What users are saying about
CrowdStrike Falcon
<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener'>Customer Verified: Read more.</a>
Top Rated
97 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener'>trScore algorithm: Learn more.</a>Score 9.2 out of 100
Based on 97 reviews and ratings
9 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener'>trScore algorithm: Learn more.</a>Score 9.3 out of 100
Based on 9 reviews and ratings
Feature Set Ratings
Endpoint Security
9.2
CrowdStrike Falcon
92%

Tanium
Feature Set Not Supported
N/A
CrowdStrike Falcon Endpoint Protection ranks higher in 7/7 features
CrowdStrike Falcon Endpoint Protection ranks higher in 7/7 features
Anti-Exploit Technology
9.3
93%
27 Ratings

N/A
0 Ratings
Endpoint Detection and Response (EDR)
9.7
97%
32 Ratings

N/A
0 Ratings
Centralized Management
9.3
93%
33 Ratings

N/A
0 Ratings
Hybrid Deployment Support
8.1
81%
4 Ratings

N/A
0 Ratings
Infection Remediation
9.2
92%
33 Ratings

N/A
0 Ratings
Vulnerability Management
9.0
90%
27 Ratings

N/A
0 Ratings
Malware Detection
9.5
95%
33 Ratings

N/A
0 Ratings
Attribute Ratings
- CrowdStrike Falcon Endpoint Protection is rated higher in 1 area: Likelihood to Recommend
Likelihood to Recommend
9.3
CrowdStrike Falcon
93%
36 Ratings

9.0
Tanium
90%
1 Rating
Support Rating
9.3
CrowdStrike Falcon
93%
13 Ratings

Tanium
N/A
0 Ratings
Likelihood to Recommend
CrowdStrike Falcon
Anyone who is looking for a leader in endpoint protection should consider CrowdStrike Falcon for sure, regardless of specific use cases. Anybody who is operating on a very lean security team that doesn't have the capability to provide 24x7x365 coverage should absolutely consider Falcon Complete. I've worked with various MSSP's in the past, but Falcon Complete is one I would definitely not lose any sleep at night knowing we're in good hands.

Verified User
Manager in Information Technology
Building Materials Company, 10,001+ employeesTanium
Tanium is suitable in any sort of organization where you want to look at your machines and what kind of applications they are running. One good example is removing an application from where it is not supposed to be in the organization. By using Tanium trace with basic English, first you can search all the machines which have that application, and second you can create a package either through a power shell command or CLI command and remove that application from all the machines at once.This is really saves lot of manual work, time, and also helps in balancing assets across an organization.

Verified User
Administrator in Information Technology
Information Technology and Services Company, 51-200 employeesPros
CrowdStrike Falcon
- Endpoint Isolation - instead of hoping an adversary was blocked in time. CrowdStrike locks down the endpoint beyond using the Windows Firewall. Allowing a whitelist of IPs brings additional management of that endpoint to another level that most other tools don't have.
- Rich Data Recording - CrowdStrike is best described as a giant tape recorder in the sky. When it lands on the box, it truly provides insight into the those that other tools could only dream of.
- Extensive APIs - CrowdStrike understands that they are not your only security vendor, so they have API usage for everything in their platform to automate and integrate to your heart's desire.
- Cloud Visibility - CrowdStrike's cloud monitoring capabilities are agnostic of cloud platform. No longer does one need to worry about putting all their eggs in one basket because the endpoint tool prefers one platform over another.
Principal Incident Responder (Sr.)
VerizonSecurity & Investigations, 10,001+ employees
Tanium
- Tanium helps in identifying a list of infected machines with any vulnerabilities. For example if we create a package with list of Windows vulnerabilities, it will push the package through its sensors to all the nodes, and trace out the infected machines in our organization.
- It helps in adding IOC's which helps us in track down the hashes or shah files existing with that IOC 's machines.
- The most impressive thing about Tanium is that it can quarantine the machine of our choice without connecting to the network, which really helps a lot of times in containment of any infected machines.

Verified User
Administrator in Information Technology
Information Technology and Services Company, 51-200 employeesCons
CrowdStrike Falcon
- The ability to do a system-level scan like a traditional AV is missing and isn't a feature CrowdStrike is planning on implementing. Old school IT guys are going to be curious about this.
- Host management and deletion are clunky and take 45 days for a machine to fall off your subscription license.
Information Security Analyst
Randall-ReillyMarketing and Advertising, 201-500 employees
Tanium
- One issue is its ring topology, as the data is stored in central hubs and pushed through its peer nodes. If the central hub fails, then the associated node will also result in failure.
- Another problem is that all Tanium management is on premises requiring the customer to maintain it. If we want ask any help from Tanium support we always get a response like "you are maintaining it yourselves and it's your responsibility.
- The Tanium User Interface could be improved a bit as, although the tool is rich in performance, a more impressive UI might really attract new customers.

Verified User
Administrator in Information Technology
Information Technology and Services Company, 51-200 employeesPricing Details
CrowdStrike Falcon
General
Free Trial
Yes
Free/Freemium Version
—Premium Consulting/Integration Services
Yes
Entry-level set up fee?
No
Starting Price
$6.99 per endpoint/month (for 5-250 endpoints, billed annually)
CrowdStrike Falcon Editions & Modules
Edition
Falcon Pro | $6.991 |
---|---|
Falcon Enterprise | $14.992 |
Falcon Premium | $17.992 |
- per endpoint/month (for 5-250 endpoints, billed annually)
- per endpoint/month (minimum number of endpoints applies)
Additional Pricing Details
—Tanium
General
Free Trial
—Free/Freemium Version
—Premium Consulting/Integration Services
—Entry-level set up fee?
No
Starting Price
—Tanium Editions & Modules
—
Additional Pricing Details
—Support Rating
CrowdStrike Falcon
CrowdStrike Falcon 9.3
Based on 13 answers
When I receive support, it is always useful and informative. However, the support doesn't get back to me in the most timely manner. Often, by the time I hear back from support I have already resolved the issue. But for bigger issues, that need more in-depth help the support team has been incredibly valuable.

Verified User
Analyst in Information Technology
Telecommunications Company, 1001-5000 employeesTanium
No score
No answers yet
No answers on this topic
Alternatives Considered
CrowdStrike Falcon
Crowdstrike Falcon Endpoint protection is based on AIML enhanced technology,l. It's cloud-based so users don't need to connect to their office network to get their policy synchronization done from Server to endpoints agents. Also, the Crowdstrike Falcon agent size is small and it consumes fewer resources of the machine.

Verified User
Consultant in Information Technology
Information Technology & Services Company, 51-200 employeesTanium
Tanium is best for identifying infrastructure infections, and it is easy use where a user who has basic English knowledge can search his queries very easily. Tanium's exceptional feature is quarantining the machine from network, and this is a really impressive feature which should gain them new customers. Tanium helps in removing the suspicious application quickly, which saves time and manual work.

Verified User
Administrator in Information Technology
Information Technology and Services Company, 51-200 employeesReturn on Investment
CrowdStrike Falcon
- CrowdStrike has cut our security costs.
- Has given us more insight into our end points.
- It has helped with our older PC's CPU usage.
- Cut our cost and time from managing multiple platforms down to managing one platform with better insight than what we had with multiple security platforms.

Verified User
C-Level Executive in Information Technology
Security & Investigations Company, 1-10 employeesTanium
- Adding the IOC 's tracing infected machines, and removing unwanted applications quickly.
- Quarantine the infected machine from the network in order to prevent it from causing damage or infecting other machines.
- The user interface could be improved.

Verified User
Administrator in Information Technology
Information Technology and Services Company, 51-200 employees