Likelihood to Recommend I would highly recommend CrowdStrike Falcon to any organization serious about bolstering its cybersecurity defenses. The platform's effectiveness in threat detection, proactive mitigation, and scalability make it a valuable asset in today's ever-evolving threat landscape. Despite some learning curves and integration challenges, the return on investment and the overall security enhancement justify its strong recommendation.
Read full review It is more suited to environments that have a large internal user base since there will be more incidents that require forensic analysis. It will be less suited for environments that have a small internal user base due to the fact that there would be fewer incidents that require forensic analysis, but it really depends on the industry that a small internal user base is a part of.
Read full review Pros The Log analysis is very detailed and easy to use. Prevent and block all type of malwares. Great threat intelligence which is very up-to-date with the recent cyber attacks very user friendly in access and management Automated feature of detecting, taking action and closing incidents using fusion workflow. Read full review Functionality meets minimal requirements, since it performs forensic investigations as advertised. Read full review Cons Sometimes updates to sensor versions fail, which requires manual intervention by internal staff members The variety of different administrative privilege levels is vast and sometimes confusing Proactive notifications confirming the health of the environment would be great instead of just reporting on potential issues Read full review Their UI definitely needs to be more user-friendly, right now it is very cumbersome to run and view investigations. Authentication mechanism should be a simple username/password, not certificate-based which is difficult to manage. Needs better support documentation for the product, it is difficult to find solutions to issues that we run into. Read full review Likelihood to Renew Crowdstrike has a large suite of tools built for helping the engineers triage and respond to security event whenever identified. The ability to customize the security policies and implement more granular policies to different devices based on the functionality is unmatched. Crowdstrike provides so much of ability in a decent budget which ascertains the value for money or ROI.
Read full review Usability I think it is a complete and very trustful XDR platform, with very few False Positives. It is very well supported by highly skilled professionals on all levels: from pre-sales engineers, Customer Account Managers and support engineers.
Read full review Support Rating Support is generally pretty fast and gets right to the issue. We haven't had to use them much, fortunately, but the issues and questions we've had are usually answered quickly. The customer success manager/account manager you're assigned will also follow up with you on a regular cadence to ensure you're getting the most out of the subscription. There's not a whole lot of room to improve, other than the general confusion about what is/what is not covered in custom packages you're subscribed to. The initial purchase took much longer because of a package name changes and realignments of different modules into those packages.
Read full review Because support is non-existent whenever you have a functionality issue using the product. Also since the UI is so cumbersome to use we could use as much support as possible. Whenever we ask for support we are told to take the training which costs us more money. I believe that support should be easily accessible and affordable for the client
Read full review In-Person Training There is limited amount of learning that can be completed in an in-person training available. In my opinion, the self-paced learning provided by Falcon portal is more useful over in-person training. The support from Falcon is great and useful to overcome difficulties, if any.
Read full review Online Training The training provided by Crowdstrike Falcon is complete in terms of the depth of technical knowledge and teaches the users about going through with the platform. There are lots of jargons for different tools that Crowdstrike Falcon has and this training teaches them all which helps in managing the platform better. Plus, the regular knowledge checks are also very helpful for the end user.
Read full review Alternatives Considered CrowdStrike Falcon's cloud-native architecture gives it an edge in terms of scalability, ease of deployment, and real-time threat intelligence updates. The user interface of Falcon is intuitive and offers clear visibility into our organization's threat landscape. Our team felt more comfortable navigating Falcon's dashboard. CrowdStrike Falcon's API and integration capabilities meant we could easily incorporate it into our existing tech stack, enhancing our other tools. Falcon's seemed more flexible for our specific needs.
Read full review The other forensic tool that is a direct competitor to EnCase and wasn't listed above is the Forensic Toolkit or FTK. I believe that FTK is a better tool overall simply because it is easier to manage and use when it comes to investigations. Unfortunately, I wasn't part of the decision process and EnCase was the tool selected, otherwise, I would have recommended FTK.
Read full review Return on Investment Centralized resource management means we need less tools to do the same job. EDR data is massive and has to be factored into the overall cost of the product. You are exponentially punished for more devices. CS has allowed larger coverage over devices and has discovered massive pockets of no protections. Read full review One negative impact would be that since the UI is cumbersome to use we would need to spend more money on training which is not always feasible. Another negative impact would be that since there is not much support available this slows down investigations due to finding out how to troubleshoot and fix functionality issues. One positive impact would be that since it meets minimal requirements when it comes to forensic analysis it gives us visibility on any malicious activity occurring on a user's endpoint. Read full review ScreenShots