CrowdStrike Falcon is leading the market in EDR. They are the first that to have this kind of solution against malware. They have an advantage in respect to the rest of the competitors. They offer a certain amount to protect in case of malware or cyber-attacks. They have a policy or insurance connected to the service. That's the reason why we choose CrowdStrike over other solutions.
Head of IT Department at a pharma/biotech company with 10,001+ employees
Effective cyber attack prevention, light on resource, and great user expereince
Pros and Cons
- "The most valuable feature is the machine learning that they use to check certain patterns in the endpoint devices. It checks the whole ecosystem or entire environment."
What is our primary use case?
What is most valuable?
The most valuable feature is the machine learning that they use to check certain patterns in the endpoint devices. It checks the whole ecosystem or entire environment.
I am very happy with CrowdStrike Falcon because it does not use a lot of resources in the endpoint, it's a lightweight solution. It provides good protection and it is very effective. Additionally, it is easy to integrate, has great features, good capabilities, and the users have a positive experience.
For how long have I used the solution?
I have been using CrowdStrike Falcon for approximately one year.
What do I think about the stability of the solution?
CrowdStrike Falcon is stable.
Buyer's Guide
CrowdStrike Falcon
August 2025

Learn what your peers think about CrowdStrike Falcon. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,384 professionals have used our research since 2012.
What do I think about the scalability of the solution?
I have found CrowdStrike Falcon to be scalable.
How are customer service and support?
I have not needed to use technical support.
What's my experience with pricing, setup cost, and licensing?
The cost of CrowdStrike Falcon could be reduced. It is quite expensive if you compare it to other solutions, such as Blue Coat, Symantec, McAfee, or Kaspersky.
What other advice do I have?
My advice to those wanting to use CrowdStrike Falcon is to try it out to see if it works well in their environment. I consider CrowdStrike Falcon is a very accurate solution. They are confident about the capabilities of their solutions because they offer money or payback if there is a high-impact cyber incident or cyberattack while using the solution.
They need to have special consideration about the different plans and budgets that they need to get the solution that they want.
I rate CrowdStrike Falcon a ten out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Cyber Security Engineer at a legal firm with 501-1,000 employees
The cloud-based management console is easy to maintain and takes a load off our hands
Pros and Cons
- "It has definitely minimized resources. When everything was on-prem, there was a lot more work maintaining it. One of the big value tickets: I don't have lists of hundreds of exceptions for certain applications that I have to maintain, add, delete, and move. The very nature of the product has lessened my workload considerably."
- "There are some aspects of the UI that could use some improvement, e.g., working in groups. I build a group, then I have to manually assign prevention policies, update policies, etc., but there is no function to copy that group. So, if I wanted to make a subgroup for troubleshooting or divide workstations into groups of laptops and desktops, then I have to manually build a brand new group. I can't just copy a build from one to another. Additionally, in order to do any work within a group, I have to first do the work on the respective prevention policy page or individual policy page, then remove the group if the group is assigned to a different prevention policy, remove the prevention policy, and then add the new one in. So, it can get a little hectic. It would be easier if I could add and remove things from the group page rather than having to go into the policy pages to do it."
What is our primary use case?
We are using it primarily for NGAV, but we also use their EDR product and Falcon OverWatch.
Most of our internal stuff is still on-prem. We do use SaaS for vendor products, but our internal environment is still mostly on-prem.
How has it helped my organization?
I think everyone is trying to move away from on-prem solutions. Having the cloud-based management console makes it a lot easier to maintain. It takes a load off our hands as engineers and analysts. It helps with upgrades and patching, I don't have to worry about on-prem servers for maintenance, but also as another thing to defend against, so getting rid of that is definitely beneficial.
As a cloud-native solution, it provides us with flexibility and always-on protection. I don't have to worry about data center failures on my end. I don't have to worry about any issues in our server rooms affecting the protection of the environment as a whole. Having CrowdStrike take that responsibility is a load off our backs.
Falcon has been very successful in preventing breaches. In the beginning, there were a lot of false positives as Falcon learned our environment, but I would definitely give it a positive rating overall for protecting our environment.
What is most valuable?
The NGAV portion is the most valuable feature. The primary reason that we went with the product was their reputation. In practice, it has been a definite step up from where we were previously.
We are using Falcon Investigate, which is their EDR tool. The EDR has made it infinitely easier to investigate into more detail on end user workstations and servers. Any sort of detection where I can go back into the EDR tool and dig down deeper into the endpoint is great. This was a function that we did not have previously.
What needs improvement?
There are some aspects of the UI that could use some improvement, e.g., working in groups. I build a group, then I have to manually assign prevention policies, update policies, etc., but there is no function to copy that group. So, if I wanted to make a subgroup for troubleshooting or divide workstations into groups of laptops and desktops, then I have to manually build a brand new group. I can't just copy a build from one to another. Additionally, in order to do any work within a group, I have to first do the work on the respective prevention policy page or individual policy page, then remove the group if the group is assigned to a different prevention policy, remove the prevention policy, and then add the new one in. So, it can get a little hectic. It would be easier if I could add and remove things from the group page rather than having to go into the policy pages to do it.
For how long have I used the solution?
I have been using it less than a year. We are relatively new customers.
What do I think about the stability of the solution?
My impressions of the stability are positive. I haven't had any problems since implementation with stability or availability.
Minimal maintenance is required on our side post-deployment, but it still does require maintenance. If I have to build out new groups or a troubleshooting group, e.g., tweaking policies if machines change subnets, then there is still maintenance required.
All post-implementation maintenance and administration is handled by a single security engineer.
What do I think about the scalability of the solution?
We are a relatively small firm, but I have had no problems in my deployment plans. I could easily see this scaling upwards.
In total, we are protecting roughly 1500 endpoints.
How are customer service and technical support?
They have been very on point and helpful. I have never had to ask them where they are. They are always following up with me trying to keep the tickets live, so that is great. I have been very impressed.
Which solution did I use previously and why did I switch?
We replaced Symantec Endpoint Protection. On the one hand, we wanted a fully NGAV. Symantec was still using a hybrid model, a mix of signature-based and behavioral-based detections, so moving over into a full NGAV product was important to us. We wanted to stay up to date on the ever changing nature of malware, especially since we have been seeing more malware nowadays that can evade strictly detection-based systems. Also, Symantec support was very hard to track down or talk to. All in all, CrowdStrike has been more responsive to any questions or concerns, which is big when you are dealing with vendor solutions.
Fortunately, we have not experienced any major detections. However, testing-wise, CrowdStrike has been more effective overall.
How was the initial setup?
Deployment was pretty easy. We scripted out a process in GPO, then we were able to deploy it fairly seamlessly.
We managed to deploy it to all our servers within a week or two. That was mostly due to getting clearance from server owners, not due to the CrowdStrike installation. Then, for the workstations, it was a bit longer just because of office locations and when people had their computers on. The CrowdStrike process was very smooth. It was really just the bureaucracy part that took a while.
We had to change management protocols. We put it out to dev servers and workstations in detect-only mode as we deployed CrowdStrike to endpoints that had a preexisting AV system still on them, in order to avoid any time where a system would not be protected by an antivirus system. So, we deployed CrowdStrike, then disabled the previous antivirus system and activated CrowdStrike's prevention policies, then uninstalled the previous antivirus system.
What about the implementation team?
Four or five people were involved in the deployment: a security engineer, two workstation engineers, and various server owners.
What was our ROI?
It is protecting our environment, so it is worth the cost.
It has definitely minimized resources. When everything was on-prem, there was a lot more work maintaining it. One of the big value tickets: I don't have lists of hundreds of exceptions for certain applications that I have to maintain, add, delete, and move. The very nature of the product has lessened my workload considerably.
What's my experience with pricing, setup cost, and licensing?
The pricing was very fair for what we got.
Different components are additional price points. We got the components that were right for us, but other organizations may require more (or less) components to suit their needs.
Which other solutions did I evaluate?
CrowdStrike is an industry leader. When we were looking for a replacement technology for NGAV, their name was on the top of a Google search.
We did a PoC with CrowdStrike. We deployed the PoC only to a select group of test machines, so we were able to deploy rather quickly. The PoC helped immensely in the decision-making process.
We did evaluate Cylance and Carbon Black. All the products that we investigated looked good. In the end, we went with CrowdStrike because of:
- The reputation of the organization in the AV community.
- Its out-of-the-box readiness.
- Ease of maintenance and administration.
What other advice do I have?
Take the time you need in the beginning to fully build out all the groups and prevention policies that you will need. It may take a bit longer during the initial setup, but it is worth it in the long run because it makes maintenance down the line much easier than having to build new groups or prevention policies as they come up. Definitely take the time needed in the beginning. Then, later down the road all you have to do is check some boxes, as opposed to building out brand new groups and prevention policies, which can take awhile.
In the beginning, there will be a bunch of false positives as it learns your environment. However, those are very easily handled within the UI, creating IOA or machine learning exceptions. With our previous solution, we had a couple hundred exceptions, and with CrowdStrike, we have six or so.
CrowdStrike has fulfilled its function very well. We got it specifically to serve the purpose that it is serving.
It is a solid nine out of 10.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
CrowdStrike Falcon
August 2025

Learn what your peers think about CrowdStrike Falcon. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,384 professionals have used our research since 2012.
Information Security, Sr. Analyst at a wholesaler/distributor with 10,001+ employees
Good support, activity dashboard provides a holistic view from a security standpoint
Pros and Cons
- "The most valuable feature is the activity dashboard because it gives you a holistic view of your environment from a security standpoint."
- "We would like to be able to perform on-demand scanning, rather than relying on the scheduler."
What is our primary use case?
We use CrowdStrike Falcon as our EDR solution, including antivirus.
How has it helped my organization?
As Symantec ended its endpoint protection, we were able to roll out CrowdStrike.
It is important to us that CrowdStrike is cloud-based because the way I understand it, that's their main engine for their next-gen EDR solution. The fact that it's cloud-native, flexible, and offers always-on protection is important because we want to have 24-hour monitoring of our environment. It is important to us that we don't have to worry about upgrades.
This product has worked flawlessly to prevent breaches, and then it has allowed us to prevent any downtime.
It has minimized our footprint because having the ability to implement the prevention policies has allowed us to focus on other projects. The prevention policies are working for us.
What is most valuable?
The most valuable feature is the activity dashboard because it gives you a holistic view of your environment from a security standpoint.
What needs improvement?
We would like to be able to perform on-demand scanning, rather than relying on the scheduler. Right now, CrowdStrike does not have an on-demand scanner. They have the always-on, but we have found instances where artifacts are being blocked from running, but they're not being removed. With an on-demand scanner, we would have the ability to remove those artifacts from an end user's machine.
I would like to see the multi-site environment functionality added in the next release. Currently, we are working under a single-site environment, and on the roadmap, they mentioned having the ability to have a multi-site environment.
For how long have I used the solution?
We have been using CrowdStrike Falcon for approximately eight months.
What do I think about the stability of the solution?
Stability-wise, they are very advanced in the next-gen antivirus game. CrowdStrike Falcon is always available.
What do I think about the scalability of the solution?
We have approximately 5,000 machines that are being managed. As time moves on, this number will grow, but we don't expect it to get larger in the near future.
How are customer service and technical support?
I would rate the technical support that we received during the deployment, as well as post-deployment, very well. They were very knowledgeable and gave us all of the tools we needed to have a successful deployment.
Which solution did I use previously and why did I switch?
Prior to Falcon, we were using Symantec antivirus. It was out of date, which is why we replaced it.
How was the initial setup?
It is very easy to deploy the solution's sensor to our endpoints. We use an automated process.
Our deployment took between two and three months, with paperwork, communication, and roll-out timeframes. Our implementation strategy included using IBM's BigFix application to push to Windows machines, and then we used a solution for the Mac to push it out remotely as well.
What about the implementation team?
Our IT Services team deployed this solution, and they leveraged consultants from CrowdStirke to get the proper packages for the process.
I'm sure that there is administration and upgrades to do, as sensors need to be updated or policies need to be adjusted. We have a group of approximately five people who are security engineers, IT Services, and directors who use it.
What's my experience with pricing, setup cost, and licensing?
With respect to pricing, my suggestion to others is to evaluate the environment and purchase what you need.
Which other solutions did I evaluate?
We looked at different options, such as Carbon Black, as we were replacing Symantec as our EDR solution, and CrowdStrike was the top winner. CrowdStrike is always on, 24 hours. Analysis, with the prevention and the detection policies, as well as the USB policies, are all very beneficial. The one thing that CrowdStrike did not have is the on-demand scanner.
What other advice do I have?
My advice for anybody who is interested in implementing CrowdStrike Falcon is to review and evaluate your environment and compare their EDR solutions.
I would rate this solution a ten out of ten.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer:
Chief Information Security Officer at a hospitality company with 5,001-10,000 employees
Stable and easy to set up, and has reduced our need to re-image machines
Pros and Cons
- "The most valuable feature is that we don't need to re-image machines as much as we had to."
- "They need to strengthen the forensic capabilities of this product, for e-discovery."
What is our primary use case?
We have various use cases. We are protecting servers and endpoints that are utilizing this product to focus on advanced, persistent threats, with the goal of reducing the overhead on the endpoint for early detection.
Right now, we have not put enforcement, and we're moving to the next level of detection.
How has it helped my organization?
Using this solution has reduced my need for imaging. We can mitigate the issue and address it immediately, for people both on and off of the network.
What is most valuable?
The most valuable feature is that we don't need to re-image machines as much as we had to.
What needs improvement?
They need to strengthen the forensic capabilities of this product, for e-discovery.
For how long have I used the solution?
We started testing and deploying CrowdStrike Falcon about a year and a half ago, in the early part of 2019.
What do I think about the stability of the solution?
In terms of stability, it's a great tool.
What do I think about the scalability of the solution?
At this time, we have between 5,000 and 6,000 endpoints.
How are customer service and technical support?
We have been in touch with CrowdStrike technical support and they have been very supportive.
Which solution did I use previously and why did I switch?
Prior to CrowdSrike, we used a signature-based solution from Symantec.
How was the initial setup?
The initial setup was very straightforward and very easy. We've been bringing stuff into the SWOT platform and getting that data. It has been pretty good.
What about the implementation team?
The implementation was done in-house. We had, in part, help from a strategic partner, EY.
Which other solutions did I evaluate?
CrowdStrike is what we did for the time and for the moment. It is number two when you look at the magic quadrant, and we have implemented that for the time being. When we selected it, that was right for us to get away from a Symantec signature-based environment for endpoint detection response.
We have moved over to CrowdStrike for now. When you look at the quadrant, the number one is Microsoft. With Defender built into the operating system, there is less overhead on the endpoint. We will eventually, most likely, migrate to that.
I have experience with Cylance, as well. They gave that the advanced persistent threat leader title, at one point in the market. I implemented that for one client and now, being in this CISO role, I went with CrowdStrike over Cyberreason and Cylance/Blackberry. The main reason for CrowdStrike is the Falcon technologies and what they do with their strategy.
We're moving to Office 365, and it will make sense for me to adopt Microsoft Defender because it's integrated into the platform. One of the differences between Defender versus CrowdStrike or any other of them is that they have to sit outside. Microsoft Defender can go deep down into the kernel, and that's a good thing for the endpoint. You can do a lot and detect a lot, which makes it far safer against advanced persistent threats.
What other advice do I have?
Overall, this product has been pretty good and I recommend it.
I would rate this solution a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Dy General Manager at a real estate/law firm with 501-1,000 employees
Great user experience, very little maintenance required, and easy to set up
Pros and Cons
- "There's almost no maintenance required. It's very low if there's any at all."
- "The solution needs to have integration with on-premises security devices and security facilities. That means all the security products, including the perimeter firewall, the DMZ."
What is our primary use case?
The solution is primarily being used at our endpoint, which includes roaming users with laptops. It is being used in all of our servers at our data center. Our security team can monitor everything centrally using the Falcon dashboard. If there is an incident, our team can actually go to the root cause of the incident to try to solve it there.
What is most valuable?
The overall user experience is good. As of today, there have been no incidents that we've had to deal with and we've been using it for years.
The solution has a very good graphical interface. It makes it easy to use. The central monitoring is excellent.
There's almost no maintenance required. It's very low if there's any at all.
The solution is an AI and ML-enabled tool for protecting our endpoints. We're still able to use Symantec as an endpoint as well.
What needs improvement?
The solution needs to have integration with on-premises security devices and security facilities. That means all the security products, including the perimeter firewall, the DMZ.
I'd really like to have a complete solution. Right now most of the incidents happen on our endpoints. It is visible at the endpoint, the end server. If this can have a correlation tool that could actually give us a comprehensive dashboard, that would be useful. It could give us top-down visibility and could be from the firewall or any kind of security protection tool. It could be part of the DNS protection suite. However, that's why it's so important to have better integration capabilities.
If this endpoint is trying to get at this particular website and it is identified as DNS level protection, that also comes to this dashboard. Around 80% to 90% view of whatever it is happening with this endpoint, whatever action it is doing, can be inspected on the dashboard.
If the endpoint is protected by CrowdStrike. I am only to access this application through a CrowdStrike protected device.
For how long have I used the solution?
We have been using CrowdStrike as a tool now for the last three months.
What do I think about the stability of the solution?
The stability may be too early to judge, as we are still in a POC. However, when we see the product, it is very, very stable.
What do I think about the scalability of the solution?
We didn't go with the Basic version. We went with Superior. Even the insurance companies are also sold on this product.
We find that the solution is very, very scalable as a tool and it can completely manage and protect the endpoint. It offers around 99.99% of your protection and assurance and can scale up however much you like.
We have implemented it for approximately 200 users as a POC. We are ready to have a contract with CrowdStrike and we will be implementing it for 700 users in the end, so we will scale it from the POC when we begin to officially use it.
How are customer service and technical support?
Due to the fact that we are still running a POC, we have direct access to the principal on the contract. They have given us a lot of confidence in the product and they are always available alongside the system integrator. We basically have two layers of support.
At this initial stage, if there is any troubleshooting needed, or any type of support is required, the system integrator will provide this to us. If we need to escalate to support for some reason, we have agreed to have CrowdStrike themselves look into any issues.
So far, it's been an effective system and we are satisfied with the level of support we've received.
Which solution did I use previously and why did I switch?
We were using Symantec products, which were Symantec EndPoint Four and Five. We found that the latest modules needed additional tools to protect us. There were multiple tools needed at various levels. There was complexity in increasing users on this platform. It also took a more traditional approach to security, and we were looking for something more advanced that had advanced AI and ML capability.
We evaluated CrowdStrike and we found it satisfactory in our environment. Therefore, we decided to change to it from Symantec.
How was the initial setup?
The initial setup is very, very straightforward, and very easy to use. So far, we've found it very easy to drill down to the root cause.
This is a new area and product for us, so we decided to start using it as a POC. We started in March, or the end of February, of this year, and we have done a POC for some of our users. We'll be going forward with a full implementation and increasing our usage.
In terms of maintenance, I don't find there's much of a requirement for it. It is very easy to maintain. For monitoring and reporting purpose, we have access to a dashboard. Our security can take a look at everything themselves. We also have team members that are capable of configuring this product. That will help us to reduce the requirement of manpower in the long run.
What about the implementation team?
We had a system integrator partner that assisted us with the POC.
What's my experience with pricing, setup cost, and licensing?
I'm not sure what the exact cost of the solution is.
What other advice do I have?
We're a customer. We don't have a business partnership with this solution.
I'm not sure which version of the solution we're using right now. It is the latest, as far as I know. We're currently running a POC with it.
In today's environment, it's very crucial to protect a company from ransomware, and malware. We focus mainly on avoiding these types of attacks. We're always interested in the latest tools that have the latest techniques and are effective in our environment.
On top of that. we've noticed during the pandemic, there are even more threats happening. We need to focus most of our energy on the endpoints which are basically connected to an unprotected network.
The focus on the endpoints has to be increased at this point in time to ensure we have maximum protection. We prefer to have a cloud-based product rather than an on-premise-based product to protect our data and our endpoints. Therefore, we may need to move to a cloud-based protection suite. Other companies should also consider this. Whether they choose a product like CrowdStrike, Cortex, or Cylance is up to them.
I'd rate the solution eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
CTSO at Cyb3r
Provides efficient security posture and has diverse threat intelligence capabilities
Pros and Cons
- "The platform is very scalable."
- "Enhancements in reporting and forensic analysis could benefit the product."
What is our primary use case?
Our primary use case for the product is to enhance our threat intelligence capabilities. We use it to ensure comprehensive security coverage.
How has it helped my organization?
The solution has significantly improved our threat detection capabilities. It has helped us identify and respond to potential threats more effectively, contributing to our security posture. There have been no notable drawbacks; the solution meets our needs and complies with local regulations.
What is most valuable?
The product's most valuable features include its global reach and extensive threat data. Its wide exposure helps gather diverse threat intelligence, crucial for effective security management.
What needs improvement?
Enhancements in reporting and forensic analysis could benefit the product. CrowdStrike could publish detailed threat reports and analyses more consistently than other providers.
For how long have I used the solution?
I have been using CrowdStrike Falcon Threat Intelligence since early 2016.
What do I think about the stability of the solution?
I rate the platform's stability an eight.
What do I think about the scalability of the solution?
The platform is very scalable. It can effectively accommodate growing security needs, which is crucial for organizations with evolving threat landscapes.
How are customer service and support?
Customer service and support vary based on the level of service. Premium support is excellent, but standard support can be less responsive.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We previously used a different solution. We switched to CrowdStrike due to its comprehensive threat intelligence capabilities and global reach, which we found to be more effective for our needs.
How was the initial setup?
The initial setup was straightforward, with the installation taking less than two hours. However, fine-tuning alerts and configuring rules required additional time and effort.
What about the implementation team?
The implementation was carried out in-house.
What was our ROI?
The product has helped us detect threats that might have gone unnoticed, contributing to overall security.
What's my experience with pricing, setup cost, and licensing?
The product is expensive.
Which other solutions did I evaluate?
We evaluated several other options before choosing CrowdStrike. Our decision was based on the product's effectiveness and ability to meet our security requirements.
What other advice do I have?
Overall, it is a robust solution that meets our security needs. However, potential users should know the cost implications and ensure the product meets their requirements.
I rate it an eight.
Disclosure: My company has a business relationship with this vendor other than being a customer.
Excellent capabilities, with a real advantage over the competition, and straightforward customer service
Pros and Cons
- "The features I like the most are the response time and the dashboard are both excellent."
- "I would like to see a more accurate integration and an option to check the local machine."
What is our primary use case?
Our primary use case is EDR and ransomware.
What is most valuable?
The features I like the most are the response time and the dashboard are both excellent.
What needs improvement?
I would like to see a more accurate integration and an option to check the local machine.
For how long have I used the solution?
I have been using CrowdStrike Falcon for more than two years.
What do I think about the stability of the solution?
The stability is around ninety-eight percent. The other two percent deals directly with the node being unable to detect as normal.
What do I think about the scalability of the solution?
There is scalability but this is not our focus.
How are customer service and support?
We have not had any issues with technical support. Much of what we use is online documentation.
Which solution did I use previously and why did I switch?
We have used Microsoft Defender for Endpoint, SentinelOne, Carbon Black, and Trend Micro. The observation we have made is the accuracy and detection of CrowdStrike Falcon is excellent.
How was the initial setup?
The initial setup is very straightforward given you have set your file control and detection levels correctly.
What's my experience with pricing, setup cost, and licensing?
The cost is usually a challenge in the industry. I think we pay around sixty-eight dollars.
What other advice do I have?
I would rate CrowdStrike Falcon an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Infrastructure Manager at Quaracrm
A great solution for blocking any malicious activity with robust features
Pros and Cons
- "All the features are beneficial."
- "They should provide us with good visibility for everything."
What is our primary use case?
We use it to monitor everything related to the activity and to block any malicious activity. We are new in the security field in our company.
What is most valuable?
All the features are beneficial.
What needs improvement?
They should provide us with good visibility for everything.
For how long have I used the solution?
We have been using this solution for two years, and it is deployed on cloud. We are also using the latest version.
What do I think about the stability of the solution?
The stability is amazing, and we don't have any issues.
What do I think about the scalability of the solution?
It is scalable. We have 700 users, and we plan to increase the usage. We only need about three technical staff for deployment and maintenance, a senior systems engineer and two infrastructure managers.
How are customer service and support?
We've used technical support, and I rate them a ten out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
The setup was straightforward, and it took one month to enable the policy and use cases. We completed it in-house.
What's my experience with pricing, setup cost, and licensing?
It has an annual license, and it is not that expensive.
Which other solutions did I evaluate?
We evaluated Trend Micro before moving forward with CrowdStrike Falcon.
What other advice do I have?
I rate this solution a ten out of ten. Regarding advice, it is important to learn about CrowdStrike Falcon's capabilities and features. It would be easier to use if they gave that understanding.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free CrowdStrike Falcon Report and get advice and tips from experienced pros
sharing their opinions.
Updated: August 2025
Product Categories
Extended Detection and Response (XDR) Security Information and Event Management (SIEM) Endpoint Protection Platform (EPP) Threat Intelligence Platforms Endpoint Detection and Response (EDR) Attack Surface Management (ASM) Identity Threat Detection and Response (ITDR) AI-Powered Cybersecurity PlatformsPopular Comparisons
Microsoft Defender for Endpoint
Fortinet FortiEDR
Splunk Enterprise Security
Microsoft Sentinel
Darktrace
SentinelOne Singularity Complete
Microsoft Defender XDR
IBM Security QRadar
Cortex XDR by Palo Alto Networks
HP Wolf Security
Fortinet FortiClient
Elastic Security
WatchGuard Firebox
Trellix Endpoint Security Platform
Buyer's Guide
Download our free CrowdStrike Falcon Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- I would like to compare CrowdStrike and Carbon Black. On what basis should I decide?
- What is the biggest difference between Carbon Black CB Defense, CrowdStrike, and SentinelOne?
- What do you recommend to choose when replacing Symantec EDR: SentinelOne or CrowdStirke Falcon?
- What is the biggest difference between CrowdStrike and Cylance?
- CrowdStrike Falcon vs Microsoft Defender ATP: Comparison of features and performance
- Is Crowdstrike Falcon better than Trend Micro Deep Security?
- What are the pros and cons of Darktrace vs CrowdStrike Falcon vs alternative EPP solutions?
- Which solution do you prefer: CrowdStrike Falcon or SentinelOne Singularity Complete?
- How does Microsoft Defender for Endpoint compare with Crowdstrike Falcon?
- How does Crowdstrike Falcon compare with FireEye Endpoint Security?