Chief Information Officer at a tech services company with 1-10 employees
Real User
Top 10
2024-02-20T19:47:00Z
Feb 20, 2024
We are using CrowdStrike Falcon Complete. We are using the managed service program, where they do proactive monitoring. My usage usually includes logging in and looking at the dashboard for any anomalies or anything I need to know and responding to any severity alerts in red, yellow, or green.
Our customers use it, but we deliver the services. We use it for advanced endpoint protection capabilities and threat-hunting capabilities. We use it for data lakes and repositories to reduce the cost and computational efforts for submitting or uploading in the cloud.
IT Director at a computer software company with 51-200 employees
Real User
Top 20
2024-01-30T09:28:00Z
Jan 30, 2024
CrowdStrike Falcon Complete is an XDR solution that we use for our endpoint protection. We currently don't have a complete CrowdStrike Falcon bundle; instead, we have an enterprise bundle in place. For this bundle, agents are installed on all endpoints, and we define security rules to ensure automated workflows are executed through multiple cells using pre-defined playbooks.
Senior Product Executive at a tech services company with 51-200 employees
Real User
Top 20
2024-01-10T10:34:00Z
Jan 10, 2024
We provide service to our customers based on their XDR requirements, such as multi-platform solutions or whatever they have. We use the solution to provide security for those integrated solutions and service their XDR platforms.
Information Technology Infrastructure Manager (Region 2 IT Manager) at NNR Global Logistics USA Inc.
Real User
Top 5
2023-05-10T20:40:59Z
May 10, 2023
Comparing CrowdStrike Falcon Complete with Bitdefender, I would say that Bitdefender was comparatively easier to use, deploy and maintain, especially for my technical resources.
IT Security & Audit Compliance Analyst at Milwaukee City and County
Real User
Top 5
2023-03-13T20:26:53Z
Mar 13, 2023
We use Crowdstrike for monitoring. The Department of Homeland Security's SOC is managing it, so I like it better than Carbon Black because we don't have to provide any support for it.
My organization is a cybersecurity company using CrowdStrike Falcon for incident response and forensic analysis. Twenty-five employees are using it now
Senior Research Analyst - Security, Privacy, Risk & Compliance at a computer software company with 201-500 employees
Real User
Top 20
2022-11-22T16:02:03Z
Nov 22, 2022
Typically, we use the solution for detection, as we outsourced the response element to an MSSP. It also gives us visibility into security threats and allows us to find and eliminate them. For issues that outweigh our capacity, we escalate to our third-party MSSP.
Team Lead for Global Security at a non-tech company with 201-500 employees
Real User
Top 5
2022-10-18T15:44:40Z
Oct 18, 2022
This is their XDR/MDR service offering. Basically, we used it as our endpoint EDR software. We also leveraged their MDR services to outsource any SOC duties for threat detection and containment. We used it in conjunction with LogicHub to have some SOAR capabilities for specific use cases in our environment, which was very useful. It really reduced time for our analysts to do simple detections or things that are triggered for basic automation rules based on a threat instance. We used it as a vulnerability dashboard for endpoint management. We deployed the agent in 95% of our endpoints. It worked much better as an endpoint management tool, like for vulnerability management to track vulnerabilities. It's more about trust and verification rather than relying on the IT Ops team to give us regular reports on the vulnerabilities on the endpoints. We relied on the CrowdStrike system to provide evidence to the IT Ops team for patching things that were not really patched. It really worked well for third-party patch management. It's not labeled for that use. However, it worked really well and really helped our patch management initiative with 24/7 coverage for all our endpoints. We used the quarantine feature as well a few times. We did a trial for it. As an end-point solution, nothing beats it, to be honest.
IT Consultant - Applications & Technology at Select Home Health Services
Consultant
Top 10
2022-07-19T20:22:05Z
Jul 19, 2022
We wanted a very high level of endpoint protection and intrusion detection. Based on all the reviews, you have a bunch of products out there to choose from. One differentiator of CrowdStrike is that it's nearly what I would call zero-touch on the workstation. You don't have to worry about upgrades and all that. Then, when something suspicious is detected, the CrowdStrike team investigates that for us. It's part of the service that we purchased from them. Basically, we use the solution for security.
Assistant Vice President at a financial services firm with 10,001+ employees
Real User
Top 20
2022-06-23T13:11:30Z
Jun 23, 2022
When work-from-home scenarios started in March 2020, during the pandemic, in the month of April, we were actually going through some POCs and had one ransomware attack on one of the client sites. We had to deploy the solution immediately, which actually helped us find out or not how it worked. Proactively, we could identify some threats in the environment and act on them. We were virtually identifying items and getting notifications, as well as seeing the availability of the intra. That was very helpful for the entire team.
IT Analyst at a government with 5,001-10,000 employees
Real User
Top 20
2022-06-01T22:49:00Z
Jun 1, 2022
We use CrowdStrike Falcon Complete as an endpoint detection and response solution. We have over 10,000 users of this product. It requires less than 10 staff to deploy and maintain CrowdStrike. We are looking at rolling out more features of the product.
Falcon is a threat intelligence platform. In cybersecurity, there's always a chance you'll get breached and gaps that need to be addressed, but you'll never know unless there is a threat seeking to exploit that particular weakness. Most use cases for Falcon will be directly ingested into our Siemens server. The total number of users on the solution is around 1,500.
IT Operations Lead at a energy/utilities company with 5,001-10,000 employees
Real User
2022-02-28T11:58:02Z
Feb 28, 2022
We use CrowdStrike Falcon Complete for the management of endpoints, which are located onshore and offshore. CrowdStrike Falcon Complete is mainly for endpoint protection, and we used it alongside Microsoft Defender, to secure our assets, which are either domains or newgroups.
Lead Systems Engineer at a computer software company with 10,001+ employees
Real User
2021-10-25T15:25:22Z
Oct 25, 2021
We have been testing CrowdStrike Falcon Complete but we have not implemented it in our production at this time. However, we have found useful features in CrowdStrike.
Information Technology Manager and ISMS Auditor at a consultancy with 51-200 employees
Real User
2021-07-30T11:32:42Z
Jul 30, 2021
CrowdStrike Falcon Complete is used to inform the IT or security analyst if there is something happening inside the endpoint. Additionally, the EDR can take an action by itself if there is something abnormal happening inside the endpoint.
Sr Manager - Information Security & Researcher at a tech services company with 1,001-5,000 employees
Real User
2021-05-25T13:10:15Z
May 25, 2021
It's an EDR group solution. We use it for behavioral-based analysis. On our endpoints, we have signature-based and behavioral-based analyses, and we use CrowdStrike Falcon Complete for behavioral-based analyses.
Global Data Protection/Privacy Manager, FIP, CIPP/E, CIPM, CISSP at a manufacturing company with 10,001+ employees
Real User
2021-04-16T11:51:50Z
Apr 16, 2021
Currently, we're trying to understand which solution would be able to help us to block external ports on computers. We're looking at Crowdstrike and working to understand how they can help us handle this.
Partner at Fortium Partners: Interim, virtual & fractional CISO and CPO at a tech services company with 51-200 employees
Real User
2021-04-05T21:36:43Z
Apr 5, 2021
Our clients use it for protecting themselves from getting ransomware. Their use case is just to protect their endpoints because it is really bad out there. It is a hybrid deployment. You have to have agents on all the endpoints, and all the CrowdStrike AI is on the cloud.
Director Servicios Administrados de Cybersecurity at a comms service provider with 51-200 employees
Real User
2021-03-16T23:24:05Z
Mar 16, 2021
We are currently testing CrowdStrike Falcon Complete. We have just started to work with this solution. It has many options, but I haven't yet tried them. I have also used it previously in another company.
Senior security consultant at a computer software company with 51-200 employees
MSP
Top 20
2021-03-08T09:56:25Z
Mar 8, 2021
It is an advanced anti-malware solution. Our clients replace the existing traditional antivirus with this solution. We are an implementer. We sell this solution, and then I go and understand the existing environment to deploy it.
We are a solution provider and CrowdStrike Falcon Complete is one of the products that we offer to our customers. We have several different customers for which we provide this software as a service. In other cases, customers purchase licenses for it through us and we administrate it.
Director of Information Security at a computer software company with 201-500 employees
Real User
2021-02-25T11:22:33Z
Feb 25, 2021
We primarily use the solution for endpoint security. It is a very important aspect of security for us as the threat landscape is growing. There constantly needs to be better monitors of the activity on the endpoints and windows server. That's the main driver behind using this solution.
Falcon Complete: Endpoint protection delivered as a service. The highest level of endpoint security maturity delivered immediately, without the burden of building and managing it yourself.
Try Falcon for free at https://go.crowdstrike.com/
We are using CrowdStrike Falcon Complete. We are using the managed service program, where they do proactive monitoring. My usage usually includes logging in and looking at the dashboard for any anomalies or anything I need to know and responding to any severity alerts in red, yellow, or green.
Our customers use it, but we deliver the services. We use it for advanced endpoint protection capabilities and threat-hunting capabilities. We use it for data lakes and repositories to reduce the cost and computational efforts for submitting or uploading in the cloud.
CrowdStrike Falcon Complete is an XDR solution that we use for our endpoint protection. We currently don't have a complete CrowdStrike Falcon bundle; instead, we have an enterprise bundle in place. For this bundle, agents are installed on all endpoints, and we define security rules to ensure automated workflows are executed through multiple cells using pre-defined playbooks.
We use Falcon to protect the overall environment, including the client and the servers.
We commonly use it for mitigating phishing, virus, and malware attacks, making it an essential tool for such security incidents.
We provide service to our customers based on their XDR requirements, such as multi-platform solutions or whatever they have. We use the solution to provide security for those integrated solutions and service their XDR platforms.
Comparing CrowdStrike Falcon Complete with Bitdefender, I would say that Bitdefender was comparatively easier to use, deploy and maintain, especially for my technical resources.
CrowdStrike Falcon Complete is used for endpoint protection, which includes anti-malware, and some MDR capabilities, such as threat hunting.
I primarily use the solution on the could to enhance my security posture. It's used to prevent malware from getting on our systems.
We use Crowdstrike for monitoring. The Department of Homeland Security's SOC is managing it, so I like it better than Carbon Black because we don't have to provide any support for it.
I primarily use Falcon Complete to protect against threats.
My organization is a cybersecurity company using CrowdStrike Falcon for incident response and forensic analysis. Twenty-five employees are using it now
Typically, we use the solution for detection, as we outsourced the response element to an MSSP. It also gives us visibility into security threats and allows us to find and eliminate them. For issues that outweigh our capacity, we escalate to our third-party MSSP.
This is their XDR/MDR service offering. Basically, we used it as our endpoint EDR software. We also leveraged their MDR services to outsource any SOC duties for threat detection and containment. We used it in conjunction with LogicHub to have some SOAR capabilities for specific use cases in our environment, which was very useful. It really reduced time for our analysts to do simple detections or things that are triggered for basic automation rules based on a threat instance. We used it as a vulnerability dashboard for endpoint management. We deployed the agent in 95% of our endpoints. It worked much better as an endpoint management tool, like for vulnerability management to track vulnerabilities. It's more about trust and verification rather than relying on the IT Ops team to give us regular reports on the vulnerabilities on the endpoints. We relied on the CrowdStrike system to provide evidence to the IT Ops team for patching things that were not really patched. It really worked well for third-party patch management. It's not labeled for that use. However, it worked really well and really helped our patch management initiative with 24/7 coverage for all our endpoints. We used the quarantine feature as well a few times. We did a trial for it. As an end-point solution, nothing beats it, to be honest.
It is their MDR. We use CrowdStrike Falcon Complete to manage our security. It is for our endpoint protection.
We use this solution for endpoint protection of a user, a computer, a server, or a virtualization.
We wanted a very high level of endpoint protection and intrusion detection. Based on all the reviews, you have a bunch of products out there to choose from. One differentiator of CrowdStrike is that it's nearly what I would call zero-touch on the workstation. You don't have to worry about upgrades and all that. Then, when something suspicious is detected, the CrowdStrike team investigates that for us. It's part of the service that we purchased from them. Basically, we use the solution for security.
I would say it is for endpoint security, malware, antivirus, and advanced threat monitoring.
When work-from-home scenarios started in March 2020, during the pandemic, in the month of April, we were actually going through some POCs and had one ransomware attack on one of the client sites. We had to deploy the solution immediately, which actually helped us find out or not how it worked. Proactively, we could identify some threats in the environment and act on them. We were virtually identifying items and getting notifications, as well as seeing the availability of the intra. That was very helpful for the entire team.
I use Falcon Complete for scanning devices.
We use CrowdStrike Falcon Complete as an endpoint detection and response solution. We have over 10,000 users of this product. It requires less than 10 staff to deploy and maintain CrowdStrike. We are looking at rolling out more features of the product.
Falcon is a threat intelligence platform. In cybersecurity, there's always a chance you'll get breached and gaps that need to be addressed, but you'll never know unless there is a threat seeking to exploit that particular weakness. Most use cases for Falcon will be directly ingested into our Siemens server. The total number of users on the solution is around 1,500.
We use CrowdStrike Falcon Complete for the management of endpoints, which are located onshore and offshore. CrowdStrike Falcon Complete is mainly for endpoint protection, and we used it alongside Microsoft Defender, to secure our assets, which are either domains or newgroups.
This is a security solution used for its antivirus, endpoint detection, and response capabilities.
We have been testing CrowdStrike Falcon Complete but we have not implemented it in our production at this time. However, we have found useful features in CrowdStrike.
CrowdStrike Falcon Complete is used to inform the IT or security analyst if there is something happening inside the endpoint. Additionally, the EDR can take an action by itself if there is something abnormal happening inside the endpoint.
We primarily use the solution for security purposes. We use it to protect our endpoints and prevent any kind of malicious attacks on our company.
We are using this solution for endpoint protection.
It's an EDR group solution. We use it for behavioral-based analysis. On our endpoints, we have signature-based and behavioral-based analyses, and we use CrowdStrike Falcon Complete for behavioral-based analyses.
We use the solution for security.
We implemented this solution to secure everything in our environment, such as our endpoints, servers, and network.
Currently, we're trying to understand which solution would be able to help us to block external ports on computers. We're looking at Crowdstrike and working to understand how they can help us handle this.
Our clients use it for protecting themselves from getting ransomware. Their use case is just to protect their endpoints because it is really bad out there. It is a hybrid deployment. You have to have agents on all the endpoints, and all the CrowdStrike AI is on the cloud.
We are currently testing CrowdStrike Falcon Complete. We have just started to work with this solution. It has many options, but I haven't yet tried them. I have also used it previously in another company.
It is an advanced anti-malware solution. Our clients replace the existing traditional antivirus with this solution. We are an implementer. We sell this solution, and then I go and understand the existing environment to deploy it.
We are a solution provider and CrowdStrike Falcon Complete is one of the products that we offer to our customers. We have several different customers for which we provide this software as a service. In other cases, customers purchase licenses for it through us and we administrate it.
We primarily use the solution for endpoint security. It is a very important aspect of security for us as the threat landscape is growing. There constantly needs to be better monitors of the activity on the endpoints and windows server. That's the main driver behind using this solution.
We use the solution for AB protection and endpoint detection and response.
Our primary use case is an ordinary antivirus. We also use it to watch the activity on the machine.
We primarily use this solution for our clients.
We primarily use the solution for mobile and endpoint protection.
We primarily use the solution for server endpoint protection as well as client and user client endpoint protection.
We use CrowdStrike as our endpoint protection solution for all of our devices.