CrowdStrike Falcon - An Unified Endpoint Security Solution.
Use Cases and Deployment Scope
I'm a security analyst who uses CrowdStrike Falcon for day-to-day endpoint monitoring and response. There is no such problem compared to the competitors. It does its job really well. Our scope is to monitor endpoint assets, including workstations, servers, and DCs (Windows OS, Linux OS, and macOS), for any suspicious or malicious behavior or attempts.
Pros
- Monitor Endpoint Assets for Anomalies using AI/ML.
- Manage Threat hunting using its overwatch function.
- Managing the asset inventory.
- The identity protection feature detections and stop attacks that abuse user identities.
- The Exposure Management function helps in identifying application and OS vulnerabilities before attackers exploit them.
Cons
- The new NG-SIEM has a complex console to handle, which can be more smoother.
- All the features look perfect and there is no room for improvement.
Return on Investment
- It helps in reducing breach risk and production disruption cost.
- It reduced employee bandwidth and analysis time compare to SOC operations because it takes action based on the severity.
- It has a Presentable dashboard with executive and board driven visibility.
- It improves Compliance and Audit posture.
- Only negative impact is, its more costlier specially for small organizations.
Alternatives Considered
Palo Alto Networks Cortex XDR and SentinelOne Singularity
Other Software Used
IBM Security QRadar SIEM, Palo Alto Networks Cortex XDR, SentinelOne Singularity


