Leader In Threat Pevention & Trusted Solution
March 03, 2023

Leader In Threat Pevention & Trusted Solution

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Software Version

Falcon Enterprise

Modules Used

  • Falcon Prevent
  • Falcon Device Control
  • Falcon Overwatch
  • Falcon Intelligence

Overall Satisfaction with CrowdStrike Falcon

One of the leaders in endpoint protection. Crowdstrike has helped detect several threat actors initial tactics which arrived via phishing campaigns. Having the solution enabled in the Prevention mode has blocked several active attempts. Mostly, Ransomware and Keyloggers.
  • Threat Intelligence
  • Prevention Controls
  • Ability To Search For Logs
  • With respect to API reporting capabilities
  • Device control
  • Reduce the infections and recovery costs
  • Could improve vulnerability reporting for macOS
Replace traditional Antivirus solutions with Crowdstrike EDR. Also, helped solve data loss problem through Crowdstrike's Device Control module. Partially eliminated vulnerability scanning tools by leveraging Crowdstrike's Spotlight.
Positive Impact. Good return on investment for the product. Assurance to the upper management for protection controls.
Endpoint protection, vulnerability management, and data loss prevention controls. Single solution and agent deployment reducing the administrative overhead of managing multiple security agents.
  • integrate with SOAR
  • BlackBerry Protect (CylancePROTECT)
Very flexible and more effective in detecting and blocking script based attacks.

Do you think CrowdStrike Falcon delivers good value for the price?

Yes

Are you happy with CrowdStrike Falcon's feature set?

Yes

Did CrowdStrike Falcon live up to sales and marketing promises?

Yes

Did implementation of CrowdStrike Falcon go as expected?

Yes

Would you buy CrowdStrike Falcon again?

Yes

It fits the budget of mid to large size companies. Easy to deploy and administer the solution.

CrowdStrike Falcon Feature Ratings

Anti-Exploit Technology
8
Endpoint Detection and Response (EDR)
9
Centralized Management
8
Infection Remediation
8
Vulnerability Management
6
Malware Detection
8