

CrowdStrike Falcon and Trellix Active Response are competing cybersecurity products in the advanced threat detection category. CrowdStrike Falcon holds the upper hand due to its seamless integration, proactive threat intelligence, competitive pricing, and support satisfaction, while Trellix Active Response excels in feature capabilities, offering strong endpoint protection and robust analytics that justify its cost.
Features: CrowdStrike Falcon is recognized for its real-time threat detection, cloud-native architecture, and minimal system impact. In comparison, Trellix Active Response offers detailed threat investigation tools, adaptive analytics, and comprehensive control over endpoint activities.
Room for Improvement: CrowdStrike Falcon could enhance its detailed threat investigation features and expand adaptive analytics. Additionally, it would benefit from greater endpoint activity control. Trellix Active Response could improve in areas such as pricing flexibility, ease of integration, and reducing deployment complexity.
Ease of Deployment and Customer Service: CrowdStrike Falcon ensures straightforward and swift cloud-based deployment with responsive customer support. Trellix Active Response may require more extensive on-premise setup but allows flexible configuration and offers a dedicated support ecosystem, favoring those who need broader customization and ongoing support.
Pricing and ROI: CrowdStrike Falcon provides competitive setup costs and high ROI through its efficient cloud infrastructure that quickly reduces threat exposure. Trellix Active Response, with potentially higher initial investment, offers substantial long-term value through advanced analytics and comprehensive threat management, presenting a compelling ROI through its feature-rich offerings.
CrowdStrike Falcon saves time and offers good value for money, especially for enterprise companies, because it can stop breaches.
It's very easy to deploy without many IT admins, saving time.
While we haven't yet quantified the financial benefits, we recognize that there has been a return on investment, particularly with operational efficiencies provided by the alerts.
On a scale of one to ten, I would rate the technical support as a 10 because they resolve many issues for us.
The CrowdStrike team is very efficient; I would rate them ten out of ten.
They could improve by initiating calls for high-priority cases instead of just opening tickets.
I would rate technical support from Trellix Active Response as a seven because sometimes we face difficulties finding engineers quickly, leading to customer frustration.
It has adequate coverage and is easy to deploy.
In terms of scalability, I find CrowdStrike to be stable, and I have not encountered any limitations with it.
There's no scalability limitation from CrowdStrike itself, as it just requires agent deployment.
The scalability of Active Response is satisfactory.
I have never seen instability in the CrowdStrike tool.
We are following N-1 versions across our environment, which is stable.
The biggest issue occurred when every computer worldwide experienced a blue screen.
Simplifying the querying process, such as using double quote queries or directly obtaining logs based on IP addresses or usernames, would be beneficial.
Another concern is CrowdStrike's GUI. It changes annually, making it hard to work and find options.
Threat prevention should be their first priority.
We would like Trellix to optimize the technology for these systems similarly to how it is deployed for normal endpoints.
There is room for improvement in the platform area and security area to make the dashboard visibility clearer and easier for customers to monitor malicious activities occurring in their environment.
It is expensive compared to SentinelOne, but as the market leader, it is worth it.
The licensing cost and setup costs are affordable.
The solution is a bit expensive.
Based on our evaluations, Trellix Active Response's pricing was the most feasible from a cost perspective.
I can investigate by accessing the customer's host based on the RTR environment and utilize host search to know details for the past seven days, including logins, processes, file installations, malicious processes, and network connections.
The real-time analytics aspect of CrowdStrike performs well because we get all logs in real-time, with no delay, allowing us to take action immediately.
Being an EDR solution, it helps us identify attacks in real-time.
They notify us immediately of any vulnerabilities on the endpoints, allowing us to deploy a response quickly.
The most valuable feature of Trellix Active Response is that whenever any incident occurs, it allows us to disconnect from that particular network or area and shut down the system using commands.
| Product | Market Share (%) |
|---|---|
| CrowdStrike Falcon | 9.4% |
| Trellix Active Response | 0.4% |
| Other | 90.2% |

| Company Size | Count |
|---|---|
| Small Business | 46 |
| Midsize Enterprise | 34 |
| Large Enterprise | 62 |
CrowdStrike Falcon offers robust endpoint protection and threat detection, leveraging cloud-native architecture and AI-driven capabilities for advanced security. Its design ensures minimal system impact, making it a preferred choice for organizations seeking efficient protection solutions.
CrowdStrike Falcon provides comprehensive security features, including endpoint detection and response, real-time threat insights, and advanced AI-driven detection mechanisms. Its cloud-native architecture facilitates effortless scalability and seamless integration with cloud services, securing endpoints, servers, and roaming users. While Falcon delivers strong threat intelligence and automated detection, it faces challenges in operating system compatibility, reports require enhancements, and integration with some technologies is limited. High pricing and occasional false positives are noted areas for improvement, along with expanded support for older systems.
What are the key features of CrowdStrike Falcon?In industries requiring fortified cybersecurity measures, CrowdStrike Falcon is deployed for endpoint protection and incident response. It offers advanced threat defense and integrates well with cloud services, making it a suitable replacement for traditional antivirus solutions. For sectors engaging in forensic investigations and real-time malware defense, Falcon's capabilities align with their security demands, serving industries from healthcare to finance.
Continuous Visibility into Your Endpoints:
Capture and monitor events, files, host flows, process objects, context, and system state changes that may be indicators of attack or dormant attack components.
Identify and Remediate Breaches Faster:
Access tools you need to quickly correct security issues. Send intelligence to analytics, operations, and forensic teams.
Target Critical Threats:
Get preconfigured and customizable actions when triggered, so you can target and eliminate threats.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.