Find out in this report how the two Extended Detection and Response (XDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
CrowdStrike Falcon saves time and offers good value for money, especially for enterprise companies, because it can stop breaches.
It's very easy to deploy without many IT admins, saving time.
The solution is really time-saving since I don't need to create users in each server or system manually, and user access control is streamlined.
On a scale of one to ten, I would rate the technical support as a 10 because they resolve many issues for us.
The CrowdStrike team is very efficient; I would rate them ten out of ten.
They could improve by initiating calls for high-priority cases instead of just opening tickets.
Support documents are available on the internet in every language.
Sometimes support takes long to engage and resolve, extending over weeks or even months.
It has adequate coverage and is easy to deploy.
In terms of scalability, I find CrowdStrike to be stable, and I have not encountered any limitations with it.
There's no scalability limitation from CrowdStrike itself, as it just requires agent deployment.
Microsoft Active Directory scales effectively; I don't foresee any issues with that at all.
I have never seen instability in the CrowdStrike tool.
We are following N-1 versions across our environment, which is stable.
The biggest issue occurred when every computer worldwide experienced a blue screen.
With multiple domain controllers, stability is ensured.
I've been working with Microsoft Active Directory for over 3 years, and we've had no problems.
Simplifying the querying process, such as using double quote queries or directly obtaining logs based on IP addresses or usernames, would be beneficial.
Another concern is CrowdStrike's GUI. It changes annually, making it hard to work and find options.
Threat prevention should be their first priority.
Exporting and verifying group memberships require command line scripts, which isn't simple.
There are some features that need improvements in terms of ease of use and frequency of updates.
Sometimes, it can be overly complicated, and when you apply Group Policy in an Active Directory environment, sometimes those settings apply and sometimes they don't.
It is expensive compared to SentinelOne, but as the market leader, it is worth it.
The licensing cost and setup costs are affordable.
The solution is a bit expensive.
For the cloud solution in our region, the pricing of Microsoft Active Directory is very high.
I consider Microsoft Active Directory expensive because if you buy this thing bundled with the Windows Directory Server, you get five user licenses for about a thousand euros, or a little bit less than this.
The pricing, setup cost, and licensing with Microsoft Active Directory is straightforward; you just buy the server and then have to buy the user CALs.
I can investigate by accessing the customer's host based on the RTR environment and utilize host search to know details for the past seven days, including logins, processes, file installations, malicious processes, and network connections.
The real-time analytics aspect of CrowdStrike performs well because we get all logs in real-time, with no delay, allowing us to take action immediately.
Being an EDR solution, it helps us identify attacks in real-time.
One valuable feature is the centralized creation of IDs.
I can control all the devices in my domain by just changing the group policies in one place.
Having active deployment and well-configured systems helps me manage tasks and easily oversee thousands of users.
Product | Market Share (%) |
---|---|
CrowdStrike Falcon | 12.7% |
Wazuh | 10.7% |
Darktrace | 8.3% |
Other | 68.3% |
Product | Market Share (%) |
---|---|
Microsoft Active Directory | 3.2% |
Microsoft Entra ID | 19.9% |
Okta Workforce Identity | 8.2% |
Other | 68.7% |
Company Size | Count |
---|---|
Small Business | 46 |
Midsize Enterprise | 34 |
Large Enterprise | 61 |
Company Size | Count |
---|---|
Small Business | 19 |
Midsize Enterprise | 6 |
Large Enterprise | 20 |
CrowdStrike Falcon provides AI-powered endpoint detection and protection with minimal system impact. Its real-time monitoring and cloud-native design support efficient threat analysis and integration with other platforms, enhancing security management and workflow.
CrowdStrike Falcon is renowned for its comprehensive cybersecurity features, offering automatic threat analysis and AI-driven protection. Users appreciate its cloud-native flexibility and seamless integration capabilities. Its real-time monitoring, incident response, and vulnerability assessment deliver detailed insights and threat intelligence. Despite its robust features, improvements in integration with other technologies, dashboard functionalities, log management, and support for outdated systems are desired. Enhanced reporting, detailed malware analysis, and reduced false positives can improve user experiences. Organizations leverage Falcon for endpoint protection, threat detection, ransomware defense, and forensic investigations with its effective AI capabilities.
What are the key features of CrowdStrike Falcon?In finance and healthcare, CrowdStrike Falcon is implemented to protect against advanced threats and ensure compliance. Its AI-driven capabilities aid in real-time threat detection and vulnerability management, making it an essential tool for companies aiming to secure sensitive data and maintain operational continuity. Manufacturing sectors utilize it for securing production systems against potential cyber threats, ensuring uptime and safety. CrowdStrike Falcon's adaptable architecture benefits these industries by providing reliable protection across varied operating environments.
Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information.
This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts.
Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.