We performed a comparison between CrowdStrike Falcon Complete and Fidelis Elevate based on real PeerSpot user reviews.
Find out in this report how the two Managed Detection and Response (MDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The customization has been the most valuable aspect and was really the reason we ended up selecting Binary Defense. They worked with us to provide exactly the level of support, features, response, and collaboration we needed."
"Binary Defense has a human service department that provides live monitoring for our systems."
"The biggest aspect for us is that they are able to conform to our environment and utilize our tools. That way, we still maintain ownership of all the data and access to the applications, and we never lose control of the ability to run the solution ourselves if we need to."
"With Binary Defense, we don't just get an alert, but also a detailed rundown of why they're alerting us on it. They tell us what was executed, or the username, script, or IP. That way, we're not wasting time investigating."
"Binary Defense's most valuable feature is the 24/7 monitoring and threat hunting. Their team checks the latest breaches and how they're done."
"The case interface is Binary Defense MDR's most valuable feature."
"The speed at which their services are reactive is valuable. Nowadays, when a threat hits an endpoint, you've got minutes, not hours or days. Their average response time is about four minutes on an alert. For anything that needs to be sent to us, it's about fourteen minutes, which is pretty good. They're the third SOC that I've used in fifteen years. By far, they are the quickest ones to act. When you're looking at prevention, that's a key factor."
"One of the main benefits of Binary Defense MDR is the ability to easily meet with their support team to discuss any issues we encounter."
"The most valuable feature is that it has a zero-day approach. It does not work with the signature itself. It looks into what is happening on an endpoint and protects you better against threats that are not yet known but are captured in a signature. It provides far better detection than when it is only signature-based. You get much quicker protection against any new threat. This is the most important feature of the CrowdStrike solution."
"It is a very good solution. It can provide detection and response in an extensive way, and for an endpoint, it can integrate the information that comes from the servers."
"Crowdstrike has better support than Carbon Black."
"If someone is using the old Microsoft Office and the system is not updated, then CrowdStrike takes action on behalf of the operating system."
"CrowdStrike Falcon Complete provides complete details of any malicious activity, including the impact date and file source."
"It is working well. I tried a ransomware attack myself, and they were very fast in mitigating. I am very convinced of this product, and I am very satisfied with how it is working. The team behind the program itself is very valuable. If you don't have your own security team, they can do a great job for you. If your IT team isn't in the company, this can be of great value to you. Its documentation is very good. They have many different dashboards, and they do have a lot of information. Sometimes, it can be a bit overwhelming how much information is there, but once you find your way through with them, everything is very logical."
"We have experienced ROI using this solution. The value is clear when you are able to stop a ransomware attack or other threats."
"It is very easy to manage the licenses centrally because these are cloud licenses. There is no need for manual data reports."
"After rack and stack, devices were up and running base configurations within two hours. As with any IPS, tuning is required to stop false positives. This is no different, but the ease of use of the interface allowed my team to start making adjustments within a few hours."
"The initial setup is very straightforward. The deployment of the server doesn't take so long; about a day or two max."
"It has also improved our hunt ability with quick search tools, to zone in on malware or other anomalies. It is able to link items to incidents from other consoles, and works natively with the SIEM."
"It has a rating system now so you can rate things up or down, depending on your environment. This means alerting can be customized, yet still pick up anomalies."
"There are many valuable features. The NDR gives very good network visibility, and the endpoint module has a great feature called "Live Connect" for remote connections. They also have "Tasks" that can be run on endpoints to gather specific information or retrieve logs."
"Compared to similar solutions, it's quite scalable. You just need to add more storage to scale-up."
"It ensures the stability of network behavior across various aspects of our network and offers responsive capabilities to address incidents promptly"
"Reporting is great, it is easy to do a quick search through 45 days of data for something of interest."
"I would like to see more frequent check-ins with our security status."
"We should be able to isolate devices faster. They should shorten the time between clicking on a device to contain it and carrying out the action. That would be a welcome improvement."
"I would like to get more reports from Binary Defense about what they're blocking."
"Binary Defense MDR could be even better with additional features, like automatic scans and file quarantine."
"The only area I see for improvement with Binary Defense is their service portal. It could benefit from some enhancements."
"The current reporting system could benefit from improvement."
"It's hard to think of anything that they need to improve on, but just to point out something, I would like to see them provide advanced XDR."
"We found that an earlier version of the agent had high memory usage and that was a bit concerning, but we raised the concern with their support team and they immediately replied that they had noticed the same thing and had a candidate fix already available... it totally fixed the issue."
"CrowdStrike Falcon Complete is not providing application control. This is a very useful feature in any endpoint security because if you want to block any malicious activity of any particular application, you can not block it in this solution. However, you are able to block hashes, but not executable files or processes. Additionally, this solution does not provide a user risk score. These are two areas that CrowdStrike Falcon Complete can improve on in the future."
"Its support should be improved. The product is amazing, but the problem is that their support team is overconfident about the product. If something happens, they don't listen. They keep arguing with the customer. It should have more reporting. Reports are not that customizable. We need customizable reports for our customers, but they not there in CrowdStrike as well as SentinelOne."
"Its reporting feature could be user-friendly."
"There can be an application for the mobile device for the administrator of the platform to have an overview. In less than two minutes, they should be able to see what is going on and take action."
"CrowdStrike Falcon Complete could improve by having advanced features, such as SOC, and HDR. There would have been a lot of processes involved."
"I would like to see CrowdStrike Falcon Complete XDR integrate more effectively with other technologies."
"In a future release, it would be ideal if they could add reporting and action histories to their suite of features."
"The reporting could be better. It's not as good as it could be."
"The interface bug needs to be squashed once and for all. This has been the predominant issue with an otherwise stellar product. It reboots itself unscheduled, about once a month, due to a memory buffer flaw in the interface."
"Fidelis Endpoint is an expensive product making it one of its shortcomings that needs improvement."
"Configuration, in terms of building the collector and communicating with endpoints, is complex."
"There is room for improvement in email security. It's a security issue. If you're aiming for XDR, covering the entire threat landscape is crucial."
"I encounter difficulty removing certain entries in behavior or alerts; likewise, I am unable to add specific calls."
"We position the solution as an antivirus, but this part of the solution needs improvement. They need to generally enhance the features that they have, rather than adding anything new."
"The reports in the endpoint area of Elevate can be improved."
CrowdStrike Falcon Complete is ranked 1st in Managed Detection and Response (MDR) with 74 reviews while Fidelis Elevate is ranked 25th in Managed Detection and Response (MDR) with 7 reviews. CrowdStrike Falcon Complete is rated 8.6, while Fidelis Elevate is rated 8.4. The top reviewer of CrowdStrike Falcon Complete writes "Great next-generation antivirus with breach warranty and good intrusion protection". On the other hand, the top reviewer of Fidelis Elevate writes "Advanced threat detection capabilities with comprehensive incident response features providing robust cybersecurity for organizations". CrowdStrike Falcon Complete is most compared with Arctic Wolf Managed Detection and Response, Blackpoint Cyber MDR, Secureworks Taegis ManagedXDR, Sophos MDR and Red Canary MDR, whereas Fidelis Elevate is most compared with Microsoft Defender for Endpoint, Darktrace, CrowdStrike Falcon, VMware Carbon Black Cloud and Trellix Endpoint Security (ENS). See our CrowdStrike Falcon Complete vs. Fidelis Elevate report.
See our list of best Managed Detection and Response (MDR) vendors.
We monitor all Managed Detection and Response (MDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.