Overview
Product Information on CrowdStrike Falcon
What is CrowdStrike Falcon?
CrowdStrike Falcon Pricing
CrowdStrike Falcon Product Images


Overall experience with CrowdStrike Falcon
“Powerful, Lightweight with Proactive Threat Detection and Clear Endpount Visibiliy”
“Cloud-Based Threat Detection Offers Analytics But Causes Issues On Older Machines”
Badges
Endpoint Protection Platforms
About Company
Company Description
CrowdStrike is a recognized entity in the cybersecurity space, specializing in enterprise risk management through the innovative application of technology. The company focuses primarily on protecting essential business risk areas such as endpoints, cloud workloads, identity, and data. Employing the state-of-the-art CrowdStrike Security Cloud and advanced AI technology, the firm provides effective solutions. Its CrowdStrike Falcon platform uses real-time indications of attack, threat intelligence, telemetry enhanced from diverse enterprise sources, and evolving adversary knowhow for high-grade detection, automated protection and healing, advanced threat tracking, and efficient vulnerability visibility. The Falcon platform, designed in the cloud with a singular lightweight-agent architecture, offers swift deployment, unique protection and performance, and reduced complexity. Therefore, CrowdStrike delivers a significant value proposition right from the beginning.
Company Details
Do You Manage Peer Insights at CrowdStrike?
Access Vendor Portal to update and manage your profile.
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
User Sentiment About CrowdStrike Falcon
Reviewer Insights for: CrowdStrike Falcon
Deciding Factors: CrowdStrike Falcon Vs. Market Average
Performance of CrowdStrike Falcon Across Market Features
CrowdStrike Falcon Likes & Dislikes
What I like most about CrowdStrike Falcon is its proactive detection and rapid response to threats. The combination of real-time analysis, process behavior and cloud-based protection allows you to identify even unknown or fileless attacks that other traditional solutions could miss. For example, Falcon once detected suspicious activity on an endpoint that was running a legitimate script modified by an attacker. The platform automatically blocked the malicious execution and generated a detailed report with recommendations on how to enforce application policy, allowing the security team to remediate the situation without impacting operations. Additionally, the centralized interface and clear alerts make managing and monitoring all endpoints much simpler and more efficient. This gives me confidence that our devices are constantly protected without the need for constant manual intervention.
What I like most about CrowdStrike Falcon is its proactive detection and rapid response to threats. The combination of real-time analysis, process behavior and cloud-based protection allows you to identify even unknown or fileless attacks that other traditional solutions could miss. For example, Falcon once detected suspicious activity on an endpoint that was running a legitimate script modified by an attacker. The platform automatically blocked the malicious execution and generated a detailed report with recommendations on how to enforce application policy, allowing the security team to remediate the situation without impacting operations. Additionally, the centralized interface and clear alerts make managing and monitoring all endpoints much simpler and more efficient. This gives me confidence that our devices are constantly protected without the need for constant manual intervention.
What I like most about CrowdStrike Falcon is its proactive detection and rapid response to threats. The combination of real-time analysis, process behavior and cloud-based protection allows you to identify even unknown or fileless attacks that other traditional solutions could miss. For example, Falcon once detected suspicious activity on an endpoint that was running a legitimate script modified by an attacker. The platform automatically blocked the malicious execution and generated a detailed report with recommendations on how to enforce application policy, allowing the security team to remediate the situation without impacting operations. Additionally, the centralized interface and clear alerts make managing and monitoring all endpoints much simpler and more efficient. This gives me confidence that our devices are constantly protected without the need for constant manual intervention.
We notice first that sometimes legitimate files or process are flagged as threats, which can disrupt workflows and required manual review to whitelist safe items. We where hopping this would solve it for use so we spend less time. Secondly, the agent can consume significant CPU and memory on older machine leading to slower performance and impacting user productivity. The incident that happed few months ago world wide that create a blue screen, cost. Should not be happed that's why they need to check careful planning they update beter.
We notice first that sometimes legitimate files or process are flagged as threats, which can disrupt workflows and required manual review to whitelist safe items. We where hopping this would solve it for use so we spend less time. Secondly, the agent can consume significant CPU and memory on older machine leading to slower performance and impacting user productivity. The incident that happed few months ago world wide that create a blue screen, cost. Should not be happed that's why they need to check careful planning they update beter.
We notice first that sometimes legitimate files or process are flagged as threats, which can disrupt workflows and required manual review to whitelist safe items. We where hopping this would solve it for use so we spend less time. Secondly, the agent can consume significant CPU and memory on older machine leading to slower performance and impacting user productivity. The incident that happed few months ago world wide that create a blue screen, cost. Should not be happed that's why they need to check careful planning they update beter.
Top CrowdStrike Falcon Alternatives
Peer Discussions
What Your Peers Are Saying About CrowdStrike Falcon
CrowdStrike Falcon Reviews and Ratings
- IT ASSOCIATE<50M USDServices (non-Government)Review Source
Powerful, Lightweight with Proactive Threat Detection and Clear Endpount Visibiliy
My overall experience with CrowdStrike Falcon Endpoint Protection has been very positive. The platform is light on endpoints and does not affect device performance, which has facilitated its mass deployment without end users noticing interruptions. A concrete example: during a deployment to remote employee laptops, Falcon detected a script-based malware attempt that had not been identified by our previous solution. The alert quickly reached the central dashboard, and the security team was able to isolate the affected computer, analyze the behavior, and eliminate the threat in less than an hour. On a day-to-day basis, the Falcon console provides complete endpoint visibility and facilitates incident investigation, which has significantly reduced response time and manual workload for our security team. Overall, it has been a reliable and efficient tool to protect our endpoints and minimize



