Try our new research platform with insights from 80,000+ expert users

CrowdStrike Falcon vs ThreatMon comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CrowdStrike Falcon
Ranking in Attack Surface Management (ASM)
1st
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
135
Ranking in other categories
Security Information and Event Management (SIEM) (6th), Endpoint Protection Platform (EPP) (2nd), Threat Intelligence Platforms (1st), Endpoint Detection and Response (EDR) (1st), Extended Detection and Response (XDR) (1st), Identity Threat Detection and Response (ITDR) (2nd), AI-Powered Cybersecurity Platforms (1st)
ThreatMon
Ranking in Attack Surface Management (ASM)
30th
Average Rating
0.0
Reviews Sentiment
5.3
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of September 2025, in the Attack Surface Management (ASM) category, the mindshare of CrowdStrike Falcon is 11.9%, down from 27.2% compared to the previous year. The mindshare of ThreatMon is 0.5%, up from 0.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Attack Surface Management (ASM) Market Share Distribution
ProductMarket Share (%)
CrowdStrike Falcon11.9%
ThreatMon0.5%
Other87.6%
Attack Surface Management (ASM)
 

Featured Reviews

Waleed Omar - PeerSpot reviewer
Provides effective real-time threat detection with potential for cost optimization
Some features such as device control, firewall management, and file analysis are standalone products that we need to purchase separately. If these features came out of the box within the product, it would be much more beneficial for us. Other providers such as SentinelOne include these features in their base product. We attended a CrowdStrike Falcon event where they discussed some shallow AI features, but we cannot see these in our panel yet. We work with different solutions such as Darktrace and SocRadar, where AI features are automatically displayed in our dashboards after release. However, for CrowdStrike Falcon, we cannot see these features.
reviewer2544048 - PeerSpot reviewer
AI-powered discovery enhances threat visibility while customer support excels
I am a reseller. One of our customers suffered an attack a few months ago, and they discovered that they have some data available on the deep and dark web. The biggest driver for using ThreatMon was takedown services. SIEM integration into their incident response was also essential. They wanted…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The detection is very reliable. Also, OverWatch is a great feature."
"Among CrowdStrike Falcon's most valuable capabilities are its UEBA and SOAR functionalities, along with its seamless integration with any other SIEM solution."
"The most valuable aspects of CrowdStrike Falcon for me are its device observability, identification, and software and OS recognition."
"I haven't had any issues with bugs or glitches. I haven't had a problem with stability so far."
"I like the detection rates of mobile threats."
"The most beneficial part is the active response capability of the product."
"Falcon has the capacity to identify potential problems quickly. The administrator can deploy the agent, and the users cannot change it. This assures you that the agent remains on this device. Also, the agent can act preemptively to provide alerts about potential problems."
"CrowdStrike Falcon has positively impacted my organization by providing good protection, logs, and reports, which I find very good."
"I would recommend ThreatMon."
"Machine learning or AI discovery, which discovers our resources on the deep and dark web, has been very useful."
 

Cons

"There is room for improvement in managing multiple customer IDs."
"There are some aspects of the UI that could use some improvement, e.g., working in groups. I build a group, then I have to manually assign prevention policies, update policies, etc., but there is no function to copy that group. So, if I wanted to make a subgroup for troubleshooting or divide workstations into groups of laptops and desktops, then I have to manually build a brand new group. I can't just copy a build from one to another. Additionally, in order to do any work within a group, I have to first do the work on the respective prevention policy page or individual policy page, then remove the group if the group is assigned to a different prevention policy, remove the prevention policy, and then add the new one in. So, it can get a little hectic. It would be easier if I could add and remove things from the group page rather than having to go into the policy pages to do it."
"The KDR solution is immature. They do not have much preemption in ITDR. Threat prevention should be their first priority, and false positive reductions are needed."
"I would like to see the machine learning feature enhanced."
"I would like them to improve the correlation of data in the search algorithms. When we run an investigation, malware, phishing, etc., I want to look at multiple endpoints at once to correlate that data to see the likenesses, e.g., how are they not alike or what systems and processes are running across those systems? I don't want to have to run the same search in their Spotlight module five, 10, 15, or 100 times to get 100 different results, copy that data out, and then correlate it on my own. In a very simple way, I want to be able to load up a comma-delimited list giving me the spotlight data on these X amount of hosts, letting me search for it quickly. We have had to go back to CrowdStrike, and say, "Our search are taking far too long for even one host." They did bump up the cores and that did improve performance, but it is still kind of slow to get that Spotlight data. That is probably our biggest pain point. I think that needs some help. I understand this kind of information access is probably not the easiest thing to do. It is probably a big ask depending on how their back-end is setup."
"Currently, I do not see any tangible benefits from CrowdStrike regarding incident improvement time, response time, or cost saving."
"During these two years with CrowdStrike Falcon, I certainly faced some problems, including the known CrowdStrike outage, which was quite pinching and brought many of the Windows-related services to a halt just because of one bad configuration push from CrowdStrike tracks."
"They respond quickly on the weekdays, but the weekend response times are slower."
"ThreatMon is very expensive."
"We are looking at a better pricing model to onboard as many customers as possible."
 

Pricing and Cost Advice

"It has an annual license, and it is not that expensive."
"We are on an annual subscription for the solution. There are not any additional costs."
"This solution has a very competitive price."
"Different components are additional price points. We got the components that were right for us, but other organizations may require more (or less) components to suit their needs."
"It is expensive compared to SentinelOne, but as the market leader, it is worth it."
"We pay between $30-50 per user for a yearly license, which is more expensive than SentinelOne or Bitdefender. However, CrowdStrike gives better value for money."
"There is no license required to use this solution."
"Crowdstrike Falcon is relatively cheap."
Information not available
report
Use our free recommendation engine to learn which Attack Surface Management (ASM) solutions are best for your needs.
868,029 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Financial Services Firm
10%
Manufacturing Company
9%
Government
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business46
Midsize Enterprise34
Large Enterprise61
No data available
 

Questions from the Community

Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions that are very scalable, secure, and user-friendly. Cortex XDR by Palo Alto offers ...
How does Crowdstrike Falcon compare with Darktrace?
Both of these products perform similarly and have many outstanding attributes. CrowdStrike Falcon offers an amazing user interface that makes setup easy and seamless. CrowdStrike Falcon offers a cl...
How does Microsoft Defender for Endpoint compare with Crowdstrike Falcon?
The CrowdStrike solution delivers a lot of information about incidents. It has a very light sensor that will never push your machine hardware to "test", you don't have the usual "scan now" feature ...
What is your experience regarding pricing and costs for ThreatMon?
ThreatMon is very expensive. We are looking at a better pricing model to onboard as many customers as possible.
What needs improvement with ThreatMon?
We are looking at a better pricing model to onboard as many customers as possible. Additionally, we are trying to figure out certification training. Training and pricing could be improved.
What is your primary use case for ThreatMon?
I am a reseller. One of our customers suffered an attack a few months ago, and they discovered that they have some data available on the deep and dark web. The biggest driver for using ThreatMon wa...
 

Also Known As

CrowdStrike Falcon, CrowdStrike Falcon XDR, CrowdStrike Falcon Threat Intelligence, CrowdStrike Identity Protection, CrowdStrike Falcon Surface
No data available
 

Overview

Find out what your peers are saying about CrowdStrike, Trend Micro, Qualys and others in Attack Surface Management (ASM). Updated: September 2025.
868,029 professionals have used our research since 2012.