I use it for cloud workload protection and threat detection in AWS environments.
CTO and Co-Founder
Cloud threat visibility has improved and now supports flexible, low-overhead protection for startups
Pros and Cons
- "The pay-as-you-go model enabled me to deploy quickly from the AWS Marketplace management account, scaled protection for workloads without upfront commitments, and reduced the initial operational overhead."
What is our primary use case?
How has it helped my organization?
The pay-as-you-go model enabled me to deploy quickly from the AWS Marketplace management account.
It scaled protection for workloads without upfront commitments and reduced the initial operational overhead.
It provides real-time visibility into cloud threats, helping stop breaches faster in dynamic AWS setups.
What is most valuable?
I find the seamless AWS integration and single lightweight agent to have minimal performance impact.
The cloud-native SIEM and runtime security leverages threat intelligence for proactive detection.
Flexible billing through AWS is ideal for startups testing security without long-term locks.
What needs improvement?
I believe that AI-powered SOAR workflow suggestions could streamline incident response.
Buyer's Guide
CrowdStrike Falcon
February 2026
Learn what your peers think about CrowdStrike Falcon. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
883,044 professionals have used our research since 2012.
For how long have I used the solution?
I have been using it for 1 month.
Which solution did I use previously and why did I switch?
We are a new startup, so we did not use any previous solutions.
What's my experience with pricing, setup cost, and licensing?
The pay-as-you-go model excels for startups with variable AWS workloads, avoiding large upfront costs and scaling with usage.
Which other solutions did I evaluate?
I evaluated Prisma Cloud, Wiz, and Orca Security alongside native AWS options.
What other advice do I have?
CrowdStrike Falcon for AWS (pay-as-you-go) delivers strong cloud-native protection via AWS Marketplace, which is ideal for startups scaling workloads.
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: My company has a business relationship with this vendor other than being a customer. Selected for the 2026 Cybersecurity Startup Accelerator program with CrowdStrike, AWS, and NVIDIA.
Last updated: Jan 15, 2026
Flag as inappropriatePresales Manager at a tech vendor with 5,001-10,000 employees
Proactive threat hunting has improved breach prevention and now provides deeper endpoint visibility
Pros and Cons
- "CrowdStrike Falcon has helped my customers predict and prevent potential breaches because of its proactive approach."
What is our primary use case?
I deal with endpoint security, firewall, and XDR solutions. I use Sangfor and work with Trend Micro and CrowdStrike. I use CrowdStrike Falcon for enterprise companies, which is what I typically recommend.
How has it helped my organization?
CrowdStrike Falcon has helped my customers predict and prevent potential breaches because of its proactive approach.
What is most valuable?
The most valuable features in CrowdStrike Falcon are its AI capabilities. The lightweight agent has a positive impact on system performance and visibility through ease of use. I utilize its Threat Graph for threat hunting.
What needs improvement?
To improve my recommendation to a perfect score, I would focus on better selling skills and improved integration with different vendors.
For how long have I used the solution?
I have been working with CrowdStrike Falcon for approximately five years.
Which solution did I use previously and why did I switch?
I have previously worked with a Total Information Management Corporation solution.
Which other solutions did I evaluate?
I work with competitors as well, and there is good competition to Sangfor at the moment.
What other advice do I have?
I have experience with these products from prior use. I work with security vendors and some of my customers use Trend Micro and CrowdStrike as well. My experience has been positive and I have been satisfied. The pricing might be a little expensive, but I find it cost-effective. I do not find CrowdStrike Falcon to be the most expensive when comparing pricing with competitors. I would rate this solution an 8 out of 10.
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Last updated: Dec 15, 2025
Flag as inappropriateBuyer's Guide
CrowdStrike Falcon
February 2026
Learn what your peers think about CrowdStrike Falcon. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
883,044 professionals have used our research since 2012.
Trainee Engineer at a tech services company with 11-50 employees
Offers real-time monitoring features and next-gen AV that uses AI
Pros and Cons
- "It's really good because it can detect anything."
- "I'm concerned about the recent issue that involved a faulty update."
What is our primary use case?
It gives an overview and insights into my AD accounts. It shows if any identity, like an AD user, is compromised, has a weak password, or is logging in from an unusual system. Any anomalies.
What is most valuable?
I like the insights and detailed view of my AD structure. How protected it is, or is there any loophole or an area that needs more protection.
Another feature I like is that it gives insights into all my domain controllers and ADCs. The configuration is also really easy.
The real-time monitoring feature is good. For example, a user account is hacked. It alerts me that it's been hacked and prompts me to look into it or have the user change their password. I can then log in to my AD, change the password, or notify the user that their account has been compromised and ask them to change their password.
AI capabilities of CrowdStrike are also good.
When I use Identity Protection, I want the full stack, like going for XDR. If anything happens, like a laptop being compromised using a password, it gives me the entire attack flow. For example, the attack came from a particular user, like an IT admin. If their identity is hacked and they log into multiple systems, and those systems are affected, we can see those details and provide good support or recovery for customers and partners.
What needs improvement?
I'm concerned about the recent issue in July 2024. It involved a faulty content configuration update. What if another update causes the same problem again?
For how long have I used the solution?
I have been using it for two years.
What do I think about the stability of the solution?
Stability, I would rate it as a seven out of ten. There are a few instances where our customers have complained about the digital signatures it uses. Sometimes, even if you create a policy, it still tends to block it. A few applications get flagged as malicious even though the customer trusts them. Even if you create an exception rule, it might still block it after a few weeks. Also, there's the recent issue we faced with CrowdStrike and Windows. So, based on that, I'd give it a seven out of ten.
There is room for improvement. They need to conduct more thorough R&D before releasing updates. I think they didn't do that this time, but it was just a one-time issue. However, what if it happens again? That's a concern.
What do I think about the scalability of the solution?
Scalability-wise, I would give it a ten out of ten. It's simple because it's a SaaS solution. For example, this month, I have 50 users. Next month, I have 50 additional users. I just need to buy more licenses and add those systems to CrowdStrike. If I need to put them in certain groups with specific policies, that's easy too.
We work with all types of businesses, including small, medium, and enterprise businesses. Scalability is simple. I don't even need to install it on my laptop. One more good thing is that it offers an XDR view where I can add other components, like the email security solution Proofpoint. I can integrate it, so I'll get my emails and everything will be in a single pane of glass.
How are customer service and support?
We have a Technical Account Manager (TAM). We can directly call them and raise a ticket. Initially, it was a six or even a five because we had to send an email, and it would take three to four days for them to reply. Now, with the TAM, we can get issues resolved faster.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have experience with CrowdStrike, apart from their Cloud Security offering, which is on GCP. I've worked with CrowdStrike Identity Protection, Device Control, Device Control, EDR, XDR - basically everything except their cloud solution.
How was the initial setup?
The initial setup is straightforward. I don't need to install an agent in my AD, and I can get alerts from my read-only domain controller, which is also good.
I would rate my experience with the initial setup a ten out of ten, with ten being easy and one being difficult.
It's not required to deploy on-premises. It's a SaaS solution. I just need to download the agent and install it on each of my devices, whether they're VMs or my laptop.
One more good thing is that I don't need to be in my office network for it to keep protecting me. I can take the system home, and it will still be protected.
The deployment itself takes about a day to install everything if it's user-based. But for CrowdStrike to learn what to block and what not to block in your specific environment, it will take easily about two weeks. There will be some applications that it might consider a threat because it's a next-gen AV that uses AI.
So, some applications the customer uses might be flagged. I can whitelist them or create a policy to allow them. That's also a very good feature of CrowdStrike.
So, for the initial setup takes two weeks. For it to get to know your environment and work smoothly, just to install agents and set up the dashboard, policies, and all that, it takes about one day.
It offers seamless integration with the existing security infrastructure. We haven't faced any challenges because our customers use CrowdStrike only for endpoint and server security. They haven't gone to the XDR level yet. However, many other OEMs I've spoken to, like Zerto, have said that the CrowdStrike and Zerto integration is very seamless. So, if anything happens on my server end, I'll know when it happened and what the issue is from CrowdStrike. Or, for example a ransomware attack happens, I can restore from my Zerto application.
What was our ROI?
The benefit I've seen is their backend, which powers the EDR, XDR, and NGAV. It's really good because it can detect anything due to the wide range of customers they have.
For example, one customer has a vulnerability because of a zero-day attack. All the other customers will benefit because it propagates to the cloud and analyzes if other customers are on the same version of the drivers or any other Windows patch. If they are, it will tell us that there's an issue and provide remediation steps. Many of our customers find this very helpful. It's called the CrowdStrike community.
What's my experience with pricing, setup cost, and licensing?
I would rate it a seven out of ten, where one is cheap, and ten is expensive because it's a bit on the costlier side. Compared to Symantec or Trend Micro, CrowdStrike is more expensive.
What other advice do I have?
Overall, I would rate the product an eight out of ten because of one recent issue that happened.
I'm concerned about the recent issue that happened. What if another update causes the same problem again? Is it really as good as it seems? Even our customers have given very good feedback, they get more insights into what's happening, what they should do, and what remediation steps to take. So, in that way, it's very good.
I would recommend it, especially if you're going for endpoint security. I'd definitely recommend CrowdStrike first because it's more mature than SentinelOne and other EDR solutions in the APAC region.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Cyber Security Analyst at a tech vendor with 10,001+ employees
Excels at identifying suspicious activity, helps mitigate potential security breaches, and is easy to use
Pros and Cons
- "The detection and response console is the most valuable feature."
- "We encounter occasional issues, such as when disabling network access for a host that uses CrowdStrike."
What is our primary use case?
We use CrowdStrike Falcon to investigate security detections for malicious activities in our environment.
CrowdStrike utilizes machine learning algorithms and detection rules to generate alerts for suspicious activity within our environment. We then investigate these detections individually, analyzing the details of each event.
In addition to automated detection, CrowdStrike allows for custom queries. For instance, if we need to investigate a specific host, we can leverage a cloud security language to examine its activity. Similarly, we can use CrowdStrike to search for activity related to particular users or hosts.
How has it helped my organization?
CrowdStrike Falcon provides significant additional value. It excels at identifying suspicious activity the moment an application appears in the environment, immediately bringing these incidents to the attention of our response team. Upon receiving an alert, our team can investigate and take appropriate action if anything malicious is found. In essence, CrowdStrike Falcon acts as a strong barrier against attackers.
In the past 3 years, we have encountered many scenarios where CrowdStrike Falcon has helped mitigate potential security breaches.
What is most valuable?
The detection and response console is the most valuable feature.
What needs improvement?
We encounter occasional issues, such as when disabling network access for a host that uses CrowdStrike. In these cases, the access disable process can be quite slow.
I'm using CrowdStrike Query Language, and I've noticed an issue with event backups. Searches exceeding a certain event threshold aren't capturing all results. For instance, if I run a search that returns 10,000 events in a single day, only 2,000 events are backed up. This limitation with CrowdStrike Query Language needs to be investigated.
For how long have I used the solution?
I have been using CrowdStrike Falcon for over 3 years.
What do I think about the stability of the solution?
CrowdStrike Falcon is generally stable, although event searches may occasionally experience slow performance.
What do I think about the scalability of the solution?
CrowdStrike Falcon's scalability is dependent on the license acquired.
How are customer service and support?
The technical support live chat can experience long wait times. Submitting a ticket may result in a quicker response.
Which solution did I use previously and why did I switch?
The company was using Carbon Black before I joined. When I came on board, they decided to switch to CrowdStrike.
What other advice do I have?
I would rate CrowdStrike Falcon 9 out of 10.
CrowdStrike Falcon is deployed across multiple end-user systems and locations.
I recommend CrowdStrike Falcon. It's a wonderful security platform that's easy to use and requires minimal effort to maintain.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Sales Director at a tech services company with 11-50 employees
Blocks suspicious activities and protects endpoints and servers from attacks
Pros and Cons
- "The product provides good monitoring features."
- "The tool is more expensive than other products in the market."
What is our primary use case?
A lot of customers face ransomware and malware attacks. The solution helps protect endpoints and servers from ransomware and malware attacks.
How has it helped my organization?
The solution has multiple layers of security, including web security. We can monitor endpoints, conduct root cause analysis, and find geolocations. If the tool finds any suspicious activity, it blocks and remediates it.
What is most valuable?
The solution makes our security operations easier. After an incident, we get complete reports and insights. The product provides good monitoring features. The product also has teams that help customers find suspicious activities. The team calls and asks us to check the updates and remediate issues. If the system can remediate it, the team does it through the system. The detection and response are in real-time. There are no security breaches. Resolving issues doesn’t take much time.
What needs improvement?
The tool is more expensive than other products in the market.
For how long have I used the solution?
I have been using the solution for more than 3 years.
What do I think about the stability of the solution?
I did not have any stability issues.
What do I think about the scalability of the solution?
It is easy to scale up. We just need to add the licenses. The product is suitable for small, medium, and large businesses. We must buy a minimum of 50 licenses.
How are customer service and support?
The support is excellent. We rarely need support.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is pretty simple and clear. The time taken for deployment depends on the endpoints. It's a cloud solution. We can use Active Directory or the group policies to deploy it.
What was our ROI?
The product has a lot of use cases. There are companies that need to run their operations 24/7. It will be a big challenge if their server or infrastructure goes down. They cannot afford downtime. They need to choose the right solution for their needs.
What's my experience with pricing, setup cost, and licensing?
The price depends on the kind of service we need. If we need excellent service, we must pay a reasonable price. We can choose any pricing model if we do not want excellent service. The product is excellent. We need to pay a premium price for the tool.
Which other solutions did I evaluate?
Microsoft Defender Threat Intelligence, IBM, and Cisco are some competitors. CrowdStrike entered the market with a USP to protect endpoint servers. It has a different approach. Malwarebytes has a similar setup. I prefer CrowdStrike, though.
What other advice do I have?
I will recommend the tool to others depending on their budget. If customers have a good budget and need a premium product, they can choose CrowdStrike. No product is perfect. Overall, I rate the tool an 8 out of 10.
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Manager, Security Operations Centre at a computer software company with 51-200 employees
Robust and detects almost every malicious activity that occurs within the endpoint
Pros and Cons
- "The solution's most valuable feature is that it is robust and can detect almost every malicious activity that occurs within the endpoint."
- "I would like a centralized deployment where I could roll out or push it to all endpoints."
What is our primary use case?
We use the solution for endpoint security. We use the tool to ensure the endpoints are protected from abnormal activities, people don't run different scripts, and people don't compromise endpoints and use them to get into the network.
What is most valuable?
The solution's most valuable feature is that it is robust and can detect almost every malicious activity that occurs within the endpoint.
What needs improvement?
I would like a centralized deployment where I could roll out or push it to all endpoints.
For how long have I used the solution?
I have been using CrowdStrike Falcon Surface for two years.
What do I think about the stability of the solution?
CrowdStrike Falcon Surface is a very stable solution.
What do I think about the scalability of the solution?
CrowdStrike Falcon Surface is a very scalable solution. A lot of customers are using CrowdStrike Falcon Surface. One of our customers for the solution has 12,000 endpoints.
How are customer service and support?
The solution's technical support is handled centrally by CrowdStrike, and the support was also good and knowledgeable.
How was the initial setup?
I didn't deploy the solution, but I supported customers that use it. I think it took them up to six months to deploy the CrowdStrike Falcon Surface.
What was our ROI?
The solution somehow doesn't allow intrusion and minimizes fraud or cyber-attacks. Within the time we're using it, CrowdStrike Falcon Surface detected a lot of intrusion from malicious individuals. It was able to prevent a lot of insider threats where people internally will want to run some malicious scripts within the environment.
It detects those malicious attacks quickly, and we can prevent them. It minimized a lot of cyber and fraud-related activities that could have cost the bank a lot of money.
What other advice do I have?
CrowdStrike Falcon Surface is a cloud-based solution. In light of the recent global IT outage that affected CrowdStrike, they should do proper change management.
Overall, I rate the solution a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
CIO & Information manager at a computer software company with 51-200 employees
Works with Office 365 and helps to manage threats
Pros and Cons
- "The main feature we rely on is the product's intelligence. We appreciate the advice from the team during implementation. One of the main reasons we chose this product is its compatibility with Office 365."
- "Improvement is always possible. It's challenging to gauge how much future mitigation is provided, especially since we've only been using the product for about one and a half years. Every product faces this challenge because nothing is ever completely foolproof. So, besides relying on technology, we also focus on increasing our staff's awareness of security issues. Feedback from my colleagues suggests that the reporting and dashboarding of incidents could be improved."
What is our primary use case?
The tool helps to increase security because the threats we face keep changing, so we need better protection. In the past, we've faced some attacks on our network, and while we managed to deal with them, we realized we needed even stronger protection. That's why we decided to implement CrowdStrike Identity Protection.
What is most valuable?
The main feature we rely on is the product's intelligence. We appreciate the advice from the team during implementation. One of the main reasons we chose this product is its compatibility with Office 365.
What needs improvement?
Improvement is always possible. It's challenging to gauge how much future mitigation is provided, especially since we've only been using the product for about one and a half years. Every product faces this challenge because nothing is ever completely foolproof. So, besides relying on technology, we also focus on increasing our staff's awareness of security issues. Feedback from my colleagues suggests that the reporting and dashboarding of incidents could be improved.
For how long have I used the solution?
I have been working with the product for one and a half years.
What do I think about the stability of the solution?
I rate the tool's stability an eight out of ten.
What do I think about the scalability of the solution?
Scalability isn't a problem for us. Many big multinational companies use CrowdStrike Identity Protection, so it's designed to handle environments like ours without any issues. My company has 500 users.
How was the initial setup?
The tool's deployment is easy. Thanks to the installation scripting we utilized, the technical rollout took about two weeks. Then, there was some additional time, around two to four weeks, for customization and configuration. After that, the systems were up and running. So, all in all, it took about three months to have our mitigation strategies in place. We have one engineer for maintenance.
What other advice do I have?
I rate the overall product an eight out of ten. I would recommend it to others. However, it's crucial to understand areas where the product might not provide coverage and how to mitigate those gaps. For example, it covers endpoints, networks, and Office 365 environments, but are there other areas in the attack surface that it doesn't address well? It's essential to be aware of any potential gaps upfront.
The solution helps in preventing incidents. However, it's challenging to quantify the exact impact because we don't know what would have happened without it. It's similar to having insurance for your house.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Group IT Director - Technical Operations at a construction company with 10,001+ employees
Automatically takes immediate action whenever it detects suspicious activity
Pros and Cons
- "The managed services are distinguished, responsive, dynamic, flexible, and assertive when taking action."
- "CrowdStrike Falcon could be enhanced by extending its security capabilities to include NDR and XDR."
What is our primary use case?
We use CrowdStrike Falcon for both our server and endpoint security, including our users' laptops and PCs.
How has it helped my organization?
CrowdStrike Falcon has made a significant difference for us, especially in mitigating ransomware and zero-day attacks. Its proactive and defensive response approach effectively isolates threats, setting it apart from other endpoint solutions.
Integrating CrowdStrike Falcon into our environment was seamless. Once we set the policy the software was activated immediately and distributed on all our endpoints.
The real-time response is highly effective. It automatically takes immediate action whenever it detects suspicious activity, alerting us to the problem and providing clear mitigation steps. In some cases, it even pushes through updates to resolve the issue proactively.
The usability and interface of CrowdStrike Falcon for daily operations are good.
What is most valuable?
The managed services are distinguished, responsive, dynamic, flexible, and assertive when taking action.
What needs improvement?
CrowdStrike Falcon could be enhanced by extending its security capabilities to include NDR and XDR.
The pricing has room for improvement.
For how long have I used the solution?
I have been using CrowdStrike Falcon for three years.
What do I think about the stability of the solution?
In the three years of using CrowdStrike Falcon, we have not encountered any stability issues.
What do I think about the scalability of the solution?
CrowdStrike Falcon scales well. We are using it in a large environment with no problems.
How are customer service and support?
The technical support is responsive.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used both Symantec Endpoint Detection and Response and Kaspersky Endpoint Detection and Response but found that they lacked the 24/7/365 monitoring and response offered by CrowdStrike Falcon. Additionally, their detection capabilities, particularly for ransomware and zero-day attacks, were not as effective.
How was the initial setup?
The initial deployment was straightforward and non-disruptive. The deployment took one week to complete.
We required two people from our organization for the deployment on-site and the CrowdStrike team worked remotely.
What about the implementation team?
The CrowdStrike team helped with the implementation.
What's my experience with pricing, setup cost, and licensing?
CrowdStrike Falcon is one of the more expensive endpoint solutions on the market.
What other advice do I have?
I would rate CrowdStrike Falcon an eight out of ten.
We deployed CrowdStrike Falcon across all our locations, including subsidiaries and remote sites in various regions.
Maintaining CrowdStrike Falcon is simple because it only requires a client agent to be installed on the machine at the kernel level, below the operating system.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free CrowdStrike Falcon Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2026
Product Categories
Extended Detection and Response (XDR) Security Information and Event Management (SIEM) Endpoint Protection Platform (EPP) Threat Intelligence Platforms (TIP) Endpoint Detection and Response (EDR) Attack Surface Management (ASM) Identity Threat Detection and Response (ITDR) AI-Powered Cybersecurity PlatformsPopular Comparisons
Microsoft Defender for Endpoint
Splunk Enterprise Security
Darktrace
SentinelOne Singularity Complete
Microsoft Sentinel
Fortinet FortiEDR
IBM Security QRadar
Cortex XDR by Palo Alto Networks
HP Wolf Security
Huntress Managed EDR
Varonis Platform
Microsoft Defender XDR
Elastic Security
Buyer's Guide
Download our free CrowdStrike Falcon Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- I would like to compare CrowdStrike and Carbon Black. On what basis should I decide?
- What is the biggest difference between Carbon Black CB Defense, CrowdStrike, and SentinelOne?
- What do you recommend to choose when replacing Symantec EDR: SentinelOne or CrowdStirke Falcon?
- What is the biggest difference between CrowdStrike and Cylance?
- CrowdStrike Falcon vs Microsoft Defender ATP: Comparison of features and performance
- Is Crowdstrike Falcon better than Trend Micro Deep Security?
- What are the pros and cons of Darktrace vs CrowdStrike Falcon vs alternative EPP solutions?
- Which solution do you prefer: CrowdStrike Falcon or SentinelOne Singularity Complete?
- How does Microsoft Defender for Endpoint compare with Crowdstrike Falcon?
- How does Crowdstrike Falcon compare with FireEye Endpoint Security?



















