Coming October 25: PeerSpot Awards will be announced! Learn more
CIO & Information manager at a leisure / travel company with 501-1,000 employees
  • 3
  • 224

What are the pros and cons of Darktrace vs CrowdStrike Falcon vs alternative EPP solutions?

Hi peers,  

I work as the CIO & Information Manager in the gaming and gambling industry. The company has 650 employees and >30.000 customers.

I'm not able to find a study where Darktrace is compared against Crowdstrike Falcon (or other solutions for endpoint security, e.g. Sentinel One). 

Can anyone help and share their insights? 


Regards from the Netherlands

PeerSpot user
2 Answers
Consultant at a computer software company with 51-200 employees
Top 5Leaderboard
31 March 22

Hi @reviewer1799568,

Most of these comparisons are opinions and some tests are done in specific conditions that might not suit or reflect your organization's needs and roadmap. Ultimately, the cost of a mistake is a data breach and not just an audit finding or operational discomfort.

I mention this because there are no viable shortcuts. I suggest you test the solutions thoroughly in your own environment to see what works for you.

The gaming floor is hopefully "air-gapped" and the solution should respect that segregation and still provide great security and visibility. One of the challenges is security updates.

For such an environment you would need comprehensive AI and machine learning. I suggest you look at the difference between IOC and IOA.

IOA vs IOC: Defining & Understanding The Differences | CrowdStrike. (Please also check other sources).

Good luck and stay safe!  

Product comparison that may be of interest to you
Partner Account Manager 🔆 at SEC DataCom A/S
26 April 22


I am told that Darktrace is a complimentary product that doesn't do any endpoint protection.

Find out what your peers are saying about Darktrace, Check Point, Fortinet and others in Intrusion Detection and Prevention Software (IDPS). Updated: September 2022.
635,987 professionals have used our research since 2012.
Related Questions
Allan Gillies - PeerSpot reviewer
IT Manager at Robert Cullen Ltd
Sep 06, 2022
Hi community, I'm an IT manager at a small manufacturing company. Currently, I'm looking into comparable solutions (vs Darktrace) for cyber security deployment for an SMB. What would you advise and why? Thanks for the help.
2 out of 3 answers
Strategic Account Director - EMEA at CyGlass
16 August 22
Hi @Allan Gillies,  CyGlass is an alternative to DarkTrace that primarily addresses the SMB market only. Typically we cover 80% of what DT can offer but for circa 35% of the cost.  Why? We are a SAAS-based cloud platform so we don't require any hardware, just your existing firewalls that we pull netflow data into the Cloud and utilise our AI to map out and offer you full visibility for on-prem and Cloud networks.  We generate a set of free reports that offer you a scorecard (RAG analysis) that cover the 0365 summary report, the ransomware prevention report as well as an executive summary that offers instant visibility of your architecture.   Let me know if you want further information.  I am based in the UK  Regards, Stuart Draper 
Benoit Tellier - PeerSpot reviewer
IT Telehealth Specialist at Clinical & Support Options
16 August 22
I'm not sure what specifically you're trying to defend against, but we're just wrapping up a Crowdstrike deployment, and it's been surprisingly smooth. We opted to move away from Kaspersky (for ethical reasons), even though it's technically the best AV product out there, but it was always a bit heavy on the clients.  Crowdstrike is more of a behavior monitor, and it's much lighter. Crowdstrike pricing isn't anything to write home about, but you have lots of "a la carte" choices, so you can make it fit your needs, and your budget. Cheers!
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Dec 06, 2021
How does Crodwstrike Falcon compare with Sophos Intercept X? Which is better and why?
See 1 answer
Janet Staver - PeerSpot reviewer
Tech Blogger
06 December 21
I like that Crowdstrike Falcon allows me to easily correlate data between my firewalls. Its detection and machine learning are very valuable features. Crowdstrike Falcon also successfully prevents malware in real time. I find that Crowdstrike Falcon’s dashboard is very user-friendly; Information is easy to find because of how it is presented and everything is linkable. Stability is fantastic and so is the scalability. You can easily create several endpoints without any issues. In terms of pricing, Crowdstrike Falcon is reasonable for all that it has to offer. I don’t personally have experience using their technical support, so I can’t speak for that. Even though Crowdstrike has a well-recognized reputation, I think Sophos Intercept X is the most secure endpoint product out there for many reasons. Sophos Intercept X is easy to manage, simple to deploy, and catches everything, which I can personally attest to because I have run simulations against Sophos and other products, with Sophos always coming out on top. It successfully detects malware and protects against ransomware. Whatsmore is that Sophos Intercept X has a data loss feature that allows you to monitor and detect whether users are insecurely sharing information. Depending on which industry you are in, this can be especially helpful, if not very much necessary (for example, in the healthcare industry) to ensure company resources are safe and sensitive data and information aren’t compromised or exposed to malicious software. In addition, my experience with customer service has always been great. Conclusion: If you have to choose between the two, I would suggest Sophos Intercept X, since I have been using it for years and have found it to be extremely reliable, responsive, and have had no issues with the software. Especially considering its price, the product is definitely worth it.
Related Articles
Davina Becker - PeerSpot reviewer
Content Editor at PeerSpot
Sep 11, 2022
Enterprises are increasingly facing multiple network monitoring challenges, like tracking, monitoring, and improving network performance. Addressing these challenges with a Network Traffic Analysis (NTA) solution helps an organization avoid various network monitoring challenges with proactive strategies. PeerSpot real users of Network Traffic Analysis note the advantages of this type of solut...
Davina Becker - PeerSpot reviewer
Content Editor at PeerSpot
Sep 08, 2022
Network Traffic Analysis (NTA) monitors network availability and activity. It can identify anomalies, including security and operational issues. It uses network communications to detect and investigate security threats as well as malicious or anomalous behaviors within the network. It uses a combination of behavioral modeling, machine learning, and rule-based detection. This helps to create a...
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Apr 06, 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why. You can read user reviews for the Top 8 Network Detection and Response (ND...
CristianoLima - PeerSpot reviewer
Senior IT Infrastructure Engineer at Tecnoage
Nov 05, 2021
Keeping up with the evolution of cybersecurity and the threats that are haunting the IT industry across all industries, this text pays special attention to ransomware, as this practice is on the rise in the world of cybercrime. Let's focus on the subject, specifically on the Healthcare sector. We are based on Sophos' annual report on cyber threats, which discusses the continuity of ransomware...
Giusel - PeerSpot reviewer
IT Engineer at UTMStack
Aug 15, 2021
What is HIDS in Cybersecurity? A HIDS (Host Intrusion Detection System) is software that detects malicious behavior on the host. It monitors all the operating system operations, tracks user behavior, and operates independently without human assistance. How does a Host-based Intrusion Detection System work? HIDS operates at the OS level, unlike others antivirus systems that operate at the a...
See 1 comment
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
15 August 21
Thanks for sharing its very informative
Related Articles
Davina Becker - PeerSpot reviewer
Content Editor at PeerSpot
Sep 11, 2022
3 Non-Traditional ROIs for a Network Traffic Analysis Solution
Enterprises are increasingly facing multiple network monitoring challenges, like tracking, moni...
Davina Becker - PeerSpot reviewer
Content Editor at PeerSpot
Sep 08, 2022
5 Challenges that Can be Solved with Network Traffic Analysis (NTA)
Network Traffic Analysis (NTA) monitors network availability and activity. It can identify anom...
Download Free Report
Download our free Darktrace Report and get advice and tips from experienced pros sharing their opinions. Updated: October 2022.
635,987 professionals have used our research since 2012.