CIO & Information manager at a leisure / travel company with 501-1,000 employees
  • 4
  • 383

What are the pros and cons of Darktrace vs CrowdStrike Falcon vs alternative EPP solutions?

Hi peers,  

I work as the CIO & Information Manager in the gaming and gambling industry. The company has 650 employees and >30.000 customers.

I'm not able to find a study where Darktrace is compared against Crowdstrike Falcon (or other solutions for endpoint security, e.g. Sentinel One). 

Can anyone help and share their insights? 


Regards from the Netherlands

PeerSpot user
3 Answers
Consultant at a computer software company with 51-200 employees
Top 5Leaderboard
Mar 31, 2022

Hi @reviewer1799568,

Most of these comparisons are opinions and some tests are done in specific conditions that might not suit or reflect your organization's needs and roadmap. Ultimately, the cost of a mistake is a data breach and not just an audit finding or operational discomfort.

I mention this because there are no viable shortcuts. I suggest you test the solutions thoroughly in your own environment to see what works for you.

The gaming floor is hopefully "air-gapped" and the solution should respect that segregation and still provide great security and visibility. One of the challenges is security updates.

For such an environment you would need comprehensive AI and machine learning. I suggest you look at the difference between IOC and IOA.

IOA vs IOC: Defining & Understanding The Differences | CrowdStrike. (Please also check other sources).

Good luck and stay safe!  

Product comparison that may be of interest to you
Navcharan Singh - PeerSpot reviewer
Senior Seo Executive at Ace Cloud Hosting
Top 5
Jan 24, 2023

The pros and cons of Darktrace vs Crowdstrike Falcon vs alternative EPP solutions are something worth looking at before making a decision on which one is the best fit for your particular needs.

Darktrace is an AI-based cyber security solution that uses machine learning to identify threats faster and with greater accuracy than traditional approaches. It works by continuously scanning the network, learning its normal behavior, and then detecting anomalies or malicious activities in real-time. This can provide your business with an early warning system to alert you to potential attacks before they have a chance to do major damage. One of the biggest advantages of Darktrace is that it’s able to work without relying on vulnerable signatures, meaning no matter how complex or sophisticated an attack may be, it will still be detected. The other benefit here is the scalability—Darktrace can quickly scale up as needed in order to protect larger networks rapidly changing over time.

CrowdStrike Falcon is another popular endpoint protection platform touted for its cloud-based architecture and advanced threat prevention capabilities. Similar to Darktrace, it has some powerful detection technologies but differs slightly in terms of how it works as well as what kind of threats it’s designed for. While Darktrace focuses mainly on malware protection, Falcon primarily focuses on preventing data exfiltration attempts or unauthorized accesses from outside sources such as remote hackers or phishing emails trying to steal information stored inside your system files or databases etcetera CrowdStrike also offers a cloud-native approach which means they can update their signature database nearly instantaneously against any new forms of attack so you don’t need to worry about attackers finding ways around their protections even if they manage one vulnerability first time round. The downside here though could be a lack of control in terms of what type/level updates you choose – this varies depending upon the subscription level chosen by users.

Alternative EPP solutions include those offered by vendors such as Symantec Endpoint Protection (SEP) and McAfee, these often have greater coverage when compared with software like CrowdStrike, however, you should bear in mind that these providers tend not only to charge more expensively but they also come bundled with additional features like anti-virus software, etc., which depending upon your desired goal may prove superfluous thus leading ultimately into cost waste rather than efficiency gain. SEP notably boosts robust customization abilities whereby customers are given generous freedom within setup policies - allowing them fine grain authority over endpoints rules set up e.g. whether particular application file types can run, allowing internet connection, etc. (elements not quite present within CrowdStrike) – although again there comes significant added expense via extra licenses required plus paywall obscurity associated with product tiers being unclear until we eventually reach checkout point.

In conclusion, all three services outlined here offer good suite options for businesses seeking out endpoint protection platforms. Each has respective strengths and weaknesses so careful analysis should help weigh out the pros and cons faced overall - consider particularly well whether the price tag is commensurate with potential user experience value gained meanwhile considering deeply what levels customizability offered suits own demands perfectly prior to forging ahead towards whichever choice deemed most suitable!

Partner Account Manager 🔆 at SEC DataCom A/S
Apr 26, 2022


I am told that Darktrace is a complimentary product that doesn't do any endpoint protection.

Find out what your peers are saying about Darktrace, Check Point, Fortinet and others in Intrusion Detection and Prevention Software (IDPS). Updated: January 2023.
672,785 professionals have used our research since 2012.
Related Questions
it_user434868 - PeerSpot reviewer
Senior Director of Delivery at a tech services company with 51-200 employees
Jan 12, 2023
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
2 out of 3 answers
Pre-Sales Architect at network techlab
Sep 19, 2022
I'm not directly involved in sales, so I can't comment on the exact price, but I know the price decreases the higher the quantity we purchase.
Sathya Paul - PeerSpot reviewer
Director Of Information Technology at TollPlus LLC.
Nov 22, 2022
The pricing is competitive and includes all features and support. I rate pricing an eight out of ten.
it_user434868 - PeerSpot reviewer
Senior Director of Delivery at a tech services company with 51-200 employees
Jan 12, 2023
How do you or your organization use this solution? Please share with us so that your peers can learn from your experiences. Thank you!
2 out of 4 answers
Deputy Technical Manager (SOC Operations) at a tech services company with 1,001-5,000 employees
Aug 23, 2022
We are using Crowdstrike Falcon XDR for security.
Pre-Sales Architect at network techlab
Sep 19, 2022
We are a CrowdStrike partner, selling their products to our customers. We have small and medium-sized enterprise clients and clients in the government sector. Depending on customer requirements, we provide different CrowdStrike Falcon products, ranging from Spotlight to XDR.
Related Articles
Content Strategist at PeerSpot
Sep 11, 2022
Enterprises are increasingly facing multiple network monitoring challenges, like tracking, monitoring, and improving network performance. Addressing these challenges with a Network Traffic Analysis (NTA) solution helps an organization avoid various network monitoring challenges with proactive strategies. PeerSpot real users of Network Traffic Analysis note the advantages of this type of solut...
Content Strategist at PeerSpot
Sep 8, 2022
Network Traffic Analysis (NTA) monitors network availability and activity. It can identify anomalies, including security and operational issues. It uses network communications to detect and investigate security threats as well as malicious or anomalous behaviors within the network. It uses a combination of behavioral modeling, machine learning, and rule-based detection. This helps to create a...
Content Manager at PeerSpot (formerly IT Central Station)
Apr 6, 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why. You can read user reviews for the Top 8 Network Detection and Response (ND...
Senior IT Infrastructure Engineer at Tecnoage
Nov 5, 2021
Keeping up with the evolution of cybersecurity and the threats that are haunting the IT industry across all industries, this text pays special attention to ransomware, as this practice is on the rise in the world of cybercrime. Let's focus on the subject, specifically on the Healthcare sector. We are based on Sophos' annual report on cyber threats, which discusses the continuity of ransomware...
IT Engineer at UTMStack
Aug 15, 2021
What is HIDS in Cybersecurity? A HIDS (Host Intrusion Detection System) is software that detects malicious behavior on the host. It monitors all the operating system operations, tracks user behavior, and operates independently without human assistance. How does a Host-based Intrusion Detection System work? HIDS operates at the OS level, unlike others antivirus systems that operate at the a...
See 1 comment
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Aug 15, 2021
Thanks for sharing its very informative
Product Comparisons
Related Articles
Content Strategist at PeerSpot
Sep 11, 2022
3 Non-Traditional ROIs for a Network Traffic Analysis Solution
Enterprises are increasingly facing multiple network monitoring challenges, like tracking, moni...
Content Strategist at PeerSpot
Sep 8, 2022
5 Challenges that Can be Solved with Network Traffic Analysis (NTA)
Network Traffic Analysis (NTA) monitors network availability and activity. It can identify anom...
Download Free Report
Download our free Intrusion Detection and Prevention Software (IDPS) Report and find out what your peers are saying about Darktrace, Vectra AI, Palo Alto Networks, and more! Updated: January 2023.
672,785 professionals have used our research since 2012.