Skip to main content
TrustRadius
CrowdStrike Falcon

CrowdStrike Falcon

Overview

What is CrowdStrike Falcon?

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no performance impact, no additional agents,…

Read more
Recent Reviews
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Popular Features

View all 7 features
  • Endpoint Detection and Response (EDR) (69)
    9.4
    94%
  • Malware Detection (69)
    9.3
    93%
  • Infection Remediation (67)
    8.9
    89%
  • Centralized Management (70)
    8.5
    85%

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing

Falcon Pro

$6.99

Cloud
per endpoint/month (for 5-250 endpoints, billed annually)

Falcon Enterprise

$14.99

Cloud
per endpoint/month (minimum number of endpoints applies)

Falcon Premium

$17.99

Cloud
per endpoint/month (minimum number of endpoints applies)

Entry-level set up fee?

  • No setup fee
For the latest information on pricing, visithttps://www.crowdstrike.com/endpoint…

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Features

Endpoint Security

Endpoint security software protects enterprise connected devices from malware and cyber attacks.

8.8
Avg 8.5
Return to navigation

Product Details

What is CrowdStrike Falcon?

CrowdStrike offers cloud-delivered endpoint protection. CrowdStrike aims to revolutionize endpoint protection by unifying next-generation antivirus (AV), endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent.

The vendor states many of the world’s largest organizations use CrowdStrike, including three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies.

CrowdStrike Falcon Features

Endpoint Security Features

  • Supported: Anti-Exploit Technology
  • Supported: Endpoint Detection and Response (EDR)
  • Supported: Centralized Management
  • Supported: Infection Remediation
  • Supported: Vulnerability Management
  • Supported: Malware Detection

CrowdStrike Falcon Video

CEO George Kurtz discusses challenges organizations face using legacy cybersecurity solutions & how easy, fast & effective the CrowdStrike Falcon platform is by comparison.

CrowdStrike Falcon Integrations

CrowdStrike Falcon Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationApple iOS, Android
Supported LanguagesEnglish, Japanese

Frequently Asked Questions

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no performance impact, no additional agents, hardware, scheduled scans, firewall exceptions or admin credentials.

Reviewers rate Endpoint Detection and Response (EDR) highest, with a score of 9.4.

The most common users of CrowdStrike Falcon are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(234)

Attribute Ratings

Reviews

(1-25 of 70)
Companies can't remove reviews or game the system. Here's why
Chris Stutzman | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
48.33333333333333%
4.8
Anti-Exploit Technology
100%
10.0
Endpoint Detection and Response (EDR)
100%
10.0
Centralized Management
90%
9.0
Infection Remediation
N/A
N/A
Vulnerability Management
N/A
N/A
Malware Detection
N/A
N/A
Humayoon Khan | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (5)
82%
8.2
Anti-Exploit Technology
60%
6.0
Endpoint Detection and Response (EDR)
100%
10.0
Centralized Management
100%
10.0
Infection Remediation
50%
5.0
Malware Detection
100%
10.0
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
90%
9.0
Anti-Exploit Technology
80%
8.0
Endpoint Detection and Response (EDR)
90%
9.0
Centralized Management
100%
10.0
Infection Remediation
90%
9.0
Vulnerability Management
90%
9.0
Malware Detection
90%
9.0
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
98.33333333333334%
9.8
Anti-Exploit Technology
100%
10.0
Endpoint Detection and Response (EDR)
100%
10.0
Centralized Management
100%
10.0
Infection Remediation
100%
10.0
Vulnerability Management
90%
9.0
Malware Detection
100%
10.0
James Dilley | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
91.66666666666666%
9.2
Anti-Exploit Technology
80%
8.0
Endpoint Detection and Response (EDR)
90%
9.0
Centralized Management
80%
8.0
Infection Remediation
100%
10.0
Vulnerability Management
100%
10.0
Malware Detection
100%
10.0
Score 8 out of 10
Vetted Review
ResellerIncentivized
Endpoint Security (6)
75%
7.5
Anti-Exploit Technology
70%
7.0
Endpoint Detection and Response (EDR)
80%
8.0
Centralized Management
40%
4.0
Infection Remediation
90%
9.0
Vulnerability Management
70%
7.0
Malware Detection
100%
10.0
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
91.66666666666666%
9.2
Anti-Exploit Technology
90%
9.0
Endpoint Detection and Response (EDR)
80%
8.0
Centralized Management
100%
10.0
Infection Remediation
90%
9.0
Vulnerability Management
100%
10.0
Malware Detection
90%
9.0
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
91.66666666666666%
9.2
Anti-Exploit Technology
90%
9.0
Endpoint Detection and Response (EDR)
100%
10.0
Centralized Management
100%
10.0
Infection Remediation
90%
9.0
Vulnerability Management
80%
8.0
Malware Detection
90%
9.0
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
96.66666666666666%
9.7
Anti-Exploit Technology
100%
10.0
Endpoint Detection and Response (EDR)
100%
10.0
Centralized Management
100%
10.0
Infection Remediation
90%
9.0
Vulnerability Management
90%
9.0
Malware Detection
100%
10.0
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
100%
10.0
Anti-Exploit Technology
100%
10.0
Endpoint Detection and Response (EDR)
100%
10.0
Centralized Management
100%
10.0
Infection Remediation
100%
10.0
Vulnerability Management
100%
10.0
Malware Detection
100%
10.0
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
95%
9.5
Anti-Exploit Technology
100%
10.0
Endpoint Detection and Response (EDR)
100%
10.0
Centralized Management
80%
8.0
Infection Remediation
100%
10.0
Vulnerability Management
90%
9.0
Malware Detection
100%
10.0
Score 9 out of 10
Vetted Review
ResellerIncentivized
Endpoint Security (6)
86.66666666666666%
8.7
Anti-Exploit Technology
90%
9.0
Endpoint Detection and Response (EDR)
90%
9.0
Centralized Management
80%
8.0
Infection Remediation
80%
8.0
Vulnerability Management
90%
9.0
Malware Detection
90%
9.0
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
86.66666666666666%
8.7
Anti-Exploit Technology
90%
9.0
Endpoint Detection and Response (EDR)
90%
9.0
Centralized Management
80%
8.0
Infection Remediation
80%
8.0
Vulnerability Management
90%
9.0
Malware Detection
90%
9.0
Score 9 out of 10
Vetted Review
Verified User
Endpoint Security (6)
88.33333333333334%
8.8
Anti-Exploit Technology
90%
9.0
Endpoint Detection and Response (EDR)
100%
10.0
Centralized Management
90%
9.0
Infection Remediation
90%
9.0
Vulnerability Management
70%
7.0
Malware Detection
90%
9.0
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
85%
8.5
Anti-Exploit Technology
100%
10.0
Endpoint Detection and Response (EDR)
90%
9.0
Centralized Management
70%
7.0
Infection Remediation
80%
8.0
Vulnerability Management
80%
8.0
Malware Detection
90%
9.0
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
93.33333333333334%
9.3
Anti-Exploit Technology
90%
9.0
Endpoint Detection and Response (EDR)
100%
10.0
Centralized Management
90%
9.0
Infection Remediation
100%
10.0
Vulnerability Management
80%
8.0
Malware Detection
100%
10.0
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
86.66666666666666%
8.7
Anti-Exploit Technology
90%
9.0
Endpoint Detection and Response (EDR)
90%
9.0
Centralized Management
90%
9.0
Infection Remediation
90%
9.0
Vulnerability Management
70%
7.0
Malware Detection
90%
9.0
Itumeleng Thekiso | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
86.66666666666666%
8.7
Anti-Exploit Technology
80%
8.0
Endpoint Detection and Response (EDR)
100%
10.0
Centralized Management
70%
7.0
Infection Remediation
100%
10.0
Vulnerability Management
100%
10.0
Malware Detection
70%
7.0
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
71.66666666666667%
7.2
Anti-Exploit Technology
90%
9.0
Endpoint Detection and Response (EDR)
100%
10.0
Centralized Management
80%
8.0
Infection Remediation
80%
8.0
Vulnerability Management
N/A
N/A
Malware Detection
80%
8.0
Return to navigation