IT Central Station is now PeerSpot: Here's why

CrowdStrike Falcon vs Microsoft Defender for Endpoint comparison

Cancel
You must select at least 2 products to compare!
Executive Summary
Updated on March 20, 2022

We performed a comparison between Crowdstrike Falcon and Microsoft Defender for Endpoint based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.

  • Ease of Deployment: Users of Microsoft Defender For Endpoint provided mixed reviews regarding the solution’s deployment. Some reviewers said that the setup was easy and straightforward, while other users felt that the initial setup could be complex (especially in regards to the configuration of extra parts), and the deployment can take up to a few months depending on the size of the organization.

    Most CrowdStrike Falcon reviewers agreed that its deployment is a simple and quick process. Only one user reported the manual sensor deployment to be time-consuming.

  • Features: Users of both products were happy with their stability and scalability. Valuable features of Microsoft Defender For Endpoint include holistic integration with all Defender products and MCAS, data leak prevention, high stability, attack surface reduction controls, exploit prevention control, application control, scalability, ransomware, and auto-remediation as well as manual-remediation. There are certain things that users found were lacking. Some users mentioned that other vendors provide a lot more customization when it comes to integration; Others said they encountered some misbehavior between Microsoft Office Suite and Defender; Still other users felt the GUI could be better optimized, the monitoring could be better, onboarding could be a little faster, log collection could be easier, and that the dashboard could be more streamlined.

    CrowdStrike Falcon users noted the high level of threat detection. A few reviewers had difficulties with integrations and felt that CrowdStrike Falcon’s user interface needed improvements.

  • Pricing: Reviewers of both products agreed that their pricing is reasonable.

  • Service and Support: Reviewers of Microsoft Defender For Endpoint felt that their service and support were just average, while Crowdstrike falcon users gave it very positive reviews for technical support.

Comparison Results: All other things being equal, Crowdstrike Falcon is the favorite when it comes to both ease of deployment and customer service and support.

To learn more, read our detailed CrowdStrike Falcon vs. Microsoft Defender for Endpoint report (Updated: May 2022).
Buyer's Guide
CrowdStrike Falcon vs. Microsoft Defender for Endpoint
May 2022
Find out what your peers are saying about CrowdStrike Falcon vs. Microsoft Defender for Endpoint and other solutions. Updated: May 2022.
609,272 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Among the most valuable features are the exclusions. And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source.""The visibility and insight this solution gives you into threats is pretty granular. It has constant monitoring. You can get onto the device trajectory to look at a threat, but you can also see what happened prior to the threat. You can see what happened after the threat. You can see what other applications were incorporated into the execution of the threat. For example, you have the event, but you see that the event was launched by Google Chrome, which was launched by something else. Then, after the event, something else was launched by whatever the threat was. Therefore, it gives you great detail, a timeline, and continuity of events leading up to whatever the incident is, and then, after. This helps you understand and nail down what the threat is and how to fix it.""Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us.""It doesn't impact the devices. It is an agent-based solution, and we see no performance knock on cell phones. That was a big thing for us, especially in the mobile world. We don't see battery degradation like you do with other solutions which really drain the battery, as they're constantly doing things. That can shorten the useful life of a device.""It is extensive in terms of providing visibility and insights into threats. It allows for research into a threat, and you can chart your progress on how you're resolving it.""Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP.""I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It should protect all kinds of things that might happen on the servers, things that I cannot see.""Integration is a key selling factor for Cisco security products. We have a Cisco Enterprise Agreement with access to Cisco Email Security, Cisco Firepower, Cisco Stealthwatch, Cisco Talos, Cisco Threat Grid, Cisco Umbrella, and also third-party solutions. This is key to our security and maximizing operations. Because we do have the Email Security appliance and it is integrated with Threat Response, we have everything tied together. Additionally, we are using the Cisco SecureX platform, as we were a beta test for that new solution. With SecureX, we are able to pull all those applications into one pane for visibility and maintenance. This greatly maximizes our security operations."

More Cisco Secure Endpoint Pros →

"I like the dashboard nature of it. Everything is clickable, linkable, and information is easy to obtain and find. How it presents that information is probably the biggest win as far as the information correlation aspect. The presentation of it is very good.""The feature that I find to be the most valuable, is being able to look at the system analysis and being able to baseline what is installed on the system.""The OverWatch is the most valuable feature to me. It's a 24x7 monitoring service, and when they see anything suspicious in my environment, they will investigate.""CrowdStrike Falcon is a very light solution. It does not use too much processor or RAM.""The most valuable feature is that we don't need to re-image machines as much as we had to.""The 10 hours a week that we are freeing up from having to manage and monitor our AV solution has really allowed us to focus on other areas of the business. This has been a huge return on investment.""It has definitely minimized resources. When everything was on-prem, there was a lot more work maintaining it. One of the big value tickets: I don't have lists of hundreds of exceptions for certain applications that I have to maintain, add, delete, and move. The very nature of the product has lessened my workload considerably.""Cyberattack detection is very good. We use it for detecting different vulnerabilities, such as ransomware, virus, and malware. It is a good product today when compared to Symantec that we used previously."

More CrowdStrike Falcon Pros →

"Auto-remediation: When the product sees malware, it resolves the issue immediately. This protects the machine.""It's a Microsoft product; it's easier to deploy this product than other options.""A few years ago, when I was using a different product, I was affected by a virus that destroyed everything. Since using Microsoft Defender, I have not had this kind of problem.""Microsoft Defender for Endpoint has been secure and there is zero maintenance required because it updates with Microsoft Windows.""The solution is highly scalable.""It captures data through machine learning, which is built-in on the back-end. It also provides built-in analytics and a threat intelligence feature. It is a one-stop solution that doesn't require an antivirus because it comes prebuilt into Windows 10.""It shows us the risky sign-ins, and if a user's password has been compromised.""It is already integrated with Windows 10, so you don't need to worry about that."

More Microsoft Defender for Endpoint Pros →

Cons
"The connector updates are very easily done now, and that's improving. Previously, the connector had an issue, where almost every time it needed to be updated, it required a machine reboot. This was always a bit of an inconvenience and a bug. Because with a lot of software now, you don't need to do that and shouldn't need to be rebooting all the time.""The room for improvement would be on event notifications. I have mine tuned fairly well. I do feel that if you subscribe to all the event notification types out-of-the-box, or don't really go through and take the time to filter out events, the notifications can become overwhelming with information. Sometimes, when you're overwhelmed with information, you just say, "I'm not going to look at anything because I'm receiving so much." I recommend the vendor come up with a white paper on the best practices for event notifications.""The thing I hate the most, which they have not fixed, is when it creates duplicate entries within a console. If you have a computer and you upgrade from Windows 7 to Windows 10, or you upgrade your agent from version 6 to 7, it creates a new instance in there instead of updating the information. Instead of paying a license for one computer, I have to license two computers until I manually go in, search for all the duplicate entries, and clean them out myself.""We had a lot of noise at the beginning, and we had to turn it down based on exclusions, application whitelisting, and excluding unknown benign applications. Cisco should understand the need for continuous updates on the custom Cisco exclusions and the custom applications that come out-of-the-box with the AMP for Endpoints.""We have had some problems with updates not playing nice with our environment. This is important, because if there is a new version, we need to test it thoroughly before it goes into production. We cannot just say, "There's a new version. It's not going to give us any problems." With the complexity of the solution using multiple engines for multiple tasks, it can sometimes cause performance issues on our endpoints. Therefore, we need to test it before we deploy. That takes one to three days before we can be certain that the new version plays nice with our environment.""...the greatest value of all, would be to make the security into a single pane of glass. Whilst these products are largely integrated from a Talos perspective, they're not integrated from a portal perspective. For example, we have to look at an Umbrella portal and a separate AMP portal. We also have to look at a separate portal for the firewalls. If I could wave a magic wand and have one thing, I would put all the Cisco products into one, simple management portal.""The GUI needs improvement, it's not good.""I would like to see integration with Cisco Analytics."

More Cisco Secure Endpoint Cons →

"The price is too high.""CrowdStrike Suites and the way that it bundles things can be a bit challenging. It should be easier to integrate with the other stuff that they sell or be included with what they sell. We have one piece, then they are talking about another piece on vulnerability management all of the sudden, and we don't own that piece. We can see it in the console, but nothing shows up. It simply appears within the tool as an option, but we can't use it without purchasing it.""We can do a threat analysis of any machine at any time, but that threat analysis is very limited.""A year and a half ago or more, if you put in a support request by email, then it wasn't timely addressed. It could be a day to three days before you received a response, which was a bit frustrating. There was a lot of customer feedback around this issue, which has been greatly refined.""If we have a dashboard capability to uninstall agents, I think that would be great.""It would be nice if the dashboard had some more information upfront, and looked a little better.""Any kind of integration that you want to do, such as using the API to connect to a SIEM, is complex and it will be expensive to do.""This solution could be improved with greater scope for admins to make changes to the solution."

More CrowdStrike Falcon Cons →

"We encountered some issues when we were trying to enable automatic updates from our group policy.""With regards to the interface, a challenge I found was that there was not enough documentation on how to tune it. I had to read multiple sources on the internet to learn how to configure the tool appropriately.""It would be helpful if they included XDR features, on top of the EDR functionality.""The anti-ransomware features need to be improved upon.""I want Microsoft Defender to have the ability to deal with some issues automatically, so I don't need to address that issue manually.""It can be more secure.""The detection of viruses could be a little bit better.""The solution could be more friendly for end-users, with different type of scans or scheduled scans for it."

More Microsoft Defender for Endpoint Cons →

Pricing and Cost Advice
  • "The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost."
  • "Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc."
  • "In our case, it is a straightforward annual payment through our Enterprise Agreement."
  • "Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection."
  • "There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization."
  • "The Enterprise Agreement is like an all-you-can-eat buffet of Cisco products. In that vein, it was very affordable."
  • "We can know if something bad is potentially happening instantaneously and prevent it from happening. We can go to a device and isolate it before it infects other devices. In our environment, that's millions of dollars saved in a matter of seconds."
  • "The pricing and licensing are reasonable. The cost of AMP for Endpoints is inline with all the other software that has a monthly endpoint cost. It might be a little bit higher than other antivirus type products, but we're only talking about a dollar a month per user. I don't see that cost as being an issue if it's going to give us the confidence and security that we're looking for. We have had a lot of success and happiness with what we're using, so there's no point in changing."
  • More Cisco Secure Endpoint Pricing and Cost Advice →

  • "The pricing on CrowdStrike is per license. It was about $42 per seat yearly."
  • "The pricing could be reduced. If it was more reasonable that would be great."
  • "Our licensing fees were between $50,000 and $60,000 per year, which was pretty expensive for a small business."
  • "When comparing to Microsoft, CrowdStrike Falcon is more expensive."
  • "All I can say about the licensing cost is that it's negotiable."
  • "The price is too high."
  • "The pricing is good and there are no costs in addition to the standard licensing fees."
  • "We bought a very small number of licenses, then ran it for a year. We bought a 100 licenses for a year, so we didn't actually do a proof of concept. We just bought them. Then, the next year, we bought 10,000 licenses."
  • More CrowdStrike Falcon Pricing and Cost Advice →

  • "The solution is free."
  • "This product is included in the pricing for Windows."
  • "If you don't purchase the advanced threat protection then there is no additional charge."
  • "It is affordable and comes in the Office 365 bundle."
  • "Microsoft Defender ATP is expensive."
  • "I pay for it through the Windows Professional or Standard license. It is a one-time cost for me, and I use the same license."
  • "When compared with other vendors, the pricing is very high."
  • "This solution is part of Windows and comes included with it."
  • More Microsoft Defender for Endpoint Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Endpoint Protection for Business (EPP) solutions are best for your needs.
    609,272 professionals have used our research since 2012.
    Answers from the Community
    Netanya Carmi
    Koji Miura - PeerSpot reviewerKoji Miura
    User

    Depends on your budget and on the conditions of a Microsoft license. If you have an M365 license (like E3 or E5), Microsoft is cheaper.


    In terms of functionality, CrowdStrike is better.

    Questions from the Community
    Top Answer:I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things… more »
    Top Answer:Cisco Secure Endpoint is not too expensive and it's not cheap. It's quite fair.
    Top Answer:They could simplify the solution and make it a little bit easier to understand how things are happening or if something… more »
    Top Answer:Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions… more »
    Top Answer:Both of these products perform similarly and have many outstanding attributes. CrowdStrike Falcon offers an amazing… more »
    Top Answer:The CrowdStrike solution delivers a lot of information about incidents. It has a very light sensor that will never push… more »
    Top Answer:Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface… more »
    Top Answer:We use Symantec because we do not use MS Enterprise products, but in my opinion, Microsoft Defender is a superior… more »
    Top Answer:What I found most valuable in Microsoft Defender for Endpoint is that it's out-of-the-box, which brings more value to… more »
    Comparisons
    Also Known As
    Cisco AMP for Endpoints
    CrowdStrike
    Microsoft Defender ATP, Microsoft Defender Advanced Threat Protection, MS Defender for Endpoint, Microsoft Defender Antivirus
    Learn More
    Overview

    Cisco Secure Endpoint is a cloud-managed endpoint security solution that provides advanced protection against viruses, malware, and other cyber threats by detecting, preventing, and responding to threats. Cisco Secure Endpoint is managed online via a web-based management console and can be deployed on a variety of platforms. It protects endpoints, networks, emails, and web traffic.

    In a world of evolving threats, it’s necessary to put security above everything. Cisco Secure Endpoint provides you with the scope, scale, and capabilities to attain effective security with its integrated portfolio and industry-leading threat intelligence. Cisco Secure Endpoint continuously tracks and analyzes files and file activities across your systems - both remote and on premises - and compares these events to other events that occurred before or during past attacks. If a file exhibits malicious behavior, the tool sends an alert which enables you to stop a potential threat from succeeding.

    Key Capabilities of Cisco Secure Endpoint

    • Multi-layered protection: Cisco Secure Endpoint combines behavioral analytics, machine learning, and signature-based techniques to prevent threats from compromising your endpoints.

    • Powerful EDR capabilities: Reduce attack surface using advanced endpoint and extended detection and response, threat hunting, and endpoint isolation.

    • Dynamic malware analysis: Identify and block attacks in real time.

    • Simplified investigations: Advanced search capabilities help you get the information you need about your endpoints fast.

    Reviews from Real Users

    Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.

    Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."

    Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."

    CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus (AV), endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent. 

    Many of the world’s largest organizations already put their trust in CrowdStrike, including three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies.

    Request a free trial here: https://go.crowdstrike.com/try-falcon-prevent

    Microsoft Defender for Endpoint is a complete endpoint security solution that delivers preventative protection, post-breach detection, automated investigation, and response. With Defender for Endpoint, you have: 

    Agentless, cloud powered - No additional deployment or infrastructure. No delays or update compatibility issues. Always up to date. 

    Unparalleled optics - Built on the industry’s deepest insight into Windows threats and shared signals across devices, identities, and information. 

    Automated security - Take your security to a new level by going from alert to remediation in minutes—at scale. 

    To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.
    Offer
    Learn more about Cisco Secure Endpoint
    Get Fast and Easy Protection Against All Threats

    Protect your organization from all threats - not just malware - even when computers and servers aren’t connected to the internet. Start your free trial and deploy CrowdStrike Falcon within minutes to start receiving full threat protection.

    Learn more about Microsoft Defender for Endpoint
    Sample Customers
    Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
    Information Not Available
    Petrofrac, Metro CSG, Christus Health
    Top Industries
    REVIEWERS
    Government13%
    Healthcare Company13%
    Manufacturing Company13%
    Security Firm6%
    VISITORS READING REVIEWS
    Computer Software Company23%
    Comms Service Provider20%
    Government7%
    Financial Services Firm5%
    REVIEWERS
    Financial Services Firm19%
    Computer Software Company17%
    Energy/Utilities Company8%
    Hospitality Company6%
    VISITORS READING REVIEWS
    Computer Software Company23%
    Comms Service Provider16%
    Government7%
    Financial Services Firm6%
    REVIEWERS
    Financial Services Firm22%
    Computer Software Company16%
    Manufacturing Company7%
    Comms Service Provider7%
    VISITORS READING REVIEWS
    Computer Software Company23%
    Comms Service Provider18%
    Government8%
    Financial Services Firm6%
    Company Size
    REVIEWERS
    Small Business35%
    Midsize Enterprise16%
    Large Enterprise48%
    VISITORS READING REVIEWS
    Small Business24%
    Midsize Enterprise20%
    Large Enterprise56%
    REVIEWERS
    Small Business32%
    Midsize Enterprise23%
    Large Enterprise45%
    VISITORS READING REVIEWS
    Small Business23%
    Midsize Enterprise20%
    Large Enterprise57%
    REVIEWERS
    Small Business42%
    Midsize Enterprise17%
    Large Enterprise42%
    VISITORS READING REVIEWS
    Small Business25%
    Midsize Enterprise19%
    Large Enterprise57%
    Buyer's Guide
    CrowdStrike Falcon vs. Microsoft Defender for Endpoint
    May 2022
    Find out what your peers are saying about CrowdStrike Falcon vs. Microsoft Defender for Endpoint and other solutions. Updated: May 2022.
    609,272 professionals have used our research since 2012.

    CrowdStrike Falcon is ranked 1st in Endpoint Protection for Business (EPP) with 51 reviews while Microsoft Defender for Endpoint is ranked 3rd in Endpoint Protection for Business (EPP) with 114 reviews. CrowdStrike Falcon is rated 8.8, while Microsoft Defender for Endpoint is rated 8.0. The top reviewer of CrowdStrike Falcon writes "Speeds up the data collection for our phishing playbooks dramatically". On the other hand, the top reviewer of Microsoft Defender for Endpoint writes "Enables ingestion of events directly into your SIEM/SOAR, but requires integration with all Defender products to work optimally". CrowdStrike Falcon is most compared with SentinelOne, Cortex XDR by Palo Alto Networks, Darktrace, Carbon Black CB Defense and Fortinet FortiEDR, whereas Microsoft Defender for Endpoint is most compared with Symantec Endpoint Security, Sophos Intercept X, Cortex XDR by Palo Alto Networks, SentinelOne and Kaspersky Endpoint Security for Business. See our CrowdStrike Falcon vs. Microsoft Defender for Endpoint report.

    See our list of best Endpoint Protection for Business (EPP) vendors, best Anti-Malware Tools vendors, and best Endpoint Detection and Response (EDR) vendors.

    We monitor all Endpoint Protection for Business (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.