We wanted a very high level of endpoint protection and intrusion detection. Based on all the reviews, you have a bunch of products out there to choose from. One differentiator of CrowdStrike is that it's nearly what I would call zero-touch on the workstation. You don't have to worry about upgrades and all that. Then, when something suspicious is detected, the CrowdStrike team investigates that for us. It's part of the service that we purchased from them. Basically, we use the solution for security.
IT Consultant - Applications & Technology at Select Home Health Services
Great next-generation antivirus with breach warranty and good intrusion protection
Pros and Cons
- "One unique thing that they offer is a breach warranty. We basically have a warranty of up to $100,000 should there be any breach that they're not able to manage."
- "The downside is that if you are using a device offline, not connected to the internet, you will potentially have exposure."
What is our primary use case?
How has it helped my organization?
Basically, from an overall management perspective of the devices, you really only install the sensor once, and then you set up policies on the portal to say, okay, we want to stay on the N minus one version of the sensor. If there's an update that's required, the portal pushes it to the workstation. It makes everything very easy and doesn't require any touch.
What is most valuable?
It's mainly the next-generation antivirus that we are leveraging.
In the traditional antivirus, like McAfee, for example, you'd have to maintain signature files and all that on the workstation. We don't have to do that. On top of that, the footprint on the workstation is nearly zero.
One unique thing that they offer is a breach warranty. We basically have a warranty of up to $100,000 should there be any breach that they're not able to manage.
What needs improvement?
The downside is that if you are using a device offline, not connected to the internet, you will potentially have exposure. Intrusion detection and endpoint protection is all driven using the internet. You have to be connected. If you're not connected, basically, unlike some antivirus software packages, if you introduce something, let's say through a USB port, and you are not online, you have potential exposure.
I'd like to see a capability where the solution can do offline intrusion detection if needed. For example, if you have offline workstations or devices, then there's new data introduced into the device using, I guess, portable data devices. If there was a way to detect that while the device was not connected, that would be great.
It's not a major concern for us since 100% of the time, our devices are connected to the internet because most of our business applications are using cloud-based applications.
The pricing can look expensive.
Buyer's Guide
CrowdStrike Falcon Complete MDR
June 2025

Learn what your peers think about CrowdStrike Falcon Complete MDR. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
For how long have I used the solution?
We started using the solution in April or May of this year. It's only been a few months.
What do I think about the stability of the solution?
It's stable. So far, so good. I've not had any issues around it in terms of impacting usage, et cetera. It's pretty transparent to us.
What do I think about the scalability of the solution?
It's pretty scalable. I've talked to some users from huge companies, Fortune 500 companies, so I know that it's scalable.
We don't really have any users for it. It's pretty much myself and one other person who just monitors the portal, and that's about it. In terms of devices, we have 100 to 150 devices.
We intend to explore the other capabilities of what the sensor can provide us. However, right now, we're just focused on antivirus and intrusion detection. That's about it.
The intent is obviously to deploy. Every time we have new devices, et cetera, we just deploy this and go.
How are customer service and support?
Support is pretty transparent for me. We've had probably five or six incidents, and they were minor, however, then those are handled by the CrowdStrike team.
They would notify me if I needed to take action on my side. So far, they are good. I haven't needed to take any drastic action, like shutting down the device and all that.
Which solution did I use previously and why did I switch?
We had decentralized solutions. They were mainly workstation-based and was McAfee. We went to a centralized solution so that it can be centrally managed.
How was the initial setup?
The setup is pretty straightforward. We started out with a lot of effort since we didn't have managed devices when we installed it. We didn't have a device management system in place for Windows, so we had to install it at each workstation.
The deployment probably took us a week. We had to install the sensors manually. However, the installation process is very straightforward. It takes less than five minutes.
In terms of maintenance, it's all maintained on the CrowdStrike side.
What about the implementation team?
We did the initial setup ourselves in-house.
What was our ROI?
There's potentially really no ROI. It addresses an area of risk. That is all. You're putting the investment in the service as a kind of insurance against cyber attacks, data breaches, et cetera.
What's my experience with pricing, setup cost, and licensing?
We have a subscription.
The cost, the overall cost of the service, is something that could be improved. If you compare it to other antivirus systems, it'll seem more expensive as there's one piece that people overlook - you have a technical team monitoring for you behind the scenes.
The cost is approximately $35,000 to $40,000 a year. It covers up to 300 devices and 300 Windows or Mac OS devices, and about 150 mobile devices. There are no additional costs beyond the main fee. It's all paid on an annual lease.
Which other solutions did I evaluate?
We looked at Microsoft Defender, McAfee, Norton, and two other solutions, however, this one came up on top. The only downside is the overall cost when you compare it to the competition.
What other advice do I have?
We are customers and end-users.
I'm not sure which version of the solution we're using. Typically, we set ourselves to N minus one. We're typically one version behind the most current.
I'd warn potential new users that they have to look at the total cost of ownership. One item that's overlooked is when you get an antivirus or a security product, you will need experts to manage and maintain it. CrowdStrike basically provides you with the software solution and the technical support behind it. If you basically add up all those things, it'll probably be on a total cost basis; it'll be reasonable.
I'd rate the solution nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Information Security Analyst at a retailer with 10,001+ employees
Helps enhance security, reduces false positives, and detects threats quickly
Pros and Cons
- "The exposure management covers vulnerability management in discovery."
- "We find CrowdStrike Falcon Complete to have a steeper learning curve when it is deployed in certain industries such as finance and retail."
What is our primary use case?
CrowdStrike Falcon Complete is our EDR solution. It has many modules including vulnerability management, discovery, account application, and assets
Compared to our previous security products, CrowdStrike offers greater efficiency with its various modules that provide full functionality. We've found it to be a helpful tool overall. However, there are some challenges depending on the specific use case and industry, such as finance or retail. This is likely because we're accustomed to our legacy products and CrowdStrike is still new, requiring a learning and testing phase for our team.
We implemented CrowdStrike Falcon Complete to replace the legacy solutions in our environment.
How has it helped my organization?
We are impressed with CrowdStrike Falcon Complete SLAs.
The most effective features for detecting and mitigating cyber threats are machine learning and behavior analytics which are well-versed.
CrowdStrike Falcon Complete significantly enhanced our overall security by minimizing false positives, eliminating the need for system restarts during or after deployment.
CrowdStrike Falcon Complete helps us detect and mitigate threats quickly through positive alerts and fast response times.
The management console is user-friendly.
What is most valuable?
All of the modules are good. The exposure management covers vulnerability management in discovery.
What needs improvement?
We find CrowdStrike Falcon Complete to have a steeper learning curve when it is deployed in certain industries such as finance and retail.
For how long have I used the solution?
I have been using CrowdStrike Falcon Complete for three years.
How are customer service and support?
The technical support is good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We were previously using legacy solutions and replaced them with CrowdStrike Falcon Complete because of the next-gen EDR capabilities it offered.
CrowdStrike Falcon offers superior support and technology, making it a better choice than our outdated legacy solutions.
What other advice do I have?
I would rate CrowdStrike Falcon Complete eight out of ten.
CrowdStrike Falcon Complete provides clear and detailed documentation.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
CrowdStrike Falcon Complete MDR
June 2025

Learn what your peers think about CrowdStrike Falcon Complete MDR. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
Cyber Security Engineer at a computer software company with 51-200 employees
Has a nice interface and good integrations but there should be an uninstall feature on the cloud
Pros and Cons
- "It is a cloud-based solution. You can easily scale it."
- "The installation could always be a bit easier. You need to install it manually at the endpoint."
What is our primary use case?
I use the solution for a lot of things. It has more visibility than core tech. For example, it's better the TSC scores and that any integration visibility with Zscalar.
How has it helped my organization?
The solution helps to provide a better security posture.
What is most valuable?
The solution provides more visibility than Zscaler.
There's more security. It provides enhanced security with integration capabilities with third-party tools.
The threat detection and response are easy. If you have a subscription for the Falcon Consultant Complete sublicense, then they will take care of your MDL service. They will assign their team to it, and they will manage your incident detection and monitoring. CrowdStrike will take care of it via its own expertise so you don't have to overload your existing resources.
It helps improve our security posture by integrating with web security, email security, and other forms of security. There are also a lot of third-party tools. You have the opportunity for more alerts and security. CrowdStrike shares information with third-party tools that really help with visibility.
The solution is constantly being updated.
I've been satisfied with the interface.
What needs improvement?
We'd like to see the option for an uninstall feature directly on the cloud. It's a tokenless install; however, you should have a token while installing and uninstalling.
The installation could always be a bit easier. You need to install it manually at the endpoint.
For how long have I used the solution?
I've used the solution for a year.
What do I think about the stability of the solution?
The stability is very good. I have not witnessed any downtime.
What do I think about the scalability of the solution?
This is a cloud-based solution, You can easily scale it.
How are customer service and support?
Technical support has been very good. They are very helpful. It's a strong point for the product.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have also used different solutions. For example, I have used Cortex.
How was the initial setup?
The initial setup is very straightforward. It was a simple process.
What's my experience with pricing, setup cost, and licensing?
I'm a technical engineer and don't have visibility on the pricing. However, it can be a bit lower than other options.
What other advice do I have?
I'd rate the solution 8 out of 10. I can completely rely on CrowdStrike.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: partner
Presales & Sales Operations at UST Global
Reasonably priced, continuously enhanced, and helpful for visibility
Pros and Cons
- "The continuous improvement in detections and response times is valuable. They are more focused on threats that come from the cloud, not only that we see."
- "There can be an application for the mobile device for the administrator of the platform to have an overview. In less than two minutes, they should be able to see what is going on and take action."
What is our primary use case?
Our customers use it, but we deliver the services. We use it for advanced endpoint protection capabilities and threat-hunting capabilities. We use it for data lakes and repositories to reduce the cost and computational efforts for submitting or uploading in the cloud.
How has it helped my organization?
By implementing CrowdStrike Falcon Complete, we wanted to improve the visibility of our operators, analysts, and engineers. We wanted to be more efficient in our operations. Instead of finding information themselves, they can use the platform to find the information automatically.
Its benefits can be seen from the beginning. It is super easy in terms of deployment, and it works perfectly with the human resources and the stack of technologies that our clients have.
Partner support is beneficial. They are a trusted partner. They plan to continue in the market by themselves. They are not expecting somebody to purchase them. It helps to build confidence with the clients, and we can trust that nothing will change in that aspect.
They continue to improve their threat-hunting capabilities, which is important for me because there are more and more advanced threats, such as zero-day attacks. If we combine these threat-hunting capabilities with endpoint detection, we have an extra layer of response. It is super strong for us. We have different agents: one for detection and monitoring and the other one for the preventing aspect, which means threat hunting and response. I can combine the telemetry for threat hunting and monitoring and respond properly.
They are working hard to continue and enhance their labs for identifying new threats and malware. They are continuously labeling them with fancy names for marketing, but they are super helpful and useful because malware and attacks are labeled as per what is happening in specific industries or at specific locations. They give you an overall idea about what is going on not only in your country but also all over the world, and more specifically, in the industry you are working with.
The team of Falcon Complete works around the clock and does monitoring around the clock. It is quite good because it is a solution that combines monitoring and response, and at the same time, it labels all the threats in the world. They are super helpful in managing the threat exposure that companies face on a daily basis.
What is most valuable?
The continuous improvement in detections and response times is valuable. They are more focused on threats that come from the cloud, not only that we see. Five or six years ago, we were just focusing on the infrastructure. They, for sure, have better coverage for the supply chain devices or assets that are in the environment of the clients. We have better coverage of third-party vendors, and we have more visibility and more interactions with those third-party vendor solutions.
What needs improvement?
Some features can be enhanced or improved. For example, there can be more integration capabilities.
There can be an application for the mobile device for the administrator of the platform to have an overview. In less than two minutes, they should be able to see what is going on and take action. Having an overview in a mobile phone would be super helpful for the administrators because everybody has a mobile phone nowadays.
For how long have I used the solution?
I have been working with CrowdStrike Falcon Complete for four years.
What do I think about the stability of the solution?
It is stable. It is 90% compliant with what they promised.
What do I think about the scalability of the solution?
It is scalable.
How are customer service and support?
Their support is quite good. I would rate them a seven out of ten. They can add better resources or more resources locally.
How would you rate customer service and support?
Neutral
How was the initial setup?
I am not involved in its deployment, but it can be deployed on-premises and on the cloud. The cloud provider depends on the client's preference. We do not have any issues.
What's my experience with pricing, setup cost, and licensing?
It is expensive, but looking at the capabilities that it brings, it is reasonable.
There are no additional costs to the licensing costs. If you increase the number of licenses, support is included.
What other advice do I have?
I would rate CrowdStrike Falcon Complete an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: reseller
Associate Director at a consultancy with 11-50 employees
Uses AI-powered analytics, improves security posture, and automatically remediates threats
Pros and Cons
- "Overwatch is the most valuable feature of CrowdStrike Falcon Complete."
- "I would like to see CrowdStrike Falcon Complete XDR integrate more effectively with other technologies."
What is our primary use case?
We are partners with CrowdStrike and implement CrowdStrike Falcon Complete for all our customers to help protect their environments against breaches and cyber incidents.
Our customers are switching to CrowdStrike Falcon Complete for several reasons. First, their current antivirus solutions are up for renewal. Second, they lack EDR capabilities, which limits their visibility into their security posture. This lack of visibility is a major challenge for them. Finally, they are seeking proactive threat hunting, a service their current Security Operations Center provider doesn't offer. Instead, they receive an unmanaged threat-hunting service, which they find inadequate.
How has it helped my organization?
CrowdStrike's Falcon Complete service simplifies endpoint security by using a single sensor we install on our devices. Once installed, CrowdStrike's managed services take care of everything, including monitoring, threat detection, remediation, and alert management. Our customers only need to handle adding new users or groups.
CrowdStrike Falcon Complete improves our ability to respond to and remediate cyber threats.
CrowdStrike Falcon Complete boasts AI-powered analytics that hold significant promise. While I haven't used it personally, we'll be implementing it with a few clients. Once their quarterly reviews are completed, we should gain valuable feedback. The generative AI capabilities seem comprehensive, which is positive for our needs.
The real-time threat-hunting capabilities stand out for us.
Falcon Complete incident response feature works in the background where a team at the threat center reviews the detections and automatically remediates the threats.
We're continually evolving our cybersecurity posture, and Falcon Complete has significantly improved our response time to cyber threats.
We don't have an in-house SOC team so Falcon Complete has been crucial in helping with threat detection and resolution.
What is most valuable?
Overwatch is the most valuable feature of CrowdStrike Falcon Complete.
Threat hunting is the most valuable feature for strengthening our cybersecurity posture.
What needs improvement?
I would like to see CrowdStrike Falcon Complete XDR integrate more effectively with other technologies.
For how long have I used the solution?
I have been using CrowdStrike Falcon Complete for a few months.
What do I think about the stability of the solution?
CrowdStrike Falcon Complete is extremely stable.
What do I think about the scalability of the solution?
I would rate the scalability of CrowdStrike Falcon Complete ten out of ten.
How are customer service and support?
The technical support is excellent.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Before our partnership with CrowdStrike, we offered Trend Micro, McAfee, and Symantec products. We transitioned to CrowdStrike Falcon Complete due to its ideal alignment with our customer needs and its inclusion of threat hunting and cyber insurance within the service package.
How was the initial setup?
The initial deployment is straightforward. We integrated with ADR in SCCM and pushed all the software agents on all the machines. The deployment required two people.
What was our ROI?
We have seen a return on investment with CrowdStrike Falcon Complete.
What other advice do I have?
I would rate CrowdStrike Falcon Complete ten out of ten.
CrowdStrike Falcon Complete is a managed service so it does not require maintenance from our end.
I recommend CrowdStrike Falcon Complete to others.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Head of Presales Engineering Department at One Albania
Very valuable endpoint detection and response
Pros and Cons
- "The endpoint detection and response is very valuable."
- "The solution should be lighter because it currently uses a lot of computing sources."
What is our primary use case?
Our company uses the solution for our exchange servers, key directory servers, and radio servers.
We currently have three users but may expend in the future depending on strategy and budget.
What is most valuable?
The endpoint detection and response is very valuable.
What needs improvement?
The solution should be lighter because it currently uses a lot of computing sources.
For how long have I used the solution?
I have been using the solution for six months.
What do I think about the stability of the solution?
The solution is definitely stable so stability is rated a nine out of ten.
What do I think about the scalability of the solution?
The solution is definitely scalable so scalability is rated a ten out of ten.
How are customer service and support?
We contacted technical support once and there was a delay from that SOC center. We haven't contacted support again.
Which solution did I use previously and why did I switch?
We previously used McAfee but were facing a RAV somewhere in a couple of servers.
What's my experience with pricing, setup cost, and licensing?
The pricing is a little bit expensive for our region.
It is not expensive to get implementation assistance from partners.
Which other solutions did I evaluate?
Our company is a dealer for Trend Micro so we are more focused on their products.
I can't compare the solution's features to Trend Micro because I can't get them to work in the same environment.
What other advice do I have?
I recommend using the solution. Nowadays, there is a cyber warfare so a bit of protection is important. I rate the solution an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Assistant Vice President at a financial services firm with 10,001+ employees
Identifies malicious activity, light on the system, and has helpful technical support
Pros and Cons
- "There's less workload on the endpoint."
- "The initial setup was slightly complex although it's an easier solution."
What is our primary use case?
When work-from-home scenarios started in March 2020, during the pandemic, in the month of April, we were actually going through some POCs and had one ransomware attack on one of the client sites. We had to deploy the solution immediately, which actually helped us find out or not how it worked. Proactively, we could identify some threats in the environment and act on them. We were virtually identifying items and getting notifications, as well as seeing the availability of the intra. That was very helpful for the entire team.
What is most valuable?
The solution is very nice. It's got multiple products for multiple features and enabled multiple settings, which helped my team and the organization is also in a way better way. Since it was lockdown the last two years, when the entire organization went to working from a remote location, the earlier solutions, what we had, were of no use. We were most concerned about security over the cloud. Carbon Black has helped us handle that.
Before we used to support multiple clients. We had to have some connectivity to the client's environment via Citrix or something. To access any of our solutions was a challenge when most of them were on-prem. Those were challenges for all of us. Now, most of the world has gone to the cloud. That actually helped us. Obviously, CrowdStrike was a different experience altogether.
I personally work on advanced threat hunting and identifying possible malicious activity or the possible threat in our environment which is getting easier earlier. Symantec Engine Protection, for example, gives you known reactive reports where you get stuff from either SIM or some soft team to help us on finding out probably the path for the attack. However, CrowdStrike is better at hunting threats and catching them early.
There's less workload on the Endpoint. After moving to CrowdStrike we never have this issue of systems getting overutilized by any of the security tools. That was one of the biggest advantages for it.
What needs improvement?
CrowdStrike has multiple parameters of components in the same console, which includes your vulnerability scanning. It has access to, or rather, we can integrate with, our existing SIM technology or SIM tool. The information that gets passed on the SIM control, the soft tool data site or any other tool is very limited. I had to actually provide the control access to my soft team so that they could drill down if needed.
The information was get passed on from Falcon control to CrowdStrike and it was very limited. It was acting as more of an alert only. For any further deep-dive analysis, we had to log in on the console itself.
CrowdStrike has multiple parameters. For example, my vulnerability scanning team is a separate team who works on different tools altogether. If I need to give them access to my console I just need to provide them read-only access or kind of an admin access for VA scanning.
I had to make some customized access that can be provided to different teams on the same console. As a VA team member, if I login to the console with my credential I should be able to see the things which I am working upon. I don't need to see all other tile stack tabs. I should be able to provide some kind of customized access or other kind of access control for the console.
Microsoft Defender has one good option which is called the ASR rule. It basically allows the machines to be onboarded to different consoles, which analyzes the process of it and summarizes it in a single console. Obviously, the number of incidents of the event are very huge. It takes about a month or so to evaluate. However, after the evaluation completes, you can actually fine-tune what should not be present in your automation. Which you can set up and get rid of it. It would be nice if this product had something similar.
For how long have I used the solution?
I've used the solution for two years.
What do I think about the stability of the solution?
The stability is very good. It does not have any kind of payload on the endpoint, and we don't need to compromise with system performance. The legacy tools used to have this agent needed to be deployed and consumed a lot of system resources. In terms of performance, this tool was an improvement on the legacy. The capabilities of CrowdStrike as a tool are fantastic.
What do I think about the scalability of the solution?
We are working with about 18,000 endpoints and about 2,000 servers.
The scalability was really good. It covers most of the recent operating systems I would say in India, although most of our customers are using Microsoft operating systems only. In terms of my international clients who have different operating systems, including Mac, Linux, or Unix, this works. CrowdStrike has the maximum availability for all possible and the latest operating systems. With other tools. we didn't have that level of flexibility.
How are customer service and support?
Technical support was fantastic, however, frankly speaking, we barely had a chance to get in touch with the technical support as CrowdStrike has a fantastic health portal within that console. There were a couple of scenarios where we went to them as some kind of alert that CrowdStrike was publishing it to the customer only. They had some specific name for those alerts. Those used to get sent to the customer's end only. Being automation as security, CrowdStrike has a policy to provide the information only to the registered customers only. Obviously, the licenses are issued to the customer. However, the licensing policy was limited in that we were kind of a vendor, or rather, a mediator between the customer and the OEM and we fell through the cracks.
I would say in my earlier solution, we used to just provide the license number. If the license number were verified, we would get all types of support.
Overall, the support team was really good. They are more capable of understanding the other challenges and would then provide the solution.
Mostly, we were providing all the technical support to the customer. The licenses were installed with the customer's name. We were slightly lacking as the details that OEM was providing were direct to the customer and we were being skipped. At the same time, we used to struggle to get the details and updates or more input from the OEM from CrowdStrike.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We moved from Symantec Endpoint to CrowdStrike.
How was the initial setup?
The initial setup was slightly complex although it's an easier solution. It took us about a month to understand the entire process of the console.
Within a month we were able to train our members to a certain level and within a six-month span, all members actually became familiar for the technology.
We had some challenges from the client environment as well. That was expected as we were ruling out Symantec as well at the time. Concurrently, we were moving out of Symantec and deploying through the CrowdStrike agent. We were also doing the policy fine-tuning, which took a slightly longer time as the customer had their own developed applications and tools for finding their hashes. We added features like device control, app control. Those parts took slightly longer, however, it was still quicker than the legacy solution.
We have two people available to handle maintenance.
What about the implementation team?
The deployment was handled by my technical team only. Internally, we had eight team members deploying it. They were using a big fix as a deployment tool to deploy this agent on all the clients. I was leading the admin part of CrowdStrike. We had to involve the patch management team who could push a particular script on all the endpoints to onboard them. Most of the endpoints were working remotely and luckily we fixed everything there in the cloud which was making our life easier for onboarding scripts on the client.
What other advice do I have?
I'd rate the solution nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Operations at AkshayaPatra
Light on resources, minimal maintenance, and scales well
Pros and Cons
- "The most valuable feature of CrowdStrike Falcon Complete is the lightweight design, easily manageable portal, and minimal IT maintenance required."
- "CrowdStrike Falcon Complete could improve by having advanced features, such as SOC, and HDR. There would have been a lot of processes involved."
What is our primary use case?
We are using CrowdStrike Falcon Complete for fileless attacks, ransomware, and zero-day attacks.
What is most valuable?
The most valuable feature of CrowdStrike Falcon Complete is the lightweight design, easily manageable portal, and minimal IT maintenance required.
What needs improvement?
CrowdStrike Falcon Complete could improve by having advanced features, such as SOC, and HDR. There would have been a lot of processes involved.
For how long have I used the solution?
I have been using CrowdStrike Falcon Complete for approximately three years.
What do I think about the stability of the solution?
CrowdStrike Falcon Complete is a stable solution.
What do I think about the scalability of the solution?
The scalability of rowdStrike Falcon Complete is good.
We have approximately 500 computers using the solution. We have approximately 1,200 people using the solution.
How are customer service and support?
I have not contacted the technical support from CrowdStrike Falcon Complete.
How was the initial setup?
The initial setup of CrowdStrike Falcon Complete is easy. The time it took for the deployment was approximate one week for 500 computers.
What about the implementation team?
We did the deployment of CrowdStrike Falcon Complete in-house.
What's my experience with pricing, setup cost, and licensing?
There is a license needed to use the solution. The price of the solution is fair.
Which other solutions did I evaluate?
We evaluated McAfee and Symantec before choosing CrowdStrike Falcon Complete.
Symantec is complicated and it did not have as many features when compared to CrowdStrike Falcon Complete. McAfee is also a very complicated solution.
What other advice do I have?
If you use this solution your environment will be safe.
I rate CrowdStrike Falcon Complete an eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free CrowdStrike Falcon Complete MDR Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Product Categories
Managed Detection and Response (MDR)Popular Comparisons
IBM Security QRadar
Huntress Managed EDR
Intercept X Endpoint
Arctic Wolf Managed Detection and Response
SentinelOne Vigilance
Secureworks Taegis Managed XDR / MDR
Blackpoint Cyber MDR
Field Effect MDR
Adlumin Cybersecurity
Fidelis Elevate
Bitdefender MDR
Fortra's Alert Logic MDR
Buyer's Guide
Download our free CrowdStrike Falcon Complete MDR Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How do you estimate ROI of a Managed Detection and Response (MDR) solution?
- When evaluating Managed Detection and Response (MDR), what aspect do you think is the most important to look for?
- Which solution do you prefer: Optiv Managed Security Services or eSentire?
- Why is Managed Detection and Response (MDR) important for companies?