We performed a comparison between CrowdStrike Falcon and Uptycs based on real PeerSpot user reviews.
Find out what your peers are saying about SentinelOne, CrowdStrike, Palo Alto Networks and others in Extended Detection and Response (XDR)."Microsoft 365 Defender is a stable solution."
"A crucial aspect for our team is the inclusion of identity and access management tools from the vendor."
"There is also one dashboard that shows us the status of many controls at once and the details I can get... It gives a great overview of many areas, such as files, emails, chats, and links. Even with the apps, it gives you a great overview. In one place you can see where you should look into things more deeply..."
"Defender is easy to use. It has a nice console, and everything is all in one place."
"Another noteworthy feature that I find appealing in Microsoft Defender is the credit-backed simulation. This feature enables organizations to train their users on effectively responding to phishing emails through a simulated training environment."
"I like that it's stable. It's been stable for a long time, and Microsoft Defender has done a good job there."
"The common and advanced security policies for threat hunting and blocking attacks are valuable."
"The most valuable feature of all is the full integration with the rest of the software in the operating system and Office 365, as well as Microsoft SCCM. It is quite easy for us to work with the whole instance of Microsoft products. This integration improves the benefits of the whole suite of products."
"CrowdStrike Falcon is effortless to use, and it's a cloud-specific platform. You only need to deploy the light agents on the licensed endpoints, and you're ready to work. Your dashboards will tell you the number of the endpoints being protected and the incidents. There are also incident dashboards with alerts that will tell you about the details."
"Enables us to understand what processes are running on the system, what registry keys have been enabled."
"Cyberattack detection is very good. We use it for detecting different vulnerabilities, such as ransomware, virus, and malware. It is a good product today when compared to Symantec that we used previously."
"CrowdStrike enables the infrastructure managers to visualize all the events and get information about the network."
"The most valuable feature is the indicator of compromise, which show you what file was either quarantined or removed."
"I like the feature called RTC, the remote time connector."
"Because it is security product and acts like an AIML smart product, not merely based on daily/weekly updates and signatures."
"One of the most valuable features of CrowdStrike Falcon is when there are upgrades there are no additional fees."
"They have multiple great features."
"It would be helpful if the solution could scan faster when it comes to scanning attachments to emails."
"The licensing is a nightmare and has room for improvement."
"What could be improved in Microsoft 365 Defender is its licensing, e.g. it should be more consolidated and would be good if it has some optimizations. Improving the alerts and notifications, in terms of adding more details, would also be good for this solution."
"It would be highly beneficial if CoPilot could identify anomalies within the network and notify the IT team."
"We should be able to use the product on devices like Apple, Linux, etc."
"For some scenarios, it provides good visibility into threats, and for some scenarios, it doesn't. For example, sometimes the URLs within the emails have destinations, and you do get a screenshot and all further details, but it's not always the case. It would be good if they did a better job of enabling that for all the emails that they identified as malicious. When you get an email threat, you can go into the email and see more details, but the URL destination feature doesn't always show you a screenshot of the URL in that email. It also doesn't always give you the characteristics relating to that URL. It would be quite good if the information is complete where it says that we identified this URL, and this is what it looks like. There should be some threat intel about it. It should give you more details."
"Stability could be improved by avoiding frequent changes to the interface."
"There is no common area where we can manage all the policies for the EDR, third-party solutions, devices, servers, Windows, Mac, etc., but it's on the road map, and we ware waiting for that feature."
"In the six months that I have been using CrowdStrike, it has not been able to detect anything."
"CrowdStrike Suites and the way that it bundles things can be a bit challenging. It should be easier to integrate with the other stuff that they sell or be included with what they sell. We have one piece, then they are talking about another piece on vulnerability management all of the sudden, and we don't own that piece. We can see it in the console, but nothing shows up. It simply appears within the tool as an option, but we can't use it without purchasing it."
"The technical support could improve because I am in India and the support I receive is from the UK or Australia. It is difficult to manage the time difference. The service could be faster. However, when we do have the support they are knowledgeable."
"We have had to open a case with the technical support to get some issues and bugs resolved."
"CrowdStrike Falcon could improve the logs by making them free to the API."
"It would be nice if they did have some sort of Active Directory tie-in, whether that be Azure or on-prem. Sometimes, it is difficult for us to determine if we are missing any endpoints or servers in CrowdStrike. We honestly don't have a great inventory, but it would be nice if CrowdStrike had a way to say this is everything in your environment, Active Directory-wise, and this is what doesn't have sensors. They try to do that now with a function that they have built-in, but I have been unsuccessful in having it help us identify what needs a sensor. So, better visibility of what doesn't have a sensor in our environment would be helpful."
"I would like to see a more accurate integration and an option to check the local machine."
"Basically, they don't cover legacy OS or applications. That's the only issue we're concerned about"
"We end up facing a lot of issues after upgrades."
CrowdStrike Falcon is ranked 2nd in Extended Detection and Response (XDR) with 104 reviews while Uptycs is ranked 24th in Extended Detection and Response (XDR) with 1 review. CrowdStrike Falcon is rated 8.6, while Uptycs is rated 8.0. The top reviewer of CrowdStrike Falcon writes "Easy to set up with good behavior-based analysis but needs a single-click recovery option". On the other hand, the top reviewer of Uptycs writes "Great features, good support, and lots of functionality". CrowdStrike Falcon is most compared with Darktrace, Microsoft Defender for Endpoint, Trend Micro Deep Security, SentinelOne Singularity Complete and Trend Vision One, whereas Uptycs is most compared with Aqua Cloud Security Platform, Wiz, Lacework, Orca Security and Tenable.io Container Security.
See our list of best Extended Detection and Response (XDR) vendors, best Endpoint Protection Platform (EPP) vendors, and best Endpoint Detection and Response (EDR) vendors.
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.