It blocks all the stuff bad actors are trying to do to our users.
All our end user systems and servers are on-prem and cloud workstations desktops everywhere.
We are using the latest version minus one release (N-1).
It blocks all the stuff bad actors are trying to do to our users.
All our end user systems and servers are on-prem and cloud workstations desktops everywhere.
We are using the latest version minus one release (N-1).
It provided us visibility into our endpoints that we did not have before. The telemetry and data that it collects allows us to respond to possible incidents much faster, containing the host as well as jump on the host for remediation.
CrowdStrike Falcon has done an excellent job at detecting breaches. It has allowed us to stay in business and kept our systems up.
CrowdStrike endpoint detection and response (EDR) is excellent. It blocks the bad stuff without user interaction, allowing us to stay in business. For example, one of our service providers has been down for five days now with ransomware. Also, four of our partners have been down over the past two months with cyberattacks, and we can't do business with our partners.
CrowdStrike Suites and the way that it bundles things can be a bit challenging. It should be easier to integrate with the other stuff that they sell or be included with what they sell. We have one piece, then they are talking about another piece on vulnerability management all of the sudden, and we don't own that piece. We can see it in the console, but nothing shows up. It simply appears within the tool as an option, but we can't use it without purchasing it.
I have been using it for a little over three years.
The stability is very stable. There have been no issues.
We have automated all our CrowdStrike Falcon updates.
It is very scalable. There have been no issues at all.
CrowdStrike's technical support is excellent:
I was a McAfee customer for 20 years before switching. It was like night and day, where McAfee is old technology, and CrowdStrike Falcon is new technology. On a scale of one to 10, McAfee is at one and CrowdStrike Falcon is at 10. There is a really big difference.
We came from an on-premises solution. With more people working remotely, that became an issue. The fact that this is a cloud-native solution provides us with flexibility and always-on protection.
It was very easy to deploy the solution’s single sensor. We used our deployment tools to push it out. Because it is a single agent, it is very lightweight, easy to install, and updates itself. We came from a competitor who had multiple agents, upgrades, and DAT files, where you could have very few of these with 100 percent working. However, since there were six different modules, they all had to be kept updated, which was a nightmare.
This solution was a simple, easy push. Once it is on there, it updates automatically and we don't have any issues.
For deployment, we use a tool called Quest KACE. We also use SCCM.
We did about 10,000 hosts in around two months. We have had growth through acquisition. Now, we have 12,000 hosts.
We did it ourselves.
For the deployment, there was one FTE (a Level 2 PC technician) for eight weeks. For maintenance, it is pretty much set and forget it. There is very minimal maintenance and zero dedicated staff.
We bought a very small number of licenses, then ran it for a year. We bought a 100 licenses for a year, so we didn't actually do a proof of concept. We just bought them. Then, the next year, we bought 10,000 licenses.
We received a quote three years ago, and it was almost seven figures. CrowdStrike got money from investors to displace competitors, like Symantec and McAfee. Then, our quote was very low, which is why we were able to do this. The first year, the quote was almost a million dollars. The second year, it was a little over $100,000.
We also evaluated Cylance and Carbon Black. We went with CrowdStrike Falcon because of the single agent and price. The other solutions required multiple agents, and I did not like that at all.
Compared to the other solutions that we evaluated, CrowdStrike Falcon has a similar ease of use.
We are a very happy CrowdStrike Falcon customer. I highly recommended it. It works.
I would rate this solution as 10 out of 10.
We use this solution for threat protection and endpoint security.
Recently, we added on CrowdStrike OverWatch and Insightsoftware for better reporting. OverWatch monitors East-West issues that CrowdStrike Protect doesn't see. New next-generation endpoint security doesn't scan your PC. It doesn't scan files nightly. People have to get past that, it's so old school.
I have 50 end-users, one hundred endpoints, and workers of all types, both in-house and remote workers.
With the addition of Overwatch and the Insight tool, the reporting has gotten better and I've gained some quality insight that helps me remedy compliance issues and maintain security posture; however, in a year and a half, we haven't had an actual positive detection across a hundred endpoints. The reason for that is mostly due to our employee training and the way that our complete security stack is configured. I hope that the way that I've got it configured right now is the sole reason that we literally aren't letting things in.
If the solution sees some issues, it reports them. Even though they're false positives, in a different scenario, what it's reporting could be a threat. Usually, they're just executables that were downloaded and installed by me. That's to be fully expected and maybe they came from a vendor, but it wasn't signed.
It's given me a level of confidence that my network is secure — the fact that it's not finding anything; however, I am not experiencing the issues that competitors are saying I should be experiencing. I literally have to test it manually to know it's working.
Falcon Protect looks at processes and issues in real-time.
CrowdStrike Falcon by itself does not supply in-depth reporting.
Falcon Protect does what it does. It's endpoint security — nothing more, nothing less.
What it does, It does well. However, if you need more information on what it found and how it got there (including board reporting and compliance reporting), that's not there. Some of the other solutions that are available give you that, right out of the box.
I have been using CrowdStrike Falcon for the past year and a half.
We haven't experienced any issues regarding the stability of CrowdStrike Falcon.
CrowdStrike Falcon is scalable. I've only got one hundred endpoints and I know companies that are hundreds of times bigger who use it.
Trying to get somebody on the phone might not always be the easiest thing, but they usually respond in a fairly timely manner. I haven't had any issues where I've needed them to immediately fix things.
On a scale from one to ten, I would give their customer support a rating of nine.
We had a Vipre solution, but it was an On-Prem solution. The server was aging out and the software was up for renewal. It wasn't working well with our remote workers; they're not literally connected to my network so updating them was always a pain-point without a cloud-based solution.
We were going to transition to "cloud" and Vipre just wasn't really up to the level of CrowdStrike at the time.
The deployment literally took about 15 minutes across the wide area network. Regarding configuration, we took a look at it with their tech support and Implementation team. There's literally maybe a dozen settings and we basically maxed them out.
The price of CrowdStrike Falcon is a little high, but it can be negotiated.
If you're thinking about implementing this solution, I would suggest getting Overwatch and Insight along with it. Also, don't be afraid to try and negotiate for a better price.
On a scale from one to ten, I would give this solution a rating of nine.
The reporting is part of the Overwatch and Insight combination. It's doing what we want it to do and it's not causing a lot of overhead. Like I said earlier, maybe we're an anomaly. We don't have a lot of issues on our network.
We use CrowdStrike Falcon as our EDR solution, including antivirus.
As Symantec ended its endpoint protection, we were able to roll out CrowdStrike.
It is important to us that CrowdStrike is cloud-based because the way I understand it, that's their main engine for their next-gen EDR solution. The fact that it's cloud-native, flexible, and offers always-on protection is important because we want to have 24-hour monitoring of our environment. It is important to us that we don't have to worry about upgrades.
This product has worked flawlessly to prevent breaches, and then it has allowed us to prevent any downtime.
It has minimized our footprint because having the ability to implement the prevention policies has allowed us to focus on other projects. The prevention policies are working for us.
The most valuable feature is the activity dashboard because it gives you a holistic view of your environment from a security standpoint.
We would like to be able to perform on-demand scanning, rather than relying on the scheduler. Right now, CrowdStrike does not have an on-demand scanner. They have the always-on, but we have found instances where artifacts are being blocked from running, but they're not being removed. With an on-demand scanner, we would have the ability to remove those artifacts from an end user's machine.
I would like to see the multi-site environment functionality added in the next release. Currently, we are working under a single-site environment, and on the roadmap, they mentioned having the ability to have a multi-site environment.
We have been using CrowdStrike Falcon for approximately eight months.
Stability-wise, they are very advanced in the next-gen antivirus game. CrowdStrike Falcon is always available.
We have approximately 5,000 machines that are being managed. As time moves on, this number will grow, but we don't expect it to get larger in the near future.
I would rate the technical support that we received during the deployment, as well as post-deployment, very well. They were very knowledgeable and gave us all of the tools we needed to have a successful deployment.
Prior to Falcon, we were using Symantec antivirus. It was out of date, which is why we replaced it.
It is very easy to deploy the solution's sensor to our endpoints. We use an automated process.
Our deployment took between two and three months, with paperwork, communication, and roll-out timeframes. Our implementation strategy included using IBM's BigFix application to push to Windows machines, and then we used a solution for the Mac to push it out remotely as well.
Our IT Services team deployed this solution, and they leveraged consultants from CrowdStirke to get the proper packages for the process.
I'm sure that there is administration and upgrades to do, as sensors need to be updated or policies need to be adjusted. We have a group of approximately five people who are security engineers, IT Services, and directors who use it.
With respect to pricing, my suggestion to others is to evaluate the environment and purchase what you need.
We looked at different options, such as Carbon Black, as we were replacing Symantec as our EDR solution, and CrowdStrike was the top winner. CrowdStrike is always on, 24 hours. Analysis, with the prevention and the detection policies, as well as the USB policies, are all very beneficial. The one thing that CrowdStrike did not have is the on-demand scanner.
My advice for anybody who is interested in implementing CrowdStrike Falcon is to review and evaluate your environment and compare their EDR solutions.
I would rate this solution a ten out of ten.
I like that it's cloud-based instead of on-premise.
I miss a feature for the USB control that they have as an add-on. I haven't gotten to the point where I want to pay for it, but the features that I miss are available.
The biggest issue with Falcon as a standalone product is it doesn't have very much reporting.
Out of the box, the only weakness is the level of reporting.
All the analytics and the telemetry are there, it's just a matter of getting to it. Other vendors offer some of that stuff right out of the box.
CrowdStrike Falcon has been very low maintenance. There are features on it that I haven't touched yet. I've got a SIEM that I haven't really had time to explore fully. I have a patch management system that does what it does. I have a firewall and IDS that do what they do, and I have an endpoint security system that does what it does.
MSPs keep asking how one person can keep up to the different solutions and alerting, if you don't have any problems, then it's pretty easy to keep up. Everything does what it does. I don't experience any of the issues that apparently a lot of people have on their network. How can I tell you what to improve if it's doing what it's supposed to do?
I have been using CrowdStrike Falcon since June of 2019.
The stability is good; we haven't experienced any glitches or bugs.
We're a small company so the scalability is fine for us.
I don't have to talk to their technical support often. When I need help, I contact them by email. Sometimes it takes a little while to get through to them, but otherwise, when they respond the issue is resolved. Not a real concern.
We had Vipre business on-premise, the product was being discontinued and I wanted to move away from an on-premise solution. At the time Vipre did not seem to be quite as mature as other options. I understand that they have improved quite a bit since I looked at them last.
The initial setup was straightforward. Initial agent deployment took roughly 15 minutes. SIEM integration required some coordination between vendors, but was relatively uneventful when support teams were involved.
Licensing cost is negotiable. There are no additional costs.
On a scale from one to ten, I would give this solution a rating of nine. I'm sure there's always something that can be improved.
We evaluated Vipre, Carbon Black, and a few others.
There are half a dozen players out there that are the best of the breed. Pick one.
When it came to CrowdStrike versus Carbon Black, configuration and setup were deciding, driving factors. CrowdStrike was much easier to configure, but overall, is it better or worse? I can't make that judgment call.
All I know is what I've been told by other vendors that are trying to get my business. They tell me about issues that I've never encountered with the products that I have. In summary, take what a vendor says about another vendor's product with a grain of salt.
We have various use cases. We are protecting servers and endpoints that are utilizing this product to focus on advanced, persistent threats, with the goal of reducing the overhead on the endpoint for early detection.
Right now, we have not put enforcement, and we're moving to the next level of detection.
Using this solution has reduced my need for imaging. We can mitigate the issue and address it immediately, for people both on and off of the network.
The most valuable feature is that we don't need to re-image machines as much as we had to.
They need to strengthen the forensic capabilities of this product, for e-discovery.
We started testing and deploying CrowdStrike Falcon about a year and a half ago, in the early part of 2019.
In terms of stability, it's a great tool.
At this time, we have between 5,000 and 6,000 endpoints.
We have been in touch with CrowdStrike technical support and they have been very supportive.
Prior to CrowdSrike, we used a signature-based solution from Symantec.
The initial setup was very straightforward and very easy. We've been bringing stuff into the SWOT platform and getting that data. It has been pretty good.
The implementation was done in-house. We had, in part, help from a strategic partner, EY.
CrowdStrike is what we did for the time and for the moment. It is number two when you look at the magic quadrant, and we have implemented that for the time being. When we selected it, that was right for us to get away from a Symantec signature-based environment for endpoint detection response.
We have moved over to CrowdStrike for now. When you look at the quadrant, the number one is Microsoft. With Defender built into the operating system, there is less overhead on the endpoint. We will eventually, most likely, migrate to that.
I have experience with Cylance, as well. They gave that the advanced persistent threat leader title, at one point in the market. I implemented that for one client and now, being in this CISO role, I went with CrowdStrike over Cyberreason and Cylance/Blackberry. The main reason for CrowdStrike is the Falcon technologies and what they do with their strategy.
We're moving to Office 365, and it will make sense for me to adopt Microsoft Defender because it's integrated into the platform. One of the differences between Defender versus CrowdStrike or any other of them is that they have to sit outside. Microsoft Defender can go deep down into the kernel, and that's a good thing for the endpoint. You can do a lot and detect a lot, which makes it far safer against advanced persistent threats.
Overall, this product has been pretty good and I recommend it.
I would rate this solution a nine out of ten.
We primarily use the solution for our Windows and Macs.
The detection and response have been excellent overall. We've had no ransomware attacks.
We found the initial setup to be straightforward.
The solution is stable.
Scalability hasn't been an issue for us.
The price is too high.
I've been using the solution for three years now.
The stability has been fantastic. We have never had an outage. There are no bugs or glitches. The performance is great.
As we are a smaller organization, scalability hasn't been an issue. It's been very good so far.
We have about 120 users and they include technical people, salespeople, project managers, and developers.
This solution is being widely used in our organization as it is mandatory. All of our users need to have it.
The product works really well. We very rarely had to reach out to technical support. When we reached out to them, they've been pretty good.
We were in the old McAfee EPO and with all the ransomware and all that stuff hitting us, we found that McAfee wasn't really cutting it. That's why we switched.
The initial setup is simple. It's not overly complex or difficult.
For us, the deployment took a couple of weeks and we were good to go.
You need very few staff members for deployment and maintenance.
We did not use an integrator, consultant, or reseller to help us with the implementation. We were able to handle it ourselves.
There's not really an ROI. The ROI is that we haven't been hit by ransomware.
The product is quite expensive. It's higher than the competition in general in terms of cost.
We pay a yearly licensing fee.
They also offer what they call the Falcon Complete, which was a complete managed service, which we chose not to go with. We measured it ourselves.
We looked at Carbon Black, Cybereason, and Microsoft Defender ATP. We chose CrowdStrike, as it's always easy to use. It was the most mature product as well. We liked what Gartner had to say about CrowdStrike.
We're a managed security services provider.
I can't speak to the exact version of the solution we're using at this time.
I would advise users to just follow the advice of CrowdStrike. They have some very good manuals and YouTube videos and stuff of that. It's a complex piece of software, however, you need to work very well and make sure your implementation is correct.
I'd rate the solution at a ten out of ten.
We primarily use the solution for threat intelligence.
The threat intelligence on offer is the solution's most valuable aspect.
The solution is very stable.
The solution can scale easily.
The pricing is very competitive.
The solution overall is a good product, and we don't see too much room for improvement.
Support, particularly related to after-sales and after deployment, could be improved a bit. If you need to connect to support, it takes at least a day to reach the support team and get a proper reply.
The solution could use better device control.
I believe I've been using the solution for the past three years.
The solution is very stable. We don't find there are any bugs or glitches. We haven't had it crash or freeze on us. It's quite reliable.
The scalability of the solution is good. If a company needs to expand out, they can do so easily with this solution.
In our organization, we have about 2,500 people using the solution. We already use the solution at 100% capacity, meaning everyone in the company uses it. If new employees are onboarded, they also use the solution. Chances are, we will increase usage int he future.
Technical support could move a bit faster. We find that it takes time - at least a day - to reach support and then get a response. Therefore, we're not completely satisfied with the level of service provided to us. It's an area that could be improved upon for sure.
We used to use Carbon Black. We switched due to the fact that this solution offered us better partnership offers.
The initial setup is not complex. It's very, very easy.
You can set up and deploy the product in 30 to 40 minutes. It's straightforward.
You only need a few people to handle deployment and maintenance.
The price is very reasonable and quite competitive in the market.
Before choosing this solution, and switching from Carbon Black, we looked at Endgame and Kaspersky.
We are working with all the versions for the most part, due to the fact that we are partners of CrowdStrike and we position CrowdStrike to our customers. We also use the solution for our company.
I'd recommend the solution to others, however, I would advise that they try it first as a POC so that they can first see the value of the product.
Overall, I'd rate the solution eight out of ten. If technical support could be faster and there was more device control, I would rate the solution higher.
We use CrowdStrike for our endpoint security and we're about to tie it into vScaler. It's on every endpoint in the company and is used by everyone in the organization. It's anti-virus security software, so we'll continue to put it on every machine whether our company grows or shrinks.I'm the director of information technology in our company and we're a customer of CrowdStrike.
We rely on our environmental security and we haven't had any infections so that's valuable for us. It means we haven't lost any time due to the system being down from ransomware or anything like that, so it's quite positive.
Improvement could be made in the number of false positives we get, there are more than there needs to be. Typical Windows functions sometimes get stopped by CrowdStrike. In general, I'd rather err on the side of safety but some of these are really straightforward functions that should get through.
For the future, I think they need to keep building on their extensibility, the capability to be extended, so that it's not lost and we can utilize the knowledge that we're gaining from the endpoints.
I've been using this solution for a little over a year.
This is a stable solution, I'm unaware of any failures.
Scalability is expensive but it works. We've installed it on more than 900 machines in the corporation and it covers every role from civil engineers, architects, HR people, office workers and the server. Maintenance takes the equivalent of one full-time position but it's a shared responsibility among the IT team.
The technical support do a good job.
The initial setup occurred before I began working here although I believe it is quite straightforward. The install process for machines is pretty good. If we want to de-install it's not so great, but overall it's tolerable.
I believe that we pay about US$ 65,000 annually which covers 900 machines in the company. There are no other costs but there are additional features that can be purchased but we haven't done that.
CrowdStrike do their job well and can be compared to other solutions on the market such as SentinelOne and Huntress. They do need to be more extensible because right now they don't play well with others and it's a bit of a challenge on the management side.
I would rate this solution an eight out of 10.