CrowdStrike Falcon Cloud Security vs Uptycs comparison

You must select at least 2 products to compare!
Wiz Logo
Read 11 Wiz reviews
13,896 views|10,261 comparisons
Uptycs Logo
342 views|251 comparisons
Comparison Buyer's Guide
Executive Summary

We performed a comparison between CrowdStrike Falcon Cloud Security and Uptycs based on real PeerSpot user reviews.

Find out what your peers are saying about Palo Alto Networks, Microsoft, Wiz and others in CWPP (Cloud Workload Protection Platforms).
To learn more, read our detailed CWPP (Cloud Workload Protection Platforms) Report (Updated: February 2024).
757,260 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
"The security baseline and vulnerability assessments is the valuable feature.""With Wiz, we get timely alerts for leaked data or any vulnerabilities already existing in our environment.""The solution is very user-friendly.""The vulnerability management modules and the discovery and inventory are the most valuable features. Before using Wiz, it was a very manual process for both. After implementing it, we're able to get all of the analytics into a single platform that gives us visibility across all the systems in our cloud. We're able to correspond and understand what the vulnerability landscape looks like a lot faster.""Out of all the features, the one item that has been most valuable is the fact that Wiz puts into context all the pieces that create an issue, and applies a particular risk evaluation that helps us prioritize when we need to address a misconfiguration, vulnerability, or any issue that would put our environment into risk.""The first thing that stood out was the ease of installation and the quick value we got out of the solution.""I like Wiz's reporting, and it's easy to do queries. For example, it's pretty simple to find out how many servers we have and the applications installed on each. I like Wiz's security graph because you can use it to see the whole organization even if you have multiple accounts.""Our most important features are those around entitlement, external exposure, vulnerabilities, and container security."

More Wiz Pros →

"The most valuable feature of CrowdStrike Falcon Cloud Security is its lightweight sensor, taking minimal space and not impacting server performance.""The immediate mitigation of potential threats and instant alerts are valuable.""It is fully cloud-based, so we don't need to invest in third-party agents repeatedly.""Technical support is helpful.""The most significant benefit is how quickly malware and other malicious attacks are detected.""There is a lot that it can do, but endpoint protection is the main thing about it. The fact that it uses machine learning and artificial intelligence to monitor and remediate the issues in real-time is probably the bread and butter of the product.""Cloud security is one valuable feature. Spotlight is the other one. There is also vulnerability management and a couple of more features.""The RTR feature stands out as particularly valuable to me due to its capability to log into machines."

More CrowdStrike Falcon Cloud Security Pros →

"They have multiple great features."

More Uptycs Pros →

"We would like to see improvements to executive-level reporting and data reporting in general, which we understand is being rolled out to the platform.""The only thing that needs to be improved is the number of scans per day.""The remediation workflow within the Wiz could be improved.""We're looking at some of the data compliance stuff that they've got Jon offer. I know they're looking at container security, which we gonna be looking at next.""The only small pain point has been around some of the logging integrations. Some of the complexities of the script integrations aren't supported with some of the more automated infrastructure components. So, it's not as universal. For example, they have great support for cloud formation and other services, but if you're using another type of management utility or governance language for your infrastructure-as-code automation components, it becomes a little bit trickier to navigate that.""The reporting isn't that great. They have executive summaries, but it's only a compliance report that maps all current issues to specific controls. Whether you look at one subscription or project, regardless of the size, you will get a multipage report on how the issues in that account map to that control. Our CSO isn't going to read through that. He won't filter that out or show that to his leadership and say, "Here's what we're doing." It isn't a helpful report. They're working on it, but it's a poor executive summary.""One significant issue is that the searches are case-sensitive, so finding a misconfigured resource can become very challenging.""Given the level of visibility into all the cloud environments Wiz provides, it would be nice if they could integrate some kind of mechanism to better manage tenants on multiple platforms. For example, let's say that some servers don't have an application they need, such as an antivirus. Wiz could include an API or something to push those applications out to the servers. It would be great if you could remedy these issues directly from the Wiz platform."

More Wiz Cons →

"The CrowdStrike dashboard currently lacks a username field.""Different file options should be available, and clients should be able to select from the options.""The only challenge lies in token verification.""One area for improvement in Falcon Cloud Security is the support portal.""CrowdStrike Falcon Cloud Security is expensive.""The log scale or Humio side of it where it collects the data and expands into the XDR world still needs time to develop in terms of the way it combines the data and metadata that flows into the platform. I know they're working on it.""Incorporating threat intelligence into the system would be a valuable addition.""The only suggestion for improvement would be the pricing."

More CrowdStrike Falcon Cloud Security Cons →

"We end up facing a lot of issues after upgrades."

More Uptycs Cons →

Pricing and Cost Advice
  • "The pricing seems pretty simple. We don't have to do a lot of calculations to figure out what the components are. They do it by enabling specific features, either basics or advanced, which makes it easy to select."
  • "The pricing is fair. Some of the more advanced features and functionalities and how the tiers are split can be somewhat confusing."
  • "The pricing is fair and comparable to their competitors. The cost seems to be going up, which is a concern. There are potential savings from consolidating tools, but we're uncertain how Wiz's pricing will change over time."
  • "I wish the pricing was more transparent."
  • "The cost of the other solutions is comparable to Wiz."
  • "Wiz is a moderately priced solution, where it is neither cheap nor costly."
  • More Wiz Pricing and Cost Advice →

  • "The pricing is fair for what you get. I'd rate them a solid nine out of ten in terms of pricing."
  • "I am not the one who handled the pricing. A different team worked on it, but it is pretty expensive."
  • "CrowdStrike Falcon Cloud Security is pricy."
  • "The pricing is reasonable, neither overly expensive nor excessively cheap, making it competitive compared to other market options."
  • "Its price is moderate."
  • More CrowdStrike Falcon Cloud Security Pricing and Cost Advice →

    Information Not Available
    Use our free recommendation engine to learn which CWPP (Cloud Workload Protection Platforms) solutions are best for your needs.
    757,260 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Wiz and Lacework sucks... Buy Orca. 
    Top Answer:Whether or not the cost of third-party Cloud Security tools is justified would depend on your specific needs and budget… more »
    Top Answer:I like Wiz's reporting, and it's easy to do queries. For example, it's pretty simple to find out how many servers we… more »
    Top Answer:CrowdStrike utilizes signatureless technology, eliminating the need for regular signature updates on endpoint systems.
    Top Answer:The pricing is reasonable, neither overly expensive nor excessively cheap, making it competitive compared to other… more »
    Top Answer:Due to the time zone difference, we in India experience delays in accessing immediate support for L2 and… more »
    Top Answer:They have multiple great features.
    Top Answer:The pricing is moderate compared to other products in the market. However, it is not the cheapest option. Depending on… more »
    Top Answer:The one thing missing is the IPS part, the blocking part. We end up facing a lot of issues after upgrades.
    Learn More
    Video Not Available

    Wiz is a highly efficient solution for data security posture management (DSPM), with a 100% API-based approach that provides quick connectivity and comprehensive scans of platform configurations and workloads. The solution allows companies to automatically correlate sensitive data with relevant cloud context, such as public exposure, user identities, entitlements, and vulnerabilities.This integration enables them to understand data accessibility, configuration, usage, and movement within their internal environments.

    Wiz's Security Graph delivers automated alerts whenever risks emerge, allowing teams to prioritize and address the most critical issues before they escalate into breaches. Furthermore, Wiz ensures rapid and agentless visibility into critical data across various repositories, enabling organizations to easily determine the location of their data assets.

    Wiz Features

    Wiz provides various features in the following categories:

    • Agentless Scanning: The solution can scan every layer of a cloud environment without requiring agents, managing the entire process and providing comprehensive visibility.

    • Workflow Integration: Users can create customized workflows within Wiz to identify and assign actions based on urgency, integrating them with ticketing systems for quick and efficient remediation.

    • Vulnerability Management: Wiz's vulnerability management modules provide detailed analytics and visibility across cloud systems, streamlining the manual process of vulnerability discovery. The automated attack path analysis helps identify risks and trace potential points of exposure, allowing users to understand and mitigate them effectively and proactively.

    • CSPM (Cloud Security Posture Management): Wiz's CSPM module offers instant visibility into high-level risks to an enterprise’s cloud environment, covering all accounts without the need for agents.

    • Out-of-the-Box Reporting and Custom Queries: The service supports comprehensive reporting with asset context, allowing users to perform complex custom queries on the solution’s user-friendly interface.

    • Automation Roles and Dashboards: The solution facilitates automation by providing essential roles and dedicated dashboards that enable teams to understand security information quickly, even those with limited expertise.

    • Contextual Risk Evaluation: The service contextualizes the various components contributing to an issue, providing a risk evaluation framework that helps prioritize remediation efforts.

    • Security Graph and Visibility: Wiz's security graph offers visibility across the entire organization, even with multiple accounts, enabling users to understand their environment and assets effectively.

    The Benefits of Wiz

    Wiz offers the following benefits:

    • Comprehensive agentless scanning

    • Effective identification and mitigation of vulnerabilities

    • Streamlined vulnerability management

    • Robust reporting capabilities and customizable queries

    • Enhanced automation and role-based access control

    • Prioritized risk evaluation for efficient remediation

    • Security posture across multiple accounts

    Reviews from Real Users

    Kamran Siddique, VP Information Security at, remarks his company has seen a ROI while using Wiz, as it simplifies the process by integrating multiple useful tools into one solution.

    According to a Senior Security Architect at Deliveroo, Wiz has given their company a fresh approach to vulnerability management, as Wiz's native integrations are extremely useful and paramount to the operational success of their platform.

    Get a demo | Wiz

    CrowdStrike Falcon Cloud Security is a platform of cloud security solutions aimed at protecting organizations from breaches while simplifying cloud security management. The unified platform combines several cloud security functionalities for comprehensive protection. Built on the CrowdStrike Falcon Platform, it leverages the powerful agent and technology used in CrowdStrike's renowned endpoint protection solutions, extending its capabilities seamlessly to cloud environments.

    CrowdStrike Falcon Cloud Security is designed to be a shield for the cloud infrastructure. One of its key strengths is its ability to monitor cloud workloads for potential breaches and attacks. It doesn't matter if you're running virtual machines, containers, or a combination of both across different cloud providers – Falcon Cloud Security offers visibility and protection. Additionally, it works tirelessly to pinpoint misconfigurations or vulnerabilities in your cloud setup, proactively stopping issues before they become full-blown security incidents. Compliance becomes easier too, as it can check if your deployments meet the requirements of various industry standards and regulations.

    If you heavily utilize containers and Kubernetes, Falcon Cloud Security has you covered. It delves deep into container images and running containers to spot weaknesses and potential threats, helping you secure your containerized applications from the moment they're developed to when they're up and running. Finally, it tackles the often messy world of permissions in the cloud. Falcon Cloud Security analyzes identities and their attached permissions, ensuring that the principle of least privilege is followed and sensitive data isn't exposed due to overly broad access rights.

    In essence, CrowdStrike Falcon Cloud Security aims to simplify the complexities of cloud security by consolidating tools, providing a centralized view of your risks and threats, and delivering advanced protection that blends seamlessly with your development processes.

    Based on the interviews we conducted with CrowdStrike Falcon Cloud Security users, overall, the sentiment is positive. Users praise the solution's efficacy in detecting and preventing threats, its ease of use, scalability, stability, and integration with existing systems. There were also mentions of areas for improvement, such as the pricing, the user interface, and customer support.

    Uptycs is the first unified CNAPP and XDR platform.

    Your developer’s laptop is just a hop away from cloud infrastructure. Attackers don’t think in silos, so why would you have siloed solutions protecting public cloud, private cloud, containers, laptops, and servers?

    Uptycs combines multiple security measures into one easy-to-use system, eliminating the need for multiple tools and reducing the risk of cyber attacks. With Uptycs, you can automate security and connect insights across your enterprise. Uptycs ties together threat activity across on-prem and cloud boundaries, delivering a more cohesive enterprise-wide security posture. With Uptycs security teams can reduce operating costs, deployment times, and security failures.

    Shift up with Uptycs.

    Key benefits:

    • Unified platform: Uptycs provides a single platform to cover various security needs, from laptops to cloud environments, reducing complexity and the need for multiple tools.
    • Reduced risk: The platform helps prioritize responses to threats, vulnerabilities, misconfigurations, sensitive data exposure, and compliance mandates, leading to a more cohesive enterprise-wide security posture.
    • Improved decision-making: Uptycs helps users make better risk decisions by providing insights from a large volume and variety of security and IT data, without relying on black boxes.
    • Coverage of modern attack surfaces: The platform protects digital assets across heterogeneous infrastructure, including hybrid cloud, containers, laptops, and servers, using standardized telemetry and open standards.
    • Comprehensive security capabilities: Uptycs offers various security features, including CNAPP, XDR, CWPP, KSPM, CSPM, CIEM, CDR, threat detection, investigation and forensics, remediation and blocking, and additional security controls.
    • Enhanced Kubernetes and container security: Uptycs provides complete visibility and control over Kubernetes and container environments, including asset inventory, compliance, vulnerabilities, and threat detection.
    • Extended Detection and Response (XDR): The platform offers industry-leading XDR for endpoint protection, detection, and investigation, correlated with signals from other environments, for macOS, Windows, and Linux endpoints.
    • Threat Detection and Response: Uptycs analyzes system telemetry in real-time to detect threats and provides context to help analysts quickly triage and investigate detections.
    • Scalability: The platform is designed to accommodate growing security needs and adapt to future cybersecurity challenges.
    • Improved visibility and control: Uptycs offers comprehensive visibility and control across various cloud environments, workloads, and deployments, helping security teams identify and prioritize risks effectively.
    Sample Customers
    Wiz is the fastest growing software company ever - $100M ARR in 18 months: Wiz becomes the fastest-growing software company ever | Wiz Blog  Discover why companies, including Salesforce, Morgan Stanley, Fox, and Bridgewater choose Wiz as their cloud security partner. Read their success stories here: Customers | Wiz
    Information Not Available
    Comcast, Crossbeam, Flexport, Greenlight Financial, Lookout Security, PayNearMe
    Top Industries
    Computer Software Company29%
    Outsourcing Company14%
    Manufacturing Company14%
    Computer Software Company16%
    Financial Services Firm14%
    Manufacturing Company9%
    Computer Software Company14%
    Venture Capital & Private Equity Firm14%
    Security Firm14%
    Manufacturing Company14%
    Financial Services Firm16%
    Computer Software Company14%
    Manufacturing Company9%
    Computer Software Company38%
    Financial Services Firm10%
    Manufacturing Company7%
    Non Profit6%
    Company Size
    Small Business10%
    Midsize Enterprise30%
    Large Enterprise60%
    Small Business21%
    Midsize Enterprise15%
    Large Enterprise64%
    Small Business38%
    Midsize Enterprise15%
    Large Enterprise46%
    Small Business20%
    Midsize Enterprise14%
    Large Enterprise66%
    Small Business45%
    Midsize Enterprise10%
    Large Enterprise45%
    Buyer's Guide
    CWPP (Cloud Workload Protection Platforms)
    February 2024
    Find out what your peers are saying about Palo Alto Networks, Microsoft, Wiz and others in CWPP (Cloud Workload Protection Platforms). Updated: February 2024.
    757,260 professionals have used our research since 2012.

    CrowdStrike Falcon Cloud Security is ranked 7th in CWPP (Cloud Workload Protection Platforms) with 12 reviews while Uptycs is ranked 23rd in CWPP (Cloud Workload Protection Platforms) with 1 review. CrowdStrike Falcon Cloud Security is rated 8.8, while Uptycs is rated 8.0. The top reviewer of CrowdStrike Falcon Cloud Security writes "Automatic updates and user-friendly reporting features, ensuring robust protection against a wide range of cyber threats". On the other hand, the top reviewer of Uptycs writes "Great features, good support, and lots of functionality". CrowdStrike Falcon Cloud Security is most compared with Prisma Cloud by Palo Alto Networks, AWS GuardDuty, Qualys VMDR, Akamai Guardicore Segmentation and Orca Security, whereas Uptycs is most compared with CrowdStrike Falcon, Aqua Cloud Security Platform, Lacework, Orca Security and SentinelOne Singularity Complete.

    See our list of best CWPP (Cloud Workload Protection Platforms) vendors, best Container Security vendors, and best Cloud Security Posture Management (CSPM) vendors.

    We monitor all CWPP (Cloud Workload Protection Platforms) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.