

Trellix ESM and CrowdStrike Falcon operate in the security solutions category with strong capabilities in incident analysis and threat detection. CrowdStrike Falcon has the upper hand in real-time threat detection due to its effective EDR and AI features, offering seamless cloud integration and lightweight management.
Features: Trellix ESM is known for robust incident analysis, customizable dashboards, and integration capabilities, particularly in SOC implementations. Users praise its advanced correlation and malware detection. CrowdStrike Falcon excels in real-time threat detection and intelligence due to its powerful EDR and AI capabilities. Its lightweight agent, ease of use, and seamless cloud integration make it a preferred choice for endpoint protection.
Room for Improvement: Trellix ESM needs improvements in stability, interface, and API development. Users note high resource consumption and limited SaaS integration. CrowdStrike Falcon can enhance dashboard functionalities and integration with other technologies. Its interface and threat analysis correlation need work, alongside improved reporting features.
Ease of Deployment and Customer Service: Trellix ESM offers hybrid and on-premises deployments but faces integration and maintenance challenges. Customer service varies regionally. CrowdStrike Falcon is praised for cloud deployment flexibility and efficient management in hybrid environments. It provides solid technical support, though response times could be improved.
Pricing and ROI: Trellix ESM is considered expensive but offers significant ROI for SOC solutions. Its cost-effectiveness is debated due to complex licensing. CrowdStrike Falcon's high pricing reflects its robust features and advanced protection, offering modular purchasing for flexibility. Despite being costly for SMBs, it provides high ROI through feature customization.
CrowdStrike Falcon saves time and offers good value for money, especially for enterprise companies, because it can stop breaches.
It's very easy to deploy without many IT admins, saving time.
On a scale of one to ten, I would rate the technical support as a 10 because they resolve many issues for us.
The CrowdStrike team is very efficient; I would rate them ten out of ten.
They could improve by initiating calls for high-priority cases instead of just opening tickets.
I would rate support for Trellix ESM 10 out of 10 because if we connect with the support in the UK, we get excellent support.
It's rare for me to need them unless it's an issue with licensing, and they are the best in that regard.
It has adequate coverage and is easy to deploy.
In terms of scalability, I find CrowdStrike to be stable, and I have not encountered any limitations with it.
There's no scalability limitation from CrowdStrike itself, as it just requires agent deployment.
Scalability is quite easier with Trellix ESM, because all we need to do is add more receivers to it, so it can go to any point.
I have never seen instability in the CrowdStrike tool.
We are following N-1 versions across our environment, which is stable.
The biggest issue occurred when every computer worldwide experienced a blue screen.
Simplifying the querying process, such as using double quote queries or directly obtaining logs based on IP addresses or usernames, would be beneficial.
Another concern is CrowdStrike's GUI. It changes annually, making it hard to work and find options.
Threat prevention should be their first priority.
If there is any device which is not covered, there should not be any additional charges for writing the custom parsers on that.
It is expensive compared to SentinelOne, but as the market leader, it is worth it.
The licensing cost and setup costs are affordable.
The solution is a bit expensive.
I can investigate by accessing the customer's host based on the RTR environment and utilize host search to know details for the past seven days, including logins, processes, file installations, malicious processes, and network connections.
The real-time analytics aspect of CrowdStrike performs well because we get all logs in real-time, with no delay, allowing us to take action immediately.
Being an EDR solution, it helps us identify attacks in real-time.
The weakest point is it doesn't cover almost all the devices, so the customer has to be more dependent on the parsers to be written by the Professional Services team.
| Product | Mindshare (%) |
|---|---|
| CrowdStrike Falcon | 3.1% |
| Trellix ESM | 1.2% |
| Other | 95.7% |

| Company Size | Count |
|---|---|
| Small Business | 50 |
| Midsize Enterprise | 33 |
| Large Enterprise | 62 |
| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 6 |
| Large Enterprise | 24 |
CrowdStrike Falcon provides cutting-edge endpoint detection with automatic alerts, real-time monitoring, and seamless integration capabilities. Cloud-native architecture and AI-driven processes ensure scalable protection and efficient threat remediation.
CrowdStrike Falcon is recognized for its robust EDR and threat intelligence features that enhance security and streamline operations. Its lightweight agent minimizes system impact while offering real-time monitoring and detailed reporting. This platform uses cloud-native architecture for scalable, consistent protection, significantly reducing administrative demands. AI and machine learning empower precise threat hunting and behavioral analysis, which mitigates false positives and boosts cybersecurity efficiency. Users seek improvements in integration with other systems, reporting functions, and compatibility with specific operating systems. While the solution handles malware mitigation and threat response efficiently, suggestions for on-demand scanning, enhanced visibility, and better dashboard features are noted.
What are the key features of CrowdStrike Falcon?In technology sectors, CrowdStrike Falcon commonly supports endpoint protection and threat response initiatives, allowing companies to replace traditional antivirus systems with more advanced solutions. In finance, it secures sensitive data across multiple platforms, ensuring compliance. In healthcare, real-time security analysis protects patient data on critical devices like servers and laptops, utilizing AI to enhance cybersecurity defenses.
Make your organization more resilient and confident with Trellix Security Operations. Filter out the noise and cut complexity to deliver faster, more effective SecOps. Integrate your existing security tools and connect with over 650 Trellix solutions and third-party products.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.