CrowdStrike Falcon

CrowdStrike Falcon

Customer Verified
Top Rated
About TrustRadius Scoring
Score 9.1 out of 100
Top Rated
CrowdStrike Falcon Endpoint Protection

Overview

Recent Reviews

Reviewer Sentiment

N/A
Positive ()
N/A
Negative ()
Learn how we calculate reviewer sentiment

Awards

TrustRadius Award Top Rated 2022
TrustRadius Award Top Rated 2021

Popular Features

View all 7 features

Endpoint Detection and Response (EDR) (32)

9.7
97%

Malware Detection (33)

9.5
95%

Centralized Management (33)

9.3
93%

Infection Remediation (33)

9.2
92%

Reviewer Pros & Cons

View all pros & cons

Video Reviews

Leaving a video review helps other professionals like you evaluate products. Be the first one in your network to record a review of CrowdStrike Falcon, and make your voice heard!

Pricing

View all pricing

Falcon Pro

$6.99

Cloud
per endpoint/month (for 5-250 endpoints, billed annually)

Falcon Enterprise

$14.99

Cloud
per endpoint/month (minimum number of endpoints applies)

Falcon Premium

$17.99

Cloud
per endpoint/month (minimum number of endpoints applies)

Entry-level set up fee?

  • No setup fee
For the latest information on pricing, visithttps://www.crowdstrike.com/endpoint…

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting / Integration Services

Features Scorecard

Endpoint Security

9.2
92%

Product Details

What is CrowdStrike Falcon?

CrowdStrike offers cloud-delivered endpoint protection. CrowdStrike aims to revolutionize endpoint protection by unifying next-generation antivirus (AV), endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent.

The vendor states many of the world’s largest organizations use CrowdStrike, including three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies.

CrowdStrike Falcon Features

Endpoint Security Features

  • Supported: Anti-Exploit Technology
  • Supported: Endpoint Detection and Response (EDR)
  • Supported: Centralized Management
  • Supported: Infection Remediation
  • Supported: Vulnerability Management
  • Supported: Malware Detection

CrowdStrike Falcon Video

CEO George Kurtz discusses challenges organizations face using legacy cybersecurity solutions & how easy, fast & effective the CrowdStrike Falcon platform is by comparison.

CrowdStrike Falcon Integrations

CrowdStrike Falcon Competitors

CrowdStrike Falcon Technical Details

Deployment TypesOn-premise, SaaS
Operating SystemsWindows, Linux, Mac
Mobile ApplicationApple iOS, Android
Supported LanguagesEnglish, Japanese

Comparisons

View all alternatives

Compare with

Frequently Asked Questions

What is CrowdStrike Falcon?

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no performance impact, no additional agents, hardware, scheduled scans, firewall exceptions or admin credentials.

What is CrowdStrike Falcon's best feature?

Reviewers rate Endpoint Detection and Response (EDR) highest, with a score of 9.7.

Who uses CrowdStrike Falcon?

The most common users of CrowdStrike Falcon are from Enterprises (1,001+ employees) and the Information Technology & Services industry.

Reviews and Ratings

 (97)

Ratings

Reviews

(1-25 of 36)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Review Source
  • Complete Cloud based Solution - A truly Next Gen AV
  • Less or Nil Compute Power Use
  • Integrated Threat Intelligence with Threat Severity Assessment
  • Complete visibility on USB Device Usage with Falcon Device Control
  • Device Control required more comprehensive
  • Prices needs to match with other peers
  • Migration Part needs more improvement
Score 10 out of 10
Vetted Review
Verified User
Review Source
  • Protection against modern threats.
  • Elimination of false positives.
  • Very well-managed solution, the complete team is great to work with!
  • Device control capabilities (USB device control) are easy to implement.
  • The UI while very comprehensive is a bit cluttered.
  • Could be a little more intuitive to set up device groups.
  • A little clearer definition of what is available to admins in the complete offering would be nice.
Score 9 out of 10
Vetted Review
Verified User
Review Source
  • Reporting
  • Alerting
  • Monitoring
  • Some of the alerts could be a little more clear - layman's terms for some items would help
  • Some of the menu options are a bit confusing and clunky
  • Support is great but can be challenging to access
Score 9 out of 10
Vetted Review
Verified User
Review Source
  • Initial detection through their various proprietary methodologies.
  • The graphical display of the malware and the potential impact chain is fantastic.
  • We realize sensor updating is necessary, but they seem to be very frequent.
  • It is not a cheap solution.
Score 9 out of 10
Vetted Review
Verified User
Review Source
  • Endpoint protection
  • Device monitoring
  • Alert notifications
  • Visibility into devices and threats
  • Some features are hard to locate in the system.
  • The ability to uninstall without restarting the device would be beneficial.
  • Quicker load times on some management screens
Doug Floyd | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source
  • Detects threats and gives in depth information regarding [the] threat.
  • Prevents malware in realtime
  • Configurable prevention policies
  • Dashboard reporting of detections and activity
  • Ability to contain and lock down a endpoint
  • More information provide[d] on emails sent regarding a detection.
  • Updated Activity Dashboard
  • Additional out of the box Prevention Policies
Score 9 out of 10
Vetted Review
Verified User
Review Source
  • Does not perform signature based scans that often cause resource issues
  • Allows for a number of incident response actions such as Real Time Response
  • User friendly interface which makes it easy to administer
  • SOAR capabilities such as immediate network containment
  • Price
  • Search for events not in the main console is difficult (based on Splunk)
Score 9 out of 10
Vetted Review
Verified User
Review Source
  • Provides actionable detection data.
  • Lightweight and forgiving agent. We've had zero failures when deploying the agent across our organization.
  • The searches in the Discovery module are extremely useful for reporting purposes. For us, it satisfies a lot of HiTrust requirements.
  • Some search speeds are pretty slow. Having to wait a long time for results.
  • Sometimes [ I feel] the data being presented in detection is not obvious as to why it is being considered malicious.
Bryan Bowie | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source
  • Endpoint Isolation - instead of hoping an adversary was blocked in time. CrowdStrike locks down the endpoint beyond using the Windows Firewall. Allowing a whitelist of IPs brings additional management of that endpoint to another level that most other tools don't have.
  • Rich Data Recording - CrowdStrike is best described as a giant tape recorder in the sky. When it lands on the box, it truly provides insight into the those that other tools could only dream of.
  • Extensive APIs - CrowdStrike understands that they are not your only security vendor, so they have API usage for everything in their platform to automate and integrate to your heart's desire.
  • Cloud Visibility - CrowdStrike's cloud monitoring capabilities are agnostic of cloud platform. No longer does one need to worry about putting all their eggs in one basket because the endpoint tool prefers one platform over another.
  • Vulnerability Management - CrowdStrike is trying really hard in this space but it is really falling short. Often times the data is off or incorrect. Reporting is lack luster, and it wasn't until recently that API usage to pull vulnerabilities was introduced.
  • The Little Things - CrowdStrike is plagued by a number of nice to haves that after a while is irritating at best. Items such as determining primary IP address for the device is selected at "random".
  • Nickel and Diming - It is one thing to have a product and sell that product and all the functions it does and providing a service for said product... its another when you nickel and dime every. new. feature. that. is. release.
Score 10 out of 10
Vetted Review
Verified User
Review Source
  • Phenomenal EDR capability
  • Lightweight and easy to deploy sensor
  • Impressive machine learning and IOA based detections
  • Lots of add-on features add up the cost
  • Requires some training to fully utilize
  • Requires some false positive tuning initially
Score 10 out of 10
Vetted Review
Verified User
Review Source
  • It's strong with its EDR capabilities. It's able to collect very useful information for an investigation.
  • Very lightweight agent doesn't interfere with user activities.
  • Customizable to get the amount of alerts that can be investigated without getting overwhelming.
  • CrowdStrike University doesn't have a lot of content, it can be completed in a few hours.
Score 9 out of 10
Vetted Review
Verified User
Review Source
  • Simple deployment process
  • Works on all platforms
  • Small footprint
  • Fast
  • Regularly updated
  • Great support
  • Lack of native M1 support on Mac (does work via Rosetta 2 but native would be a lot better).
  • Communication around changes to the system after Big Sur OS release could have been better.
  • Expensive additional modules.
Score 9 out of 10
Vetted Review
Verified User
Review Source
  • Automatically detect threats and issue alerts
  • Identifies types of attacks based on the integrated Threat Intelligence that is built-in
  • Superior threat response techniques that are fully customizable
  • Licensing could be simplified
  • Scanning time could be improved
  • Better documentation and training could be provided to its users