A forever product
October 07, 2021

A forever product

Tina Chisholm | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Software Version

Falcon Enterprise

Modules Used

  • Falcon Services (Incident Response & Proactive Services)

Overall Satisfaction with CrowdStrike Falcon Endpoint Protection

We use it to scan potentially bad web pages and files on our network and laptops. This has allowed us to avoid major outages. The continued business supports ourselves and our customers. This has allowed us to sign on more new customers as we have continued to have no major incidents bringing any of our systems down.
  • Business continuity
  • No lost files or systems
  • Confidence of not having any breaches or malware issues
  • Easier to manually scan files
  • Send a weekly report on any scans that find issues
  • It has kept our uptime at 100 percent.
  • We don't have to seek out better products.
  • Keeps our environment safe and secure.
There were no other products that worked as well as CrowdStrike [Falcon Endpoint Protection]. It was a must-have since it also kept web pages secure and allowed no viruses to enter into our network.
Yes - Trend Micro
We purchased [the] full version after a demostration.
Our CIO had used it at a previous company.

Do you think CrowdStrike Falcon delivers good value for the price?

Yes

Are you happy with CrowdStrike Falcon's feature set?

Yes

Did CrowdStrike Falcon live up to sales and marketing promises?

Yes

Did implementation of CrowdStrike Falcon go as expected?

Yes

Would you buy CrowdStrike Falcon again?

Yes

It [CrowdStrike Falcon Endpoint Protection] is well suited to scan files and especially websites that allow viruses and malware to get on laptops and into our network. I haven't found any areas it was not well suited in our environment. This product is by far the best on the market and we plan on keeping it.

CrowdStrike Falcon Feature Ratings

Anti-Exploit Technology
9
Endpoint Detection and Response (EDR)
10
Centralized Management
7
Infection Remediation
8
Vulnerability Management
9
Malware Detection
10