CrowdStrike Falcon and Trellix Active Response compete in the cybersecurity category. CrowdStrike Falcon has the upper hand due to its user-friendly nature and reliability.
Features: CrowdStrike Falcon offers comprehensive threat intelligence, effective malware detection, and seamless integration with existing infrastructure. Trellix Active Response provides advanced threat hunting, real-time analytics, and in-depth threat investigation.
Room for Improvement: CrowdStrike Falcon needs enhancements in real-time alerting, reporting functionalities, and performance. Trellix Active Response requires better scalability, performance optimization, and simplified user interface.
Ease of Deployment and Customer Service: CrowdStrike Falcon features straightforward cloud-based deployment and responsive support team. Trellix Active Response has mixed reviews on deployment complexity despite comprehensive setup guidance.
Pricing and ROI: CrowdStrike Falcon incurs a higher initial setup cost but offers significant ROI through efficient threat prevention. Trellix Active Response has moderately lower setup costs with value in effective incident resolution.
CrowdStrike Falcon saves time and offers good value for money, especially for enterprise companies, because it can stop breaches.
It's very easy to deploy without many IT admins, saving time.
While we haven't yet quantified the financial benefits, we recognize that there has been a return on investment, particularly with operational efficiencies provided by the alerts.
On a scale of one to ten, I would rate the technical support as a 10 because they resolve many issues for us.
The CrowdStrike team is very efficient; I would rate them ten out of ten.
They could improve by initiating calls for high-priority cases instead of just opening tickets.
I would rate technical support from Trellix Active Response as a seven because sometimes we face difficulties finding engineers quickly, leading to customer frustration.
It has adequate coverage and is easy to deploy.
In terms of scalability, I find CrowdStrike to be stable, and I have not encountered any limitations with it.
There's no scalability limitation from CrowdStrike itself, as it just requires agent deployment.
The scalability of Active Response is satisfactory.
I have never seen instability in the CrowdStrike tool.
We are following N-1 versions across our environment, which is stable.
The biggest issue occurred when every computer worldwide experienced a blue screen.
Simplifying the querying process, such as using double quote queries or directly obtaining logs based on IP addresses or usernames, would be beneficial.
Another concern is CrowdStrike's GUI. It changes annually, making it hard to work and find options.
Threat prevention should be their first priority.
We would like Trellix to optimize the technology for these systems similarly to how it is deployed for normal endpoints.
There is room for improvement in the platform area and security area to make the dashboard visibility clearer and easier for customers to monitor malicious activities occurring in their environment.
It is expensive compared to SentinelOne, but as the market leader, it is worth it.
The licensing cost and setup costs are affordable.
The solution is a bit expensive.
Based on our evaluations, Trellix Active Response's pricing was the most feasible from a cost perspective.
I can investigate by accessing the customer's host based on the RTR environment and utilize host search to know details for the past seven days, including logins, processes, file installations, malicious processes, and network connections.
The real-time analytics aspect of CrowdStrike performs well because we get all logs in real-time, with no delay, allowing us to take action immediately.
Being an EDR solution, it helps us identify attacks in real-time.
They notify us immediately of any vulnerabilities on the endpoints, allowing us to deploy a response quickly.
The most valuable feature of Trellix Active Response is that whenever any incident occurs, it allows us to disconnect from that particular network or area and shut down the system using commands.
Product | Market Share (%) |
---|---|
CrowdStrike Falcon | 10.3% |
Trellix Active Response | 0.3% |
Other | 89.4% |
Company Size | Count |
---|---|
Small Business | 46 |
Midsize Enterprise | 34 |
Large Enterprise | 61 |
CrowdStrike Falcon offers comprehensive endpoint protection with real-time threat detection, AI-driven capabilities, and seamless integration with other platforms. Its cloud-native design provides robust security across diverse environments, making it a reliable choice for modern cybersecurity needs.
CrowdStrike Falcon is heralded for features like robust endpoint visibility, threat detection, and AI-driven capabilities. Users value its efficient real-time monitoring, which maintains low impact on performance while offering seamless integration with platforms. The lightweight design, coupled with comprehensive dashboards and automated threat responses, enhances security operations while reducing resource strain. CrowdStrike's cloud-native architecture ensures flexible, always-on protection, making it adaptable to a wide range of environments. However, improvements can be made in log management, compatibility with diverse operating systems, and integration with third-party technologies. Users also seek more robust reporting features, fewer false positives, and better support for legacy systems. Enhanced policy application, AI capabilities, and extended on-demand scanning are desired, while pricing and technical support responsiveness are concerns.
What are CrowdStrike Falcon's key features?CrowdStrike Falcon is implemented widely in industries relying on robust endpoint protection for monitoring, securing endpoints, forensic analysis, and malware detection. Its cloud-based AI capabilities ensure comprehensive security across devices, making it a preferred choice for networks, servers, and workstations globally. The efficient management of security threats and compliance with regulations is achieved with minimal resource consumption.
Continuous Visibility into Your Endpoints:
Capture and monitor events, files, host flows, process objects, context, and system state changes that may be indicators of attack or dormant attack components.
Identify and Remediate Breaches Faster:
Access tools you need to quickly correct security issues. Send intelligence to analytics, operations, and forensic teams.
Target Critical Threats:
Get preconfigured and customizable actions when triggered, so you can target and eliminate threats.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.