Skip to main content
TrustRadius
CrowdStrike Falcon

CrowdStrike Falcon

Overview

What is CrowdStrike Falcon?

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no performance impact, no additional agents,…

Read more
Recent Reviews
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Popular Features

View all 7 features
  • Endpoint Detection and Response (EDR) (69)
    9.4
    94%
  • Malware Detection (69)
    9.3
    93%
  • Infection Remediation (67)
    8.9
    89%
  • Centralized Management (70)
    8.5
    85%

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing

Falcon Pro

$6.99

Cloud
per endpoint/month (for 5-250 endpoints, billed annually)

Falcon Enterprise

$14.99

Cloud
per endpoint/month (minimum number of endpoints applies)

Falcon Premium

$17.99

Cloud
per endpoint/month (minimum number of endpoints applies)

Entry-level set up fee?

  • No setup fee
For the latest information on pricing, visithttps://www.crowdstrike.com/endpoint…

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Features

Endpoint Security

Endpoint security software protects enterprise connected devices from malware and cyber attacks.

8.8
Avg 8.5
Return to navigation

Product Details

What is CrowdStrike Falcon?

CrowdStrike offers cloud-delivered endpoint protection. CrowdStrike aims to revolutionize endpoint protection by unifying next-generation antivirus (AV), endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent.

The vendor states many of the world’s largest organizations use CrowdStrike, including three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies.

CrowdStrike Falcon Features

Endpoint Security Features

  • Supported: Anti-Exploit Technology
  • Supported: Endpoint Detection and Response (EDR)
  • Supported: Centralized Management
  • Supported: Infection Remediation
  • Supported: Vulnerability Management
  • Supported: Malware Detection

CrowdStrike Falcon Video

CEO George Kurtz discusses challenges organizations face using legacy cybersecurity solutions & how easy, fast & effective the CrowdStrike Falcon platform is by comparison.

CrowdStrike Falcon Integrations

CrowdStrike Falcon Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationApple iOS, Android
Supported LanguagesEnglish, Japanese

Frequently Asked Questions

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no performance impact, no additional agents, hardware, scheduled scans, firewall exceptions or admin credentials.

Reviewers rate Endpoint Detection and Response (EDR) highest, with a score of 9.4.

The most common users of CrowdStrike Falcon are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(234)

Attribute Ratings

Reviews

(1-25 of 31)
Companies can't remove reviews or game the system. Here's why
Humayoon Khan | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
I use CrowdStrike Falcon as the main source of monitoring threats originating from operating systems used by our servers, workstations, staff laptops and guest users machines.
Our organization being a university where thousands of students and hundreds of staff turn up daily, puts our critical assets at risk of being compromised by an insider. CrowdStrike Falcon helps us identify the source of a threat accurately, blocks the triggering file or script before it can cause damage. The AI / ML based detections are very helpful because they catch threats that other vendors may fail at. The scope of our use case is endpoint monitoring and threat management.









  • AI / ML based malicious activity detections
  • Detection information presented clearly and concisely on dashboard
  • Easy filtering of detections on hostname, detection name, severity, date, time, hash, technique etc
  • traces full process chain instead of just showing the source file or script which really helps in tracing the main security concern of machine
  • If some malicious app uses microsoft's signed binary like onedrive, cmd, wscript CrowdStrike would tag the microsoft binary as malicious and fails to provide the actual file that tried to execute these.
  • For example if a
  • malware.exe tries to run this command
  • cmd /c bitsadmin
  • CrowdStrike would tag cmd or bitsadmin as malicious and does not mention malware.exe at all sometimes
  • There are two different dashboards (updated and deprecated) which causes confusion among my team, all must be on same page and use single dashboard.
  • Support is very slow in responding to problems and depend on automated bots which really frustrates when a major issue arises.
It is best suited for organizations that have lot of machines and users, since CrowdStrike agent-based deployment is easy to manage and maintain.
CrowdStrike Falcon may be less appropriate for smaller organizations due to its cost, also a technical support team is required to install / remove agents from machines and monitor the dashboard for detections daily.
Score 10 out of 10
Vetted Review
Verified User
Our EDR and its operations utilize CrowdStrike Falcon as the cornerstone of security. Currently, people are concerned about the protection of IDs.
  • Prompt response
  • Reliable follow up
  • High detection ability
  • Enhancement of Japanese language
  • Screen configuration that requires no screen transitions as much as possible
CrowdStrike Falcon can be operated with a low operational load, and we believe it can be used by various organizations. I think there are not many organizations for which he is not suitable. Instead, I think it depends on whether or not you can trust and implement this highly complete service.
James Dilley | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We deployed CrowdStrike Falcon across our organization to strengthen our cyber defenses. The use cases ranged from endpoint protection to threat intelligence, covering a broad spectrum of security needs. The deployment was organization-wide, safeguarding endpoints and critical systems against evolving cyber threats. The reduction in manual tasks and real-time updates contribute to time savings for our security team.
  • CrowdStrike Falcon's next-gen endpoint protection consistently outperforms traditional solutions.
  • The cloud-native architecture ensures seamless scalability and real-time updates, eliminating the need for manual interventions.
  • CrowdStrike Falcon's threat intelligence and hunting capabilities are unparalleled.
  • The advanced features may pose a learning curve for users unfamiliar with modern cybersecurity tools.
  • A more transparent pricing model could assist in budget planning.
  • Expanding compatibility with a broader range of security solutions would be advantageous.
I would highly recommend CrowdStrike Falcon to any organization serious about bolstering its cybersecurity defenses. The platform's effectiveness in threat detection, proactive mitigation, and scalability make it a valuable asset in today's ever-evolving threat landscape. Despite some learning curves and integration challenges, the return on investment and the overall security enhancement justify its strong recommendation.
November 06, 2023

CrowdStrike Falcon Review

Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use CrowdStrike Falcon to detect potential malicious activity on both end user computers and servers.
  • Detects suspicious activity
  • Shows exact location and processes involved in suspicious activity
  • Isolate computers with suspicious activity
  • Setting up on MacOS was more complicated than expected (as kernel extensions were being phased out)
  • Remediation is not always as automated as some other systems (e.g. Malware Bytes)
CrowdStrike has detected some malicious activity on computers that it has stopped successfully. It works on Windows, MacOS, and Linux which is helpful for organizations with multiple OS's. It hasn't always been as great at preventing more minor adware or annoyance software. It can still sometimes be difficult to figure out exactly what a user was doing that triggered an alert.
November 01, 2023

CrowdStrike real review.

Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use it to protect all of our computers and servers.
  • Malware detection.
  • Bad behaviour detection.
  • Support on old Operatives Systems.
Protecting Windows, Linux, and MAC Operative Systems from all kinds of threats. Not only alerting but also preventing, using behavior detection and file analysis.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Fully Managed Security Service that investigates detections and either escalates or deals with them directly for us.
  • MDR
  • Vulnerability assessment.
  • Identity Protection.
  • Easier to use interface.
  • Log management.
  • Investigations
It is suited to small teams who require additional backup and assistance within the security area.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use CrowdStrike as an end-point protection application. We also use CrowdStrike's Identity Threat Protection module, which allows us to gain greater insight into and secure our end user by tying into our IAM solution. This helps us achieve our new cybersecurity goals of providing a primary focus on protecting user's identities and not putting the main focus on protecting endpoints. By implementing CrowdStrike Falcon Complete, we are able to monitor security for our endpoints and our user identities 24/7. This is a big plus for us as we are not staffed 24/7 and can rely on a reputable SOC from CrowdStrike to oversee and monitor security for all of our endpoints and our identities.
  • Protection of end points.
  • Protection of user identities.
  • Providing quick response to any identified security issues.
  • CrowdStrike can be on the more expensive side of end point and identity management, but it's worth it.
I feel CrowdStrike Falcon is well suited for anybody who takes securing their systems and employees safe. They have a $1 million breach policy, which helps give peace of mind that they stand behind their product and really believe in it. This was the big determining factor for us. Not because we needed the $1 million policy but because it shows how much they are willing to invest in their products as the best on the market.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use CrowdStrike Falcon Complete to augment our IT staff. Using complete gives us the 24X7 protection we need without burdening our already time challenged staff. The combination of CrowdStrike Falcon on our endpoints and monitoring by Crowdstrike Falcon complete gives us the coverage we need.
  • Staff did a great job pointing our IT workers to areas that needed remediation.
  • CrowdStrike Falcon Endpoint consistently blocks incursions from compromised websites and prevents PUPs from installing
  • Complete Staff is very attentive and makes whitelist changes quickly which allows our staff to be productive.
  • The Dashboard can become overwhelming at times, too much information to absorb
  • Computers that may have made it out into the field without the endpoint sensor are very difficult to find
  • As with all systems that rely on machine learning false positives occurr
I am not sure there is a scenario where CrowdStrike Falcon is less appropriate, the software does a great job of showing where the problem came from and how it was stopped by the system. A report is generated letting your staff know that a problem was found and remediated. I think if you have users that are working 24X7 or multiple time zones having Complete will take care of alot of hassles. You can work with your team to decide what level of involvement you want your complete team to take they can go from just monitoring all the way up to seeing and resolving issues with your staff being notified after resolution
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use Falcon to ensure we protect all our endpoint devices across the whole globally distributed organisation. We aim to utilise Falcon capabilities to prevent malware being distributed and exploited on all endpoint devices. Falcon Spotlight assists with getting visibility of the number of vulnerabilities we have on our endpoints to address by ensuring robust patch management capabilities.
  • Efficiently picking up and preventing malware threats on endpoints
  • Prompt notification capabilities on any issues
  • Ability to "set and forget" with minimal maintenance required
  • Falcon Spotlight integrations with automatic patching solution would be a good feature
  • LogScale with SIEM functionalities would be an added feature
  • Simplified one dashboard with all high-level information
Great product for endpoint detection and response for any sized organisations. Simple configuration and installation ensures its well suited for small and medium sized organisations.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Deployed CS Falcon in a higher education research environment. We needed to leverage a tool that can build a models and be on the advancement of technology due to the nature of higher education and BYOD. We installed the CS Falcon on all machines and worked with the CS team to build a Gov Cloud for research equipment that required a different set of cloud protocols.
  • Monitoring
  • Notification
  • Device Management
  • Have an executive dashboard
  • better reporting cadence
  • ability to tag devices with end user names
CS Falcon is suited for nearly all scenarios and deployment. The only challenge would be if devices contain protected data the need for the Gov Cloud installation would be necessary. This can split up your installation base but isn't anything that is very difficult to manage.
Itumeleng Thekiso | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use CrowdStrike Falcon as an endpoint sensor to detect vulnerabilities throughout our organizations endpoints, in this day and age vulnerabilities come in all shapes and sizes from all different kinds of directions bet it from; an e-mail that contains a malicious link, an infected file you unintensionally downloaded from the web, existing programs with old or new vulnerabilities that are installed on our endpoints etc.CrowdStrike Falcon really addresses these issues on a wider proportion making sure we stay up to date with new CVEs and that our endpoints are secured.
  • Host machine vulnerability detection
  • Threat mitigation
  • Activity monitoring
  • Constantly releases alerts or notifications
  • Behavourial analytics
  • Endpoint manual scan
  • Malware analysis needs improving
  • Requires some level of expertise to use its features
CrowdStrike is really a wide reaching EDR solution for very large organizations, it makes economical sense to deploy CrowdStrike Falcon if your organization has a large endpoint footprint, threat hunting is 24/7 so meaning if most of the security team is on holiday CrowdStrike is able to mitigate a lot of threats without the help of the security team essentially and it also does send out alerts if necessary.

However, CrowdStrike isn't your typical anti-virus solution it does not provide you with the ability to control it manually like you would with some products out there.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Crowdstrike Falcon is one of the leading NG-AV endpoint detection platforms in the market which is always up to date with the emerging threats. We use Crowdstrike Falcon to give MDR services to many of our customers. It helps to prevent, block all types of Cyber-attacks and also helps to get the detailed overview of the attack. It is very user friendly in access and management.
  • The Log analysis is very detailed and easy to use.
  • Prevent and block all type of malwares.
  • Great threat intelligence which is very up-to-date with the recent cyber attacks
  • very user friendly in access and management
  • Automated feature of detecting, taking action and closing incidents using fusion workflow.
  • The False positive alerts can be minimized
  • The UI can be made better and easy to access.
  • Customer support can be made better
It helps to detect and prevent malwares automatically which saves the response time to act. The machine learning and AI feature which helps to detect unusual behavioural based malwares which use defence evasion techniques. The fusion workflow feature which helps to automate the detection and blocking of less important files such as PUP/Adwares so the focus can be on real threats. The host logs are easy to filter and use which helps to do quick incident response.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
CrowdStrike Falcon Complete is utilized to provide managed EDR services on all server and workstation endpoints throughout our Corporate network. The software itself provides endpoint protection at the EDR level and the Falcon Complete service is leveraged as a 24x7x365 SOC MSSP to manage and remediate all endpoints plus analyze and provide proactive threat hunting capabilities for all data provided.
  • Updates are seamless and rarely fail compared to past products
  • The tool leverages the largest Cybersecurity threat database in the world
  • The response to a potential threat or inquiry by the managed services team is lightning fast
  • Extremely thorough responses from the managed services team on potential threats
  • Onboarding quick and painless
  • Sometimes updates to sensor versions fail, which requires manual intervention by internal staff members
  • The variety of different administrative privilege levels is vast and sometimes confusing
  • Proactive notifications confirming the health of the environment would be great instead of just reporting on potential issues
CrowdStrike Falcon Complete managed service is excellent for smaller organizations where staff is limited and outside SOC expertise can be leveraged to protect the organization from Cybersecurity threats. They are empowered to proactively remediate and perform threat containment 24x7x365 where as my staff is not active during overnight and weekend hours. They also leverage threat information from their huge data lake of intelligence from other customers against our data to keep us safe. If an organization has a larger Cybersecurity staff where these types of activities can be managed in-house, it can opt for the Falcon client-only option and not pay for the extra "complete" managed services portion.
April 06, 2023

EDR as it should be

Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use CrowdStrike Falcon as our EDR solution across our servers and client machines, about 200 endpoints in total.
  • We have very few false positives
  • We are alerted with a script runs, such as a powershell commands
  • It blocks rogue software from running
  • it looks for patterns such as items that spread
  • More customizable dashboards for each admin user
The client installed on the endpoints is small and non-intrusive. It monitors user endpoint behavior really well and is good at eliminating the false positives we've had with other software in the past. We spent very little time having to tweak this software to avoid all the noise. So far, it has caught and quarantined anything it found.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
CS Falcon is our primary tool of choice for endpoint protection. It has a small footprint and impact while being highly intelligent and very well supported.
With the majority of our users working in hybrid mode we needed a strong security control that could provide top-class protection with the minimum amount of False Positives (and, of course, of True Positives).
Falcon provides full visibility on processes, communication flows and all sorts of activities that are happening on the endpoints. It works smoothly with other tools that we have co-deployed, like DLP, DNS protection, SWG/CASB, App monitoring and Control.
Recently we added to our arsenal the Identity Protection and the Cloud Protection modules, driven by the business needs to reduce the number of vendors, tools and dashboards while achieving maximum protection and synergy/consolidation.
We believe that as a company, Crowdstrike sits on top of the range of security vendors that we work with, has the right vision and keeps delivering excellence.
We are quite happy with their Customer Success Management and Support Services and look forward to trialling their new functions: LogsScale and External Surface Risk Management.


  • Endpoint Security
  • Threat Detection, Protection, Reporting
  • Malware Analysis
  • Continuous fast delivery of new features and improvements
  • Customer awareness, learning and support
  • Device Control
  • Identity Protection
  • Identity Protection - plenty of small improvements which have been suggested by our side. Long list to mention them here. If needed I can forward you the email/presentation sent for the occassion to the Production team.
  • They recognised our contribution / remarks , by providing a discount on the initial offer, which we were happy to accept.
  • Our company went through an MnA with another pharmaceutical. Both companies had Crowdstrike EDR installed on endpoints, but on different Tenants.
  • Unfortunately there was not an official technical solution for migrating the endpoints to a unique tenant. We had to Uninstall the existing agent from the acquired company and then Reinstall it again, which was laborious and time-consuming. I wish they had a solution for such cases :-)
  • Attack Surface Management (demoed recently) doesn't seem to be fully matured yet, but they definitively are on a good path.
Well-suited for advanced and more mature environments, with dedicated personnel and well-versed in Threat and Incident Response.
The learning curb is a bit steep, but if time can be dedicated to attending Workshops and Learning modules on Crowdstrike University, then 3-6 months is a realistic timeframe to yield expected outcomes.
Clear blueprints for product rollout are provided to customers based on your specific environment.

Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use CrowdStrike as our endpoint protection and server protection, anti-virus, and malware product. We also leverage the firewall and USB device restrictions for our endpoint systems. We use it on both our Windows and Mac endpoints and on our Windows server infrastructure.
  • Firewall rules and policy that are cloud-managed is great to ensure devices are in compliance.
  • Low engineering time spent after implementation, we don't have to babysit the product. It just works.
  • Low amount of false positives.
  • I would like an option to be able to scan files/folders. I understand, however, that this isn't really the way the product is designed and that it is designed around actively running processes. But it would be great to have a way to scan incoming media before loading it on our systems.
I would like to see a way to be able to scan files/folders. We regularly receive data from opposing sides and it would be excellent to be able to scan all the files within production to check for anything before giving our users access to the data. Currently, we have to use another product for this use case. We like that we don't have to put a ton of time into the platform after deployment. We're able to set up policies to auto-update definitions and the client without us needing to touch it. We don't regularly get false positives that require us to take action to allow a user to keep working.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
I use the product on all of our servers and users' windows devices to protect them from being exploited. The huge problem that was solved was being monitored by CrowdStrike 24/7 365 days out of the year. You can't be looking for attackers and attack vectors 24/7 without a huge amount of increase to staff. The monitoring provides peace of mind that when you working on something else or are at home the infrastructure is safe from attacks.
  • Identify and remove 3rd party browsers like wave browser.
  • Gives a single pane of glass to access details about a particular machine.
  • Allows me to be able to stop a machine from accessing the internet once it is infected.
  • Actively blocks and takes actions without me intervening.
  • The dashboard can be overwhelming it could simplified more.
  • Making the installer package easier to remotely deploy it.
  • It is hard to come up with these. The product is amazing.
I think this product, in my honest opinion, works in any situation, no matter how small or large your company is. I think it is impossible to look at your environment 24/7 365, and attackers know this. You also can't possibly keep up with all of the newest exploits and security holes in the software and operating systems you use. This is why I would highly recommend CrowdStrike complete this gives you the best security and peace of mind when it comes to your computer systems.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Crowdstrike Falcon is used to provide a comprehensive suite of endpoint detection and response capabilities across the enterprise. It is the primary platform for detecting and preventing malicious content and actions on endpoints. Additionally, we leverage Crowdstrike Falcon Intelligence as a primary source of cyber threat intelligence to further enhance our cyber security program capabilities. The complementary set of modules and capabilities provides a robust set of functionality that allows us to better control and protect the enterprise.
  • Detecting malicious endpoint behaviors
  • Providing thorough, timely cyber threat intelligence
  • Integrate effectively between modules and with other security platforms
  • Event Search is built on Splunk which requires some SPL knowledge to be effective
  • Detections sometimes lack important information (e.g. hash of payload vs. hash of executing application)
  • Overlap between modules (e.g. Insight and Discover for login activity) aren't always presented in a unified/integrated way
There's a reason Falcon is the leader in this market space. Crowdstrike has built a very powerful combination of modules that cover a broad swath of the cyber security mission, especially as it relates to endpoint. While no security tool is a silver bullet, Falcon does a great job of tackling some of the most prevalent and impactful challenges in defending endpoints. Add in the best-in-class intelligence derived from their massive, global reach and you have a platform that pack a lot in. There will always be trade-off when it comes to UI/UX, and there is definitely a learning curve to mastering Falcon, but by no means worse than any major technology.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We had a need for a leading endpoint protection platform with EDR capabilities to protect against modern threats. Further, we had a need to have 24x7x365 coverage with subject matter experts working around the clock. Because we, as many security teams are, running very lean there was a requirement to have a fully managed solution to help ensure our alignment with best practices but to also have eyes on our environment at all times.
  • Protection against modern threats.
  • Elimination of false positives.
  • Very well-managed solution, the complete team is great to work with!
  • Device control capabilities (USB device control) are easy to implement.
  • The UI while very comprehensive is a bit cluttered.
  • Could be a little more intuitive to set up device groups.
  • A little clearer definition of what is available to admins in the complete offering would be nice.
Anyone who is looking for a leader in endpoint protection should consider CrowdStrike Falcon for sure, regardless of specific use cases. Anybody who is operating on a very lean security team that doesn't have the capability to provide 24x7x365 coverage should absolutely consider Falcon Complete. I've worked with various MSSP's in the past, but Falcon Complete is one I would definitely not lose any sleep at night knowing we're in good hands.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use this to monitor any issues that come regarding the execution of scripts or files that we would otherwise not be aware of. The detailed reports and alerts they send are perfect to ensure that none of our user's workstations get affected or attacked in ways we would not know about if we didn't have CS.
  • Reporting
  • Alerting
  • Monitoring
  • Some of the alerts could be a little more clear - layman's terms for some items would help
  • Some of the menu options are a bit confusing and clunky
  • Support is great but can be challenging to access
We've had users have some scripts execute at the iexplore.exe level that would have caused some issues but CS automatically blocked them and reported to us. Other times, it has inadvertently blocked items that didn't need to be blocked. Fortunately, we can work with their responsive support team to make exceptions.
Philip Chotipradit | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Crowdstrike Falcon was a top candidate for our organization to replace our anti-virus at the time. It beat out all the other options we were testing out. It addresses our need for an endpoint antivirus for our entire fleet of managed endpoints, which includes macOS, Windows, and Linux. This includes 10,000 endpoints and hundreds of servers.
  • Deployment.
  • Incident Reporting.
  • Machine Learning incident response.
  • GUI for the dashboard. It's a lot.
  • More mac and linux features that windows has.
  • Reinstallation double entries.
From proof of concept to total implementation, it was a smooth and pleasant experience. The Falcon team was a pleasure to work with. The testing, deployment, and everything in-between was done very well and hardly any problems came up. Nothing was really less appropriate as everything was needed for our situation. It was a very time-sensitive project and everyone involved was well aware and did not let the pressure get to them as it was made very easy for decommissioning the old solution and implementing Crowdstrike Falcon.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We have utilized Crowdstrike Falcon for just over a year enterprise-wide across our server and VDI infrastructure with great success. This replaced an older signature-based solution. In the 1st few weeks we have seen an approx. 17% increase in detections. Support has been great through the implementation and initial tightening of rules and removing false positives. Highly recommend CrowdStrike and their managed support.
  • Initial detection through their various proprietary methodologies.
  • The graphical display of the malware and the potential impact chain is fantastic.
  • We realize sensor updating is necessary, but they seem to be very frequent.
  • It is not a cheap solution.
CrowdStrike scales nicely for small to large organizations with ease. Its real-time detection works well and provides great insight into the particular threat triggered. Quick and easy sensor deployment via various methods makes installation relatively easy for most companies. It incorporates white/blacklisting features, exploits and malware detection, as well as IOA behavioral protection.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
It is a replacement for other endpoint solution. It solves the ransomware issue with a modern protection approach with integrated AI, also with it's cloud based agent the protection is always updated. It has been used by the whole organization. It addresses the endpoint protection ready to integrate with the most complete cybersecurity ecosystem.
  • Massive Deployment.
  • Online Endpoint Protection.
  • Zero Day Attacks Protection.
  • Less intrusive desktop notifications.
  • Agentless protection.
  • Less expensive protection bundles.
It's a great solution with a massive deployment scenario with a lot of endpoints, and where the time is an issue and you need to be protected ASAP - thanks to its cloud-based architecture you will be up and running in almost 10 minutes (literally). There are no signatures, further refinements, or additional hardware and servers required. An always or almost always offline [scenario] is not well-suited for Falcon Pro.
Bryan Bowie | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
CrowdStrike Falcon is used by the whole of the company. The goal was to centralize onto one platform that added more value, gave no performance degradation like traditional AV scanners, allowed true EDR data capturing capability, as well as allowing for adversarial behavior tracking. Over time CrowdStrike was able to provide host level insight that took multiple agents to perform. This gave us lighter pressure on the endpoint to capture all of the data that was needed as well as allowing cross team collaboration on business use cases and needs.
  • Endpoint Isolation - instead of hoping an adversary was blocked in time. CrowdStrike locks down the endpoint beyond using the Windows Firewall. Allowing a whitelist of IPs brings additional management of that endpoint to another level that most other tools don't have.
  • Rich Data Recording - CrowdStrike is best described as a giant tape recorder in the sky. When it lands on the box, it truly provides insight into the those that other tools could only dream of.
  • Extensive APIs - CrowdStrike understands that they are not your only security vendor, so they have API usage for everything in their platform to automate and integrate to your heart's desire.
  • Cloud Visibility - CrowdStrike's cloud monitoring capabilities are agnostic of cloud platform. No longer does one need to worry about putting all their eggs in one basket because the endpoint tool prefers one platform over another.
  • Vulnerability Management - CrowdStrike is trying really hard in this space but it is really falling short. Often times the data is off or incorrect. Reporting is lack luster, and it wasn't until recently that API usage to pull vulnerabilities was introduced.
  • The Little Things - CrowdStrike is plagued by a number of nice to haves that after a while is irritating at best. Items such as determining primary IP address for the device is selected at "random".
  • Nickel and Diming - It is one thing to have a product and sell that product and all the functions it does and providing a service for said product... its another when you nickel and dime every. new. feature. that. is. release.
CrowdStrike continues to be the leader of where it is today by extending the offerings that is has. While there are a number of downfalls of the product, no one other security vendor can rightfully do what CrowdStrike does. Smaller players in the game are able to "pull a feather" here and there but there is no stopping the behemoth that is CrowdStrike. So long as CrowdStrike continues to deliver on its endpoint protection capabilities and levels up their behavioral detections, they are the best buy all day long. For those looking for a company that is clear about what they are monitoring for and how, rule logic, etc.... CrowdStrike is the exact opposite. They are a complete black box that thinks detect logic is magic and protects it all as if it was intellectual property. For some organizations they will likely not care; however, for others with established security teams, this can prove to be an irritant.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use CrowdStrike Falcon Endpoint Protection across our whole organization as our primary endpoint AV product. It gives us the unprecedented ability to see all actions taken by a user or malicious actor in order to determine the root cause of an incident. With the ability to quickly isolate a machine from the network we can keep minor issues from becoming larger ones.
  • Phenomenal EDR capability
  • Lightweight and easy to deploy sensor
  • Impressive machine learning and IOA based detections
  • Lots of add-on features add up the cost
  • Requires some training to fully utilize
  • Requires some false positive tuning initially
Early on in our deployment, we had a ransomware outbreak introduced by a third-party vendor. Even with the CrowdStrike Falcon Endpoint Protection sensor not deployed to old ICS machines and running (in a technically unsupported configuration) alongside another product, it was able to provide a herd immunity of sorts and drastically limit the ransomware's movement. The EDR capabilities of the sensor were an enormous help in tracking down the source of the infection while we were able to use the network containment feature to isolate infected machines as soon as they were seen. It was very impressive and helped us get back to normal in a week with minimal loss of productivity.
Return to navigation