Amazon EKS provides a managed Kubernetes service, and CrowdStrike Falcon Cloud Security offers cloud security solutions. CrowdStrike has the upper hand due to superior security features.
Features: Amazon EKS is valued for its scalability, seamless integration with AWS services, and ease of use. CrowdStrike Falcon Cloud Security stands out for its robust threat detection, real-time analytics, and comprehensive security measures.
Room for Improvement: Reviewers suggest that Amazon EKS could enhance monitoring and logging capabilities and simplify initial setup. CrowdStrike Falcon Cloud Security could benefit from better documentation and more straightforward integration with third-party tools.
Ease of Deployment and Customer Service: Users find Amazon EKS straightforward to deploy, benefiting from AWS’s support system. CrowdStrike Falcon Cloud Security has a steeper learning curve but is highly praised for its customer support once deployed.
Pricing and ROI: Amazon EKS is seen as cost-effective due to its pay-as-you-go pricing model. CrowdStrike Falcon Cloud Security, while more expensive, delivers high ROI through advanced security features.
Initially, not having them resulted in an unoptimized solution. However, with these tools in place, we witnessed a reduction of costs by approximately a third—if it was $100 beforehand, we brought costs down to $25.
We have cost explorer available, and a bill forecast based on usage allows us to determine whether resources are underutilized or overutilized.
It's a fast deployment, with very good documentation, and it's really helpful.
More than 12 million vulnerabilities have been identified and resolved while working with CrowdStrike Falcon Cloud Security over the past 10 years.
It is an expense we are willing to pay to conform to Cyber Essentials Plus and demonstrate responsibility in protecting our data and that of our partners.
We didn't need to manage etcd and those control management tools; it's totally handled from the AWS side, making it very beneficial.
I believe there should be a recovery solution available for at least a few hours so that we might bring it back.
They will set up a call, guide us, or provide solutions regarding integration with AWS or Amazon EKS.
Based on my experience with CrowdStrike Falcon Cloud Security's technical support, I would rate them a solid 10 out of 10.
Technical support is quite good.
I have contacted customer service, and they are fast.
The ability to scale based on requirements by deploying additional containers is a strong point for Kubernetes.
This allows us to scale our applications or APIs as needed, offering reliability through the automation of scaling processes.
If any node is not ready, the cluster autoscaler ensures that it is removed from the AWS auto-scaling group and replaces it with a new node in the cluster.
It is deployed across multiple departments and multiple locations.
CrowdStrike Falcon Cloud Security is indeed highly scalable, ideally for enterprises with a minimum of 2,000 servers to ensure cost efficiency and easier setup.
There are multiple availability zones in the regions, meaning no single point of failure.
The control plane is quite stable in Amazon EKS, and I find it to be 100% available.
We haven't faced any challenges, and it consistently delivers on its committed SLA.
Occasionally, when the workload increases, it slows down considerably and sometimes becomes unresponsive.
When evaluating the stability of CrowdStrike Falcon Cloud Security, their partnerships with all major cloud service providers ensure their servers are optimally positioned.
Simplifying these will enable more people, not just those with strong foundational knowledge, to work effectively with these services.
Amazon EKS can be improved by having the maintenance of Kubernetes versions managed better, as everything is handled by the Kubernetes team and possibly a separate team at AWS.
Adding logging would be a valuable improvement.
If CrowdStrike Falcon Cloud Security could implement pushing out remediation from the sensor installed on machines, that would be beneficial.
The user interface needs improvement as it's sometimes difficult to locate specific dashboards or reports.
Another issue is the lack of proper documentation.
The EKS service itself is free, but you will incur costs for the VMs used as nodes in that cluster.
If you want to monitor costs effectively, applying separate tools and acting accordingly in advance is essential.
The pricing structure is beneficial for large companies who pay for what they use, but it is not affordable for startups.
The pricing for CrowdStrike Falcon Cloud Security is reasonable, especially for small companies with limited budgets.
No additional cost for maintenance or support; it's all included in the quotation.
However, the main point is that even though it is expensive, it provides a huge capability to the organization.
The most beneficial aspect of Amazon EKS is that it helps manage the Kubernetes master node, so I don't need to maintain the master node, including tasks like upgrading.
The main benefits that I received from using Amazon EKS are that it is a managed cluster and offers simplicity.
By default, if you just install Amazon EKS, you can deploy your application, but to have it enterprise-ready, you have to configure a number of other things that will boost productivity.
It automatically blocks duplication and activities that could result in data loss, effectively preventing unintended copying of data to personal devices.
The threat detection capability of CrowdStrike Falcon Cloud Security has always been the major seller, and it works effectively.
The most effective feature is the machine learning aspect, which detects unauthorized scripts and potential data exfiltration.
Product | Market Share (%) |
---|---|
CrowdStrike Falcon Cloud Security | 5.0% |
Amazon EKS | 0.2% |
Other | 94.8% |
Company Size | Count |
---|---|
Small Business | 32 |
Midsize Enterprise | 18 |
Large Enterprise | 38 |
Company Size | Count |
---|---|
Small Business | 13 |
Midsize Enterprise | 6 |
Large Enterprise | 12 |
Amazon Elastic Kubernetes Service (Amazon EKS) is a fully managed Kubernetes service. Customers such as Intel, Snap, Intuit, GoDaddy, and Autodesk trust EKS to run their most sensitive and mission critical applications because of its security, reliability, and scalability.
EKS is the best place to run Kubernetes for several reasons. First, you can choose to run your EKS clusters using AWS Fargate, which is serverless compute for containers. Fargate removes the need to provision and manage servers, lets you specify and pay for resources per application, and improves security through application isolation by design. Second, EKS is deeply integrated with services such as Amazon CloudWatch, Auto Scaling Groups, AWS Identity and Access Management (IAM), and Amazon Virtual Private Cloud (VPC), providing you a seamless experience to monitor, scale, and load-balance your applications. Third, EKS integrates with AWS App Mesh and provides a Kubernetes native experience to consume service mesh features and bring rich observability, traffic controls and security features to applications. Additionally, EKS provides a scalable and highly-available control plane that runs across multiple availability zones to eliminate a single point of failure.
EKS runs upstream Kubernetes and is certified Kubernetes conformant so you can leverage all benefits of open source tooling from the community. You can also easily migrate any standard Kubernetes application to EKS without needing to refactor your code.
CrowdStrike Falcon Cloud Security is a platform of cloud security solutions aimed at protecting organizations from breaches while simplifying cloud security management. The unified platform combines several cloud security functionalities for comprehensive protection. Built on the CrowdStrike Falcon Platform, it leverages the powerful agent and technology used in CrowdStrike's renowned endpoint protection solutions, extending its capabilities seamlessly to cloud environments.
CrowdStrike Falcon Cloud Security is designed to be a shield for the cloud infrastructure. One of its key strengths is its ability to monitor cloud workloads for potential breaches and attacks. It doesn't matter if you're running virtual machines, containers, or a combination of both across different cloud providers – Falcon Cloud Security offers visibility and protection. Additionally, it works tirelessly to pinpoint misconfigurations or vulnerabilities in your cloud setup, proactively stopping issues before they become full-blown security incidents. Compliance becomes easier too, as it can check if your deployments meet the requirements of various industry standards and regulations.
If you heavily utilize containers and Kubernetes, Falcon Cloud Security has you covered. It delves deep into container images and running containers to spot weaknesses and potential threats, helping you secure your containerized applications from the moment they're developed to when they're up and running. Finally, it tackles the often messy world of permissions in the cloud. Falcon Cloud Security analyzes identities and their attached permissions, ensuring that the principle of least privilege is followed and sensitive data isn't exposed due to overly broad access rights.
In essence, CrowdStrike Falcon Cloud Security aims to simplify the complexities of cloud security by consolidating tools, providing a centralized view of your risks and threats, and delivering advanced protection that blends seamlessly with your development processes.
Based on the interviews we conducted with CrowdStrike Falcon Cloud Security users, overall, the sentiment is positive. Users praise the solution's efficacy in detecting and preventing threats, its ease of use, scalability, stability, and integration with existing systems. There were also mentions of areas for improvement, such as the pricing, the user interface, and customer support.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.