Try our new research platform with insights from 80,000+ expert users
Business Development Manager - Security at a computer software company with 201-500 employees
Real User
Intelligent and easy to use endpoint protection and threat identification solution
Pros and Cons
  • "Easy to use, intelligent, and stable threat detection software."
  • "The installation process for this software needs to be simplified."

What is our primary use case?

CrowdStrike Falcon is used for endpoint protection for businesses. It's used for identifying threats.

What is most valuable?

Most of the entry-level security provisions are based on identification, but CrowdStrike Falcon is a market changer because it does not need any kind of signature to identify or update threats.

All organizations face the big challenge of maintaining and updating their security processes. They need to do the update, but then it doesn't go beyond 90%, so CrowdStrike Falcon moved away from the update requirement, so there won't be a need to upgrade for certain types of technology, or for new technology. Not needing to update means the job of maintaining the updates will be taken off the plate of the IT department, which could mean big relief for the customers.

CrowdStrike Falcon is able to identify threats based on processes, rather than looking at signatures and this is what I like about this solution.

I like that it's easy to use, as expected from any cloud solution. CrowdStrike Falcon is an intelligent solution. It's as good as the top solution in the market.

We haven't seen anybody complaining about CrowdStrike Falcon, and we haven't had any customer using this solution who had been attacked by ransomware, so this is proof of how good this solution is.

What needs improvement?

Setting up and installing CrowdStrike Falcon is not easy, so an area for improvement is for that process to be simplified.

For how long have I used the solution?

We've been using CrowdStrike Falcon for two years.

Buyer's Guide
CrowdStrike Falcon
October 2025
Learn what your peers think about CrowdStrike Falcon. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
869,785 professionals have used our research since 2012.

What do I think about the stability of the solution?

I find CrowdStrike Falcon a stable solution.

How was the initial setup?

Installing this solution was not easy. One challenge from the installation is that you always have to replace something, e.g. your Crowdstrike password, macros, etc., before you're able to complete the setup.

What other advice do I have?

We are not carrying CrowdStrike Falcon Complete because it's a managed service, so customers have not really gotten to that level. What we're working with is CrowdStrike Falcon.

Deployment of this solution took us three to five days. We have 2,000 users of CrowdStrike Falcon, and we have 110 different locations across India and some other parts of the world. We have people who manage this solution, but it doesn't require much managing, because the only challenge is removing the old solution, then replacing it with the new one.

I'm recommending CrowdStrike Falcon to other people who are looking into using it, because it's a good solution.

I'm rating CrowdStrike Falcon an eight out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
reviewer1078392 - PeerSpot reviewer
Security Systems Analyst at a retailer with 5,001-10,000 employees
Real User
Allows us to sleep better at night
Pros and Cons
  • "I value the overall behavior analysis of CrowdStrike. The engine of this product is what drew us to this solution."
  • "I would also like to see the endpoint firewall component produce some level of logging and feedback."

What is our primary use case?

CrowdStrike is a malware protection solution that is deployed on a private cloud across all areas of our organization. We have deployed the solution to 10,000 users. Roles-based it's the security team. 

We recently upgraded to a new feature that is set to roll out. CrowdStrike is a requirement, it's our standard. If you have a new OS deployed or a new server deployed, this is a required component. It has been automated as we grow and as we add more systems.

How has it helped my organization?

CrowdStrike allows us to sleep better at night.

What is most valuable?

I value the overall behavior analysis of CrowdStrike. The engine of this product is what drew us to this solution.

What needs improvement?

This solution lacks basic functionality, such as being able to perform on-demand scanning. This presents a challenge when it comes to the payment card industry, PCI which has that as built-in requirements for the PCI DSS standard.

I would also like to see the endpoint firewall component produce some level of logging and feedback. 

For how long have I used the solution?

I have been using CrowdStrike Falcon for three years.

What do I think about the stability of the solution?

CrowdStrike is very stable, we've had very few technical issues. The false positive rate is average. It has been very easy to manage and to determine where issues are.

What do I think about the scalability of the solution?

This solution is very scalable. It is easy to roll out more agents and is fairly automated. We have it deployed in multiple environments such as hybrid versus cloud versus private. 

How are customer service and support?

We have had very positive interactions with not only our manage service provider, but the vendor directly. They've offered good support when we've had some questions and concerns. Their documentation is fairly extensive.

Which solution did I use previously and why did I switch?

We follow trends to make sure we have the best product for our organizations. The one we were using fell behind a bit. We wanted something that was completely cloud-based so that the infrastructure wasn't on-prem and we wouldn't be required to manage the upgrades of servers and applications. 

How was the initial setup?

The initial setup was moderate. There is a lot to think about and a lot to plan out, however once that is done the actual deployment is straightforward. We used a tiered deployment, deploying the product in a learning mode or logging mode only. We also did a tiered deployment by division and then enabled features by division to make sure that if there was an impact, we could at least contain it to one area and revert back as quickly as possible.

What about the implementation team?

We deployed with an integrator. They were very knowledgeable and knew what they were doing. They involved the vendor when required. We use half of an FTE to maintain the solution. We also have a managed service provided that also integrated the log files from this product into our SIM. We are pointing all the logs to a log reporting utility that allows us to react to alerts. 

What was our ROI?

Because we are information security, we come with a price tag, unfortunately. When we look at it as a whole, we are able to sleep at night, we have a good solution and it is protecting us from the zero-days and the latest malware. I don't know what you put the cost of breach prevention at.  We feel we are using a product that is at the top of the industry. We are doing as much as we can to protect our organization, so there is the return on investment that way.

What's my experience with pricing, setup cost, and licensing?

We pay yearly for the solution. It makes it easier for budgeting purposes. We did incur additional costs when we implemented their firewall solution, calling it the endpoint firewall. 

Which other solutions did I evaluate?

We're constantly looking for other options the industry's top solutions and where the industry is going next. In cybersecurity, we ensure we are protected today but also make sure that we are thinking towards the future and analyzing other solutions to see if they are better, or potentially better in the future.

What other advice do I have?

If you are looking at CrowdStrike, plan appropriately. Make sure you have planned it out and do your testing. We found that it was legacy-friendly. We have a lot of legacy applications and we were concerned about that. We ran into some minor issues but we did find that it was friendly, however, there were some newer applications that the product did not interact with as well as we expected. They were easy fixes, but you should do your due diligence so you run into fewer surprises.

I would rate CrowdStrike a 9 out of 10.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
CrowdStrike Falcon
October 2025
Learn what your peers think about CrowdStrike Falcon. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
869,785 professionals have used our research since 2012.
reviewer1055580 - PeerSpot reviewer
President and CEO at a tech services company with 51-200 employees
Real User
Straightforward to set up with excellent detection and response capabilities
Pros and Cons
  • "Scalability hasn't been an issue for us."
  • "The price is too high."

What is our primary use case?

We primarily use the solution for our Windows and Macs.

What is most valuable?

The detection and response have been excellent overall. We've had no ransomware attacks. 

We found the initial setup to be straightforward. 

The solution is stable. 

Scalability hasn't been an issue for us.

What needs improvement?

The price is too high.

For how long have I used the solution?

I've been using the solution for three years now. 

What do I think about the stability of the solution?

The stability has been fantastic. We have never had an outage. There are no bugs or glitches. The performance is great.

What do I think about the scalability of the solution?

As we are a smaller organization, scalability hasn't been an issue. It's been very good so far. 

We have about 120 users and they include technical people, salespeople, project managers, and developers.

This solution is being widely used in our organization as it is mandatory. All of our users need to have it. 

How are customer service and support?

The product works really well. We very rarely had to reach out to technical support. When we reached out to them, they've been pretty good.

Which solution did I use previously and why did I switch?

We were in the old McAfee EPO and with all the ransomware and all that stuff hitting us, we found that McAfee wasn't really cutting it. That's why we switched.

How was the initial setup?

The initial setup is simple. It's not overly complex or difficult. 

For us, the deployment took a couple of weeks and we were good to go.

You need very few staff members for deployment and maintenance. 

What about the implementation team?

We did not use an integrator, consultant, or reseller to help us with the implementation. We were able to handle it ourselves.

What was our ROI?

There's not really an ROI. The ROI is that we haven't been hit by ransomware.

What's my experience with pricing, setup cost, and licensing?

The product is quite expensive. It's higher than the competition in general in terms of cost. 

We pay a yearly licensing fee.

They also offer what they call the Falcon Complete, which was a complete managed service, which we chose not to go with. We measured it ourselves.

Which other solutions did I evaluate?

We looked at Carbon Black, Cybereason, and Microsoft Defender ATP. We chose CrowdStrike, as it's always easy to use. It was the most mature product as well. We liked what Gartner had to say about CrowdStrike.

What other advice do I have?

We're a managed security services provider.

I can't speak to the exact version of the solution we're using at this time. 

I would advise users to just follow the advice of CrowdStrike. They have some very good manuals and YouTube videos and stuff of that. It's a complex piece of software, however, you need to work very well and make sure your implementation is correct.

I'd rate the solution at a ten out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer928773 - PeerSpot reviewer
Head of IT Department at a pharma/biotech company with 10,001+ employees
Real User
Effective cyber attack prevention, light on resource, and great user expereince
Pros and Cons
  • "The most valuable feature is the machine learning that they use to check certain patterns in the endpoint devices. It checks the whole ecosystem or entire environment."

    What is our primary use case?

    CrowdStrike Falcon is leading the market in EDR. They are the first that to have this kind of solution against malware. They have an advantage in respect to the rest of the competitors. They offer a certain amount to protect in case of malware or cyber-attacks. They have a policy or insurance connected to the service. That's the reason why we choose CrowdStrike over other solutions.

    What is most valuable?

    The most valuable feature is the machine learning that they use to check certain patterns in the endpoint devices. It checks the whole ecosystem or entire environment.

    I am very happy with CrowdStrike Falcon because it does not use a lot of resources in the endpoint, it's a lightweight solution. It provides good protection and it is very effective. Additionally, it is easy to integrate, has great features, good capabilities, and the users have a positive experience.

    For how long have I used the solution?

    I have been using CrowdStrike Falcon for approximately one year.

    What do I think about the stability of the solution?

    CrowdStrike Falcon is stable.

    What do I think about the scalability of the solution?

    I have found CrowdStrike Falcon to be scalable.

    How are customer service and support?

    I have not needed to use technical support.

    What's my experience with pricing, setup cost, and licensing?

    The cost of CrowdStrike Falcon could be reduced. It is quite expensive if you compare it to other solutions, such as Blue Coat, Symantec, McAfee, or Kaspersky.

    What other advice do I have?

    My advice to those wanting to use CrowdStrike Falcon is to try it out to see if it works well in their environment. I consider CrowdStrike Falcon is a very accurate solution. They are confident about the capabilities of their solutions because they offer money or payback if there is a high-impact cyber incident or cyberattack while using the solution.

    They need to have special consideration about the different plans and budgets that they need to get the solution that they want.

    I rate CrowdStrike Falcon a ten out of ten.

    Which deployment model are you using for this solution?

    Public Cloud
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    it_user1424862 - PeerSpot reviewer
    Cyber Security Engineer at a legal firm with 501-1,000 employees
    Real User
    The cloud-based management console is easy to maintain and takes a load off our hands
    Pros and Cons
    • "It has definitely minimized resources. When everything was on-prem, there was a lot more work maintaining it. One of the big value tickets: I don't have lists of hundreds of exceptions for certain applications that I have to maintain, add, delete, and move. The very nature of the product has lessened my workload considerably."
    • "There are some aspects of the UI that could use some improvement, e.g., working in groups. I build a group, then I have to manually assign prevention policies, update policies, etc., but there is no function to copy that group. So, if I wanted to make a subgroup for troubleshooting or divide workstations into groups of laptops and desktops, then I have to manually build a brand new group. I can't just copy a build from one to another. Additionally, in order to do any work within a group, I have to first do the work on the respective prevention policy page or individual policy page, then remove the group if the group is assigned to a different prevention policy, remove the prevention policy, and then add the new one in. So, it can get a little hectic. It would be easier if I could add and remove things from the group page rather than having to go into the policy pages to do it."

    What is our primary use case?

    We are using it primarily for NGAV, but we also use their EDR product and Falcon OverWatch.

    Most of our internal stuff is still on-prem. We do use SaaS for vendor products, but our internal environment is still mostly on-prem.

    How has it helped my organization?

    I think everyone is trying to move away from on-prem solutions. Having the cloud-based management console makes it a lot easier to maintain. It takes a load off our hands as engineers and analysts. It helps with upgrades and patching, I don't have to worry about on-prem servers for maintenance, but also as another thing to defend against, so getting rid of that is definitely beneficial.

    As a cloud-native solution, it provides us with flexibility and always-on protection. I don't have to worry about data center failures on my end. I don't have to worry about any issues in our server rooms affecting the protection of the environment as a whole. Having CrowdStrike take that responsibility is a load off our backs.

    Falcon has been very successful in preventing breaches. In the beginning, there were a lot of false positives as Falcon learned our environment, but I would definitely give it a positive rating overall for protecting our environment.

    What is most valuable?

    The NGAV portion is the most valuable feature. The primary reason that we went with the product was their reputation. In practice, it has been a definite step up from where we were previously.

    We are using Falcon Investigate, which is their EDR tool. The EDR has made it infinitely easier to investigate into more detail on end user workstations and servers. Any sort of detection where I can go back into the EDR tool and dig down deeper into the endpoint is great. This was a function that we did not have previously.

    What needs improvement?

    There are some aspects of the UI that could use some improvement, e.g., working in groups. I build a group, then I have to manually assign prevention policies, update policies, etc., but there is no function to copy that group. So, if I wanted to make a subgroup for troubleshooting or divide workstations into groups of laptops and desktops, then I have to manually build a brand new group. I can't just copy a build from one to another. Additionally, in order to do any work within a group, I have to first do the work on the respective prevention policy page or individual policy page, then remove the group if the group is assigned to a different prevention policy, remove the prevention policy, and then add the new one in. So, it can get a little hectic. It would be easier if I could add and remove things from the group page rather than having to go into the policy pages to do it.

    For how long have I used the solution?

    I have been using it less than a year. We are relatively new customers.

    What do I think about the stability of the solution?

    My impressions of the stability are positive. I haven't had any problems since implementation with stability or availability.

    Minimal maintenance is required on our side post-deployment, but it still does require maintenance. If I have to build out new groups or a troubleshooting group, e.g., tweaking policies if machines change subnets, then there is still maintenance required.

    All post-implementation maintenance and administration is handled by a single security engineer.

    What do I think about the scalability of the solution?

    We are a relatively small firm, but I have had no problems in my deployment plans. I could easily see this scaling upwards.

    In total, we are protecting roughly 1500 endpoints.

    How are customer service and technical support?

    They have been very on point and helpful. I have never had to ask them where they are. They are always following up with me trying to keep the tickets live, so that is great. I have been very impressed.

    Which solution did I use previously and why did I switch?

    We replaced Symantec Endpoint Protection. On the one hand, we wanted a fully NGAV. Symantec was still using a hybrid model, a mix of signature-based and behavioral-based detections, so moving over into a full NGAV product was important to us. We wanted to stay up to date on the ever changing nature of malware, especially since we have been seeing more malware nowadays that can evade strictly detection-based systems. Also, Symantec support was very hard to track down or talk to. All in all, CrowdStrike has been more responsive to any questions or concerns, which is big when you are dealing with vendor solutions.

    Fortunately, we have not experienced any major detections. However, testing-wise, CrowdStrike has been more effective overall.

    How was the initial setup?

    Deployment was pretty easy. We scripted out a process in GPO, then we were able to deploy it fairly seamlessly.

    We managed to deploy it to all our servers within a week or two. That was mostly due to getting clearance from server owners, not due to the CrowdStrike installation. Then, for the workstations, it was a bit longer just because of office locations and when people had their computers on. The CrowdStrike process was very smooth. It was really just the bureaucracy part that took a while.

    We had to change management protocols. We put it out to dev servers and workstations in detect-only mode as we deployed CrowdStrike to endpoints that had a preexisting AV system still on them, in order to avoid any time where a system would not be protected by an antivirus system. So, we deployed CrowdStrike, then disabled the previous antivirus system and activated CrowdStrike's prevention policies, then uninstalled the previous antivirus system.

    What about the implementation team?

    Four or five people were involved in the deployment: a security engineer, two workstation engineers, and various server owners.

    What was our ROI?

    It is protecting our environment, so it is worth the cost.

    It has definitely minimized resources. When everything was on-prem, there was a lot more work maintaining it. One of the big value tickets: I don't have lists of hundreds of exceptions for certain applications that I have to maintain, add, delete, and move. The very nature of the product has lessened my workload considerably.

    What's my experience with pricing, setup cost, and licensing?

    The pricing was very fair for what we got.

    Different components are additional price points. We got the components that were right for us, but other organizations may require more (or less) components to suit their needs.

    Which other solutions did I evaluate?

    CrowdStrike is an industry leader. When we were looking for a replacement technology for NGAV, their name was on the top of a Google search.

    We did a PoC with CrowdStrike. We deployed the PoC only to a select group of test machines, so we were able to deploy rather quickly. The PoC helped immensely in the decision-making process.

    We did evaluate Cylance and Carbon Black. All the products that we investigated looked good. In the end, we went with CrowdStrike because of: 

    1. The reputation of the organization in the AV community.
    2. Its out-of-the-box readiness. 
    3. Ease of maintenance and administration.

    What other advice do I have?

    Take the time you need in the beginning to fully build out all the groups and prevention policies that you will need. It may take a bit longer during the initial setup, but it is worth it in the long run because it makes maintenance down the line much easier than having to build new groups or prevention policies as they come up. Definitely take the time needed in the beginning. Then, later down the road all you have to do is check some boxes, as opposed to building out brand new groups and prevention policies, which can take awhile.

    In the beginning, there will be a bunch of false positives as it learns your environment. However, those are very easily handled within the UI, creating IOA or machine learning exceptions. With our previous solution, we had a couple hundred exceptions, and with CrowdStrike, we have six or so.

    CrowdStrike has fulfilled its function very well. We got it specifically to serve the purpose that it is serving.

    It is a solid nine out of 10.

    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
    PeerSpot user
    it_user1539093 - PeerSpot reviewer
    Information Security, Sr. Analyst at a wholesaler/distributor with 10,001+ employees
    Real User
    Good support, activity dashboard provides a holistic view from a security standpoint
    Pros and Cons
    • "The most valuable feature is the activity dashboard because it gives you a holistic view of your environment from a security standpoint."
    • "We would like to be able to perform on-demand scanning, rather than relying on the scheduler."

    What is our primary use case?

    We use CrowdStrike Falcon as our EDR solution, including antivirus.

    How has it helped my organization?

    As Symantec ended its endpoint protection, we were able to roll out CrowdStrike.

    It is important to us that CrowdStrike is cloud-based because the way I understand it, that's their main engine for their next-gen EDR solution. The fact that it's cloud-native, flexible, and offers always-on protection is important because we want to have 24-hour monitoring of our environment. It is important to us that we don't have to worry about upgrades.

    This product has worked flawlessly to prevent breaches, and then it has allowed us to prevent any downtime.

    It has minimized our footprint because having the ability to implement the prevention policies has allowed us to focus on other projects. The prevention policies are working for us.

    What is most valuable?

    The most valuable feature is the activity dashboard because it gives you a holistic view of your environment from a security standpoint.

    What needs improvement?

    We would like to be able to perform on-demand scanning, rather than relying on the scheduler. Right now, CrowdStrike does not have an on-demand scanner. They have the always-on, but we have found instances where artifacts are being blocked from running, but they're not being removed. With an on-demand scanner, we would have the ability to remove those artifacts from an end user's machine.

    I would like to see the multi-site environment functionality added in the next release. Currently, we are working under a single-site environment, and on the roadmap, they mentioned having the ability to have a multi-site environment.

    For how long have I used the solution?

    We have been using CrowdStrike Falcon for approximately eight months.

    What do I think about the stability of the solution?

    Stability-wise, they are very advanced in the next-gen antivirus game. CrowdStrike Falcon is always available.

    What do I think about the scalability of the solution?

    We have approximately 5,000 machines that are being managed. As time moves on, this number will grow, but we don't expect it to get larger in the near future.

    How are customer service and technical support?

    I would rate the technical support that we received during the deployment, as well as post-deployment, very well. They were very knowledgeable and gave us all of the tools we needed to have a successful deployment.

    Which solution did I use previously and why did I switch?

    Prior to Falcon, we were using Symantec antivirus. It was out of date, which is why we replaced it.

    How was the initial setup?

    It is very easy to deploy the solution's sensor to our endpoints. We use an automated process. 

    Our deployment took between two and three months, with paperwork, communication, and roll-out timeframes. Our implementation strategy included using IBM's BigFix application to push to Windows machines, and then we used a solution for the Mac to push it out remotely as well.

    What about the implementation team?

    Our IT Services team deployed this solution, and they leveraged consultants from CrowdStirke to get the proper packages for the process.

    I'm sure that there is administration and upgrades to do, as sensors need to be updated or policies need to be adjusted. We have a group of approximately five people who are security engineers, IT Services, and directors who use it.

    What's my experience with pricing, setup cost, and licensing?

    With respect to pricing, my suggestion to others is to evaluate the environment and purchase what you need.

    Which other solutions did I evaluate?

    We looked at different options, such as Carbon Black, as we were replacing Symantec as our EDR solution, and CrowdStrike was the top winner. CrowdStrike is always on, 24 hours. Analysis, with the prevention and the detection policies, as well as the USB policies, are all very beneficial. The one thing that CrowdStrike did not have is the on-demand scanner.

    What other advice do I have?

    My advice for anybody who is interested in implementing CrowdStrike Falcon is to review and evaluate your environment and compare their EDR solutions.

    I would rate this solution a ten out of ten.

    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer:
    PeerSpot user
    reviewer1078449 - PeerSpot reviewer
    Chief Information Security Officer at a hospitality company with 5,001-10,000 employees
    Real User
    Stable and easy to set up, and has reduced our need to re-image machines
    Pros and Cons
    • "The most valuable feature is that we don't need to re-image machines as much as we had to."
    • "They need to strengthen the forensic capabilities of this product, for e-discovery."

    What is our primary use case?

    We have various use cases. We are protecting servers and endpoints that are utilizing this product to focus on advanced, persistent threats, with the goal of reducing the overhead on the endpoint for early detection.

    Right now, we have not put enforcement, and we're moving to the next level of detection.

    How has it helped my organization?

    Using this solution has reduced my need for imaging. We can mitigate the issue and address it immediately, for people both on and off of the network.

    What is most valuable?

    The most valuable feature is that we don't need to re-image machines as much as we had to.

    What needs improvement?

    They need to strengthen the forensic capabilities of this product, for e-discovery.

    For how long have I used the solution?

    We started testing and deploying CrowdStrike Falcon about a year and a half ago, in the early part of 2019.

    What do I think about the stability of the solution?

    In terms of stability, it's a great tool.

    What do I think about the scalability of the solution?

    At this time, we have between 5,000 and 6,000 endpoints.

    How are customer service and technical support?

    We have been in touch with CrowdStrike technical support and they have been very supportive.

    Which solution did I use previously and why did I switch?

    Prior to CrowdSrike, we used a signature-based solution from Symantec.

    How was the initial setup?

    The initial setup was very straightforward and very easy. We've been bringing stuff into the SWOT platform and getting that data. It has been pretty good.

    What about the implementation team?

    The implementation was done in-house. We had, in part, help from a strategic partner, EY.

    Which other solutions did I evaluate?

    CrowdStrike is what we did for the time and for the moment. It is number two when you look at the magic quadrant, and we have implemented that for the time being. When we selected it, that was right for us to get away from a Symantec signature-based environment for endpoint detection response.

    We have moved over to CrowdStrike for now. When you look at the quadrant, the number one is Microsoft. With Defender built into the operating system, there is less overhead on the endpoint. We will eventually, most likely, migrate to that.

    I have experience with Cylance, as well. They gave that the advanced persistent threat leader title, at one point in the market. I implemented that for one client and now, being in this CISO role, I went with CrowdStrike over Cyberreason and Cylance/Blackberry. The main reason for CrowdStrike is the Falcon technologies and what they do with their strategy.

    We're moving to Office 365, and it will make sense for me to adopt Microsoft Defender because it's integrated into the platform. One of the differences between Defender versus CrowdStrike or any other of them is that they have to sit outside. Microsoft Defender can go deep down into the kernel, and that's a good thing for the endpoint. You can do a lot and detect a lot, which makes it far safer against advanced persistent threats.

    What other advice do I have?

    Overall, this product has been pretty good and I recommend it.

    I would rate this solution a nine out of ten.

    Which deployment model are you using for this solution?

    Public Cloud
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Mahmoud_Yassin - PeerSpot reviewer
    CTSO at Cyb3r
    Real User
    Top 5Leaderboard
    Provides efficient security posture and has diverse threat intelligence capabilities
    Pros and Cons
    • "The platform is very scalable."
    • "Enhancements in reporting and forensic analysis could benefit the product."

    What is our primary use case?

    Our primary use case for the product is to enhance our threat intelligence capabilities. We use it to ensure comprehensive security coverage.

    How has it helped my organization?

    The solution has significantly improved our threat detection capabilities. It has helped us identify and respond to potential threats more effectively, contributing to our security posture. There have been no notable drawbacks; the solution meets our needs and complies with local regulations.

    What is most valuable?

    The product's most valuable features include its global reach and extensive threat data. Its wide exposure helps gather diverse threat intelligence, crucial for effective security management.

    What needs improvement?

    Enhancements in reporting and forensic analysis could benefit the product. CrowdStrike could publish detailed threat reports and analyses more consistently than other providers.

    For how long have I used the solution?

    I have been using CrowdStrike Falcon Threat Intelligence since early 2016.

    What do I think about the stability of the solution?

    I rate the platform's stability an eight. 

    What do I think about the scalability of the solution?

    The platform is very scalable. It can effectively accommodate growing security needs, which is crucial for organizations with evolving threat landscapes.

    How are customer service and support?

    Customer service and support vary based on the level of service. Premium support is excellent, but standard support can be less responsive.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    We previously used a different solution. We switched to CrowdStrike due to its comprehensive threat intelligence capabilities and global reach, which we found to be more effective for our needs.

    How was the initial setup?

    The initial setup was straightforward, with the installation taking less than two hours. However, fine-tuning alerts and configuring rules required additional time and effort.

    What about the implementation team?

    The implementation was carried out in-house.

    What was our ROI?

    The product has helped us detect threats that might have gone unnoticed, contributing to overall security.

    What's my experience with pricing, setup cost, and licensing?

    The product is expensive. 

    Which other solutions did I evaluate?

    We evaluated several other options before choosing CrowdStrike. Our decision was based on the product's effectiveness and ability to meet our security requirements.

    What other advice do I have?

    Overall, it is a robust solution that meets our security needs. However, potential users should know the cost implications and ensure the product meets their requirements.

    I rate it an eight. 

    Disclosure: My company has a business relationship with this vendor other than being a customer.
    PeerSpot user
    Buyer's Guide
    Download our free CrowdStrike Falcon Report and get advice and tips from experienced pros sharing their opinions.
    Updated: October 2025
    Buyer's Guide
    Download our free CrowdStrike Falcon Report and get advice and tips from experienced pros sharing their opinions.