Logo of Sophos Endpoint

Sophos Endpoint Alternatives

Considering alternatives to Sophos Endpoint? See what this market Sophos Endpoint users also considered in their purchasing decision. When evaluating different solutions, potential buyers compare competencies in categories such as evaluation and contracting, integration and deployment, service and support, and specific product capabilities.

Check out real reviews verified by Gartner to see how Sophos Endpoint compares to its competitors and find the best software or service for your organization.

Reviewed in Last 12 Months
How Alternatives Are Selected
My overall experience has been excellent. As a previous customer for several years, I have brought Crowdstrike into several organizations. The main need has been to detect novel malicious and anomalous endpoint behavior. After evaluating several vendors, Crowdstrike was the clear winner. Key factors included the administrator interface, which is clean and intuitive for investigating alerts. This made it easy to track event sequences and determine responses to anomalies. While price was important, we also considered market share, innovation, and integrations with tools like our ticketing system, SIEM, and SOC, maximizing our investment. Measuring ROI is difficult, but the product has delivered value. It effectively handles events, quarantines malicious files, and prevents incidents, thus avoiding significant costs from investigations and threat spread. As a CISO, I have peace of mind knowing I can verify its monitoring and blocking. For example, I tested detection by downloading Mimikatz on a test machine, confirming the agent’s effectiveness. Deployment and onboarding were seamless thanks to mobile device management, enabling zero-touch installation of Crowdstrike agents and removal of our previous solution, migrating all devices in two weeks. The agent worked well with our unattended installation method and caused no compatibility issues with legacy systems; only offline devices (due to user leave) were missed—a common issue for any software. Crowdstrike Falcon scales well; it can support thousands of endpoints, and at around 500 now, I foresee no scaling issues as we grow. Its ability to detect advanced threats and suspicious behavior is very high. I’ve used Red Team tools like Stratus Red Team to simulate complex attacks (e.g., creating backdoor users, deploying scenarios across servers, laptops, and cloud). These tests validate its detection and provide a full assessment of our monitoring, SIEM, SOC, log analysis, and escalation processes.Read all insights and reviews for CrowdStrike Falcon
...
Showing Result 1-8 of 74