoint devices, whether they're workstations, servers, cloud-native machines, or even mobile devices. It uses AI/ML to monitor anomalies and suspicious behavior, including zero-day attacks. It is suitable for large organizations but may be costlier or less appropriate for smaller organizations, those who want an on-prem EDR setup, and those who need custom scanning based on compliance requirements.
Now, I gave it that rating because it's a handy tool for diagnosing issues. Quarantining them, and most of the time, it does fix the problem. Though with rootkits, it's been hit or miss, and sometimes perfectly valid software gets flagged erroneously. However, once you've run it, it tends to run continuously, consuming far too many resources and being a real pain to uninstall, sometimes even causing issues.
It works extremely well for investigating the root cause analysis of events because you can see so much detail into what was happening before, after, and around the detective incident. A weak point would be when the AI gets a little over-aggressive or doesn’t quite understand the use case for specific tools. Our RMM tool was detected as a pup.
Low system resources, it does not slow down the whole computer when scanning or when real-time protection is enabled
Quick and frequent updates, usually people hate updating, but for malware/viruses, you want to be updated as possible. It takes less than 15 seconds and usually does it automatically. They usually send a few updates a day as they find more.
Protection features actually work when visiting known bad websites. The page will be blocked and nothing will be downloaded. It may not be what the user wants, but it's what the user needs (as the user can't know every bad website)
One of the main things that malwarebytes is missing as a company, is phone support for its clients. All support questions has to go thru email only. This is not acceptable for issues that needs to be resolved quickly.
There is an issue when installing the client on a machine, it has a set amount of time where the software can register with the management server. The issue with this is, with machines that are over a wide area network, slow connection speeds can cause the software not to register. When that happens, it never re attempts to register in the future.
Crowdstrike has a large suite of tools built for helping the engineers triage and respond to security event whenever identified. The ability to customize the security policies and implement more granular policies to different devices based on the functionality is unmatched. Crowdstrike provides so much of ability in a decent budget which ascertains the value for money or ROI.
The last time we renewed Malwarebytes, we renewed for a 3 year renewal. That should describe the confidence we have in the product. Plus the cost savings impact year after year.
I think it is a complete and very trustful XDR platform, with very few False Positives. It is very well supported by highly skilled professionals on all levels: from pre-sales engineers, Customer Account Managers and support engineers.
Usability-wise, it's pretty good, and it gets the job done. But once that's finished, the nags, the pop-ups, and the fact that it slows older systems down recklessly really cost it rating points. It becomes a clutter, and one of the first things we check when we receive reports that a PC is slow is whether it's running malware. Once we uninstall it, the PC is usually easily 40-50% faster. That's too much in the way of resources for something that wants to always run in the background.
There are some minor issues with the platform that can be mildly frustrating, but the overall performance, peace of mind, and ROI make it worth using. The management console is intuitive and easy to learn, the endpoint clients are simple but give IT professionals enough data to make management easy and simple
Any time we need to engage the Crowdstrike Falcon Complete Team, their response is switch, thorough, and they are sure to not close out any request until the customer confirms that they have provided an acceptable resolution. If I ever need anything from the account team related to the product, I also get a response from them within minutes typically to address my question. Top notch customer service!
The Malwarebytes customer support team is awesome! They really go above and beyond to help you with whatever issue you may experience. It is not that we need to contact their support team often, but the few times we did, we would speak to someone who knew what they were talking about and able to solve our problem. It is a comfort knowing that aside from a great product, you are getting a reliable support structure.
Their support is good and quick to respond. The one issue we faced was when a non-protection issue arose there was a lot of dancing around trying to figure things out. This was frustrating as it took significantly longer to figure out issues. Lots of repetitive log gathers, screen caps, uninstalls that never seemed to resolve issues. Eventually, the product would be updated and the issue seemed to be resolved, but seemed to be the only solution.
There is limited amount of learning that can be completed in an in-person training available. In my opinion, the self-paced learning provided by Falcon portal is more useful over in-person training. The support from Falcon is great and useful to overcome difficulties, if any.
The training provided by Crowdstrike Falcon is complete in terms of the depth of technical knowledge and teaches the users about going through with the platform. There are lots of jargons for different tools that Crowdstrike Falcon has and this training teaches them all which helps in managing the platform better. Plus, the regular knowledge checks are also very helpful for the end user.
It was just a legacy AV program onboarded during initial setup days. As the org. As it expanded, its threat landscape also grew, and we needed a next-gen solution to protect against evolving threat vectors. Falcon EDR was the one that solved all these in a single place.
Avast and Norton's products were part of the testing for us but the cost was very high for them and the products were not light on the machine. They took up a lot of memory and slowed the computers down. Malwarebytes although may lack some feature, is a very light software.
SentinelOne had all of the major features that we were looking for. The other products either required too much administrative attention or were lacking key features. For example, one could be uninstalled by the end user. We required that the installation be password protected to protect against end user disabling or uninstalling. One product required manual intervention for all remediation which put to high a burden on limited staff. All products are always being revised so these may no longer be issues but they had a significant impact on our decision.
CrowdStrike Falcon's proactive threat mitigation has significantly reduced the risk of successful cyber attacks, resulting in tangible savings related to potential data breaches or system compromises.
The cloud-native architecture and automated features have improved operational efficiency.
The platform's real-time visibility and threat hunting capabilities have drastically improved incident response times.
Positive Impact: Have not had to remediate malware/virus infections since installed.
Positive impact: As far as browsing goes, we can boldly go where no man has gone before. No, really, I am confident when I am clicking on search engine results that if something get past my trained eye, Malwarebytes will pick of the slack.
SentinelOne has already proved its value by stopping attacks that would have gone otherwise unnoticed until much later in their infection process.
The Vigilance team has provided quick response to threats that were not easily contained via the automated response SentinelOne's agents provide. This has given us a significant piece of mind.