It also helps you with access, like we have dark web monitoring and admin protection management. So, the use cases can vary from organization to organization, but every organization has different value in it.

External reviews
External reviews are not included in the AWS star rating for the product.
Prevent unauthorized access or identity theft from external sites
What is our primary use case?
What is most valuable?
It helps to prevent unauthorized access or identity theft from external sites. If your identity is stolen, you can ban it.
Real-time monitoring is important because it runs multiple things on a single platform, like IDA, EDR, XDR, and SIM solutions. It captures all technology with one agent, which makes it easier for us to fix customer issues.
Having a single console is helpful, especially when customers have multiple vendors for their products. It's easier to manage one partner. In this case, CrowdStrike Falcon helps.
What needs improvement?
One thing that is not yet available is attack simulation. For example, if someone tries to attack your Active Directory on inactive accounts, a cyber attacker could hack those accounts and try to get into your company. This could be a feature to add. It would give a fake reply each time someone tries to hack it. Multiple companies that I know of would like that.
For how long have I used the solution?
I have been using it for two years.
What do I think about the stability of the solution?
It is a stable product.
What do I think about the scalability of the solution?
I would rate the scalability a nine out of ten. It's a scalable solution that is very easy to deploy.
It is suitable for every kind of business, including small, medium, or enterprise businesses.
How are customer service and support?
Technical support depends on a system integrator.
CrowdStrike technical support regarding Identity Protection has a team, but if there's no issue with the agent, you can work it out yourself.
The support is good.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is easy. We only have one option available right now: on the cloud. It gets applied to endpoints, but it's cloud-based.
It is very easy to integrate this product into our existing environment.
What's my experience with pricing, setup cost, and licensing?
It's a premium product.
What other advice do I have?
From my end, it works. But it can be recommended or viewed by a personal customer. We are not the sole user of CrowdStrike Falcon. It's the end user.
I would recommend using it. For me, it is the best product ever. Overall, I would rate it an eight out of ten.
Which deployment model are you using for this solution?
Easy Deployment, Light, and Stellar EDR
Prevent privilege escalation with highest credentials but have issues with updates
What is our primary use case?
We use the solution for Windows and non-Windows infrastructure. We have Falcon clients on all our machines.
How has it helped my organization?
We integrate with CyberArk, which includes DNA reporting, particularly for identifying old and ticket-based attacks. We’ve implemented this integration to receive risk-based scoring. Our strategy focuses on preventing privilege escalation, as our last major incident, NotPetya, resulted from this vulnerability. To address this, we’ve implemented measures through CyberArk and CrowdStrike.
What is most valuable?
When we encounter phishing attacks via email, we sandbox any reported items. Whenever a suspicious email is reported, we conduct sandboxing in CrowdStrike and block emails, domains, and IPs based on the resulting threat intelligence.
The most critical aspect is preventing privilege escalation, particularly for domain admins with the highest credentials. With our integration of CyberArk, passwords are never transmitted to the endpoint. Instead, a secure RDP file is created, and Falcon is used to prevent privilege escalation attempts.
What needs improvement?
As customers, we always update our systems whenever a new release is available, with clients connecting directly to the Internet for these updates. We have an agent who manages these updates on the clients, but as an organization, we don’t have control over them. CrowdStrike should assess the impact on endpoints before releasing such updates.
Our organization now seeks AI-based stock monitoring to prioritize thousands of alerts generated across various platforms. The AI integration is still in its early stages, so we would like to see Falcon develop tools that can integrate with multiple platforms and help identify the highest-priority alerts.
For how long have I used the solution?
I have been using CrowdStrike Falcon Threat Intelligence since 2017. We are using the latest version of the solution.
What do I think about the stability of the solution?
I rate the solution’s stability a nine out of ten.
What do I think about the scalability of the solution?
The integration part is very good. CrowdStrike collaborates with most security vendors, so it's very easy to get one platform for our risk factors across the enterprise.
40 thousand devices are using this solution. We get many alerts from Falcon, sometimes from end users and sometimes from Internet-facing servers.
I rate the solution's scalability a nine out of ten.
How are customer service and support?
We struggle to get specialized resources from CrowdStrike in a few cases.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
CrowdStrike Falcon Black is an on-premise solution that was very complicated, so we faced performance issues. The main reason for the switch is the performance issues reported by multiple application owners.
How was the initial setup?
Initially, we faced many challenges because we had to open ports from each of our subnets to Falcon, as it’s a SaaS solution. Each client needs to communicate with Falcon servers for threat intelligence. Due to the complexity of our network, we had to carefully consider all security aspects when opening the external communication ports to Falcon.
It took 25 to 30 days to deploy it completely.
We began with our Tier 0 servers, which had the most critical and highest privileges. After securing those, we moved on to Tier 1 and Tier 2 as we continued deployment. Our approach was to first address the highest risk factors across the enterprise and then gradually move on to securing endpoints like user desktops and laptops.
I rate the initial setup as seven out of ten, where one is difficult, and ten is easy.
What about the implementation team?
We took professional services from CrowdStrike, so it was done in-house with only two people: one from the execution team and one from the cybersecurity team.
What was our ROI?
When we track the annual priority cases, especially the security incidents, we have made many improvements. That is ROI in terms of tracking security incidents.
What's my experience with pricing, setup cost, and licensing?
I rate the product’s pricing a six out of ten, where one is cheap and ten is expensive.
What other advice do I have?
Most customer requirements focus on email security, so we’ve implemented Mimecast. CrowdStrike Falcon integrates with Mimecast, allowing us to provide advanced security beyond Office 365’s capabilities. With DMARC in place, Falcon helps us identify domains that pose a risk to the organization.
I advise you to look for customer feedback, and then they should also look for Gartner and other industry leaders so you get the ranking.
Overall, I rate the solution a seven out of ten.
Which deployment model are you using for this solution?
Crowdstrike :Advanced and powerful Al Native Endpoint protection platform.
Single unified Console and lightweight agent for all services.
deployed in minutes and NO reboot required.
And you can manage the all your services on singel console .
Api integration with many vendors are availble.24/7 support services also avilable in crowdstrike.
you can use this daily without any headache.
Taking Endpoint security to whole another level
Ease of Integration: - We can easily integrate crowdstrike falcon with other technologies with the help of APIs and data connectors.
Frequency of Use: - Since it is an NGAV it is being used on a daily basis in our organization.
Number of Features: - Crowdstrike provide variety of features with in their falcon endpoint protection platform like USB device control, Insight of endpoints, different set of policies which gives falcon admins a granular control over their endpoints.
Best AL/ML endpoint protection product.
easy to implementation policies.
customer support get all time.
Frequency to use all day.
Number of features like device contril,application control,adaptive threat protection.
Easy to integration in on-prem and cloud.
Stuck sometimes.
Slowness.
Offers good AI features to users
What is our primary use case?
I used the tool since my company wanted a product with next-generation antivirus and EDR, as it can help with the detection of malicious activities and behavior detection, and the MI and machine learning part in the tool also helps.
What needs improvement?
Only for the customized IOCs, there is a need to highlight certain aspects, and based on it, we get to block only the hash values but is not based on the file name, like .exe, or other extensions, so I can't block them, making it in an area where the solution needs to improve.
My company had raised a concern with CrowdStrike's support team when one of the antivirus applications that communicates with CrowdStrike started misbehaving. For both the aforementioned tools, the same support ticket had to be raised. If my company had to provide any suggestions regarding the whitelisting part, there was a delay of over a month when dealing with the product's support team. If the tool's support team suggests users follow certain steps, and if it is not followed or is not in progress, then after two or three days, the tool's support team needs to join a video call and provide a resolution to the users.
Some policies in the tool need to be fine-tuned. Customized IOCs need to be improved since they have certain shortcomings. With the customized IOCs, it can be made possible to block a file extension with a filename or file extension type of blocking. Providing users with the ability to customize policies would be a good improvement to the solution.
For how long have I used the solution?
I have been using CrowdStrike Falcon Threat Intelligence for a year. I am a user of the tool.
What do I think about the stability of the solution?
Stability-wise, I rate the solution an eight and a half out of ten.
What do I think about the scalability of the solution?
Scalability-wise, I rate the solution an eight out of ten.
My company's cybersecurity and IT security team use the tool. In my company, there are 15,000 users. For servers, there are 1,500 users.
Right now, there is no need to increase the usage of the tool.
How are customer service and support?
The solution's technical support is not good. I rate the technical support a four to five out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have experience with Palo Alto.
The detection and other functionalities in CrowdStrike and Palo Alto are the same, but cost-wise, CrowdStrike is reasonable. Technically, I would prefer Palo Alto over CrowdStrike.
How was the initial setup?
The product's deployment phase is easy. I rate the setup phase of the tool as a ten on a scale where one is difficult and ten means it is an easy process.
The solution can be deployed in the cloud and on an on-premises model.
The solution can be initially deployed in a minute.
Considering the number of users, servers, cloud, and on-premises environment, it hardly takes 15 to 20 days. When there are laptop and desktop users who are online, and there is a need to install the agent, then there can be some issues, and with such minor things, ten days are more than enough for the installation.
What's my experience with pricing, setup cost, and licensing?
CrowdStrike is a reasonably priced tool.
What other advice do I have?
In terms of the ability of the tool to deal with threats, I would say that the product does it by around 85 percent.
The real-time response of the tool is good, and I feel it is around 90 to 95 percent.
The tool's incident-handling capability is good.
Considering the influence of the product on our company over some time, I would say that the solution is cost-effective and offers good threat detection features. The tool's interface is also good.
The tool's AI features are good, but they are not useful for our company since the area of detection is not something in our bucket right now.
If you have a big budget, go with Palo Alto. If you have a low budget and want a tool that provides more accuracy during detection, then it is better to go with CrowdStrike.
I rate the tool a nine out of ten.
Which deployment model are you using for this solution?
new age EDR solution
easier to install and deploy in the network
amazing customer support during and after the deployment
easier to integrate with other security solutions
features are too confusing limiting users in confusion with so many options in the policy
A complete safeguard endpoint solution
Easy to use, no difficulties in console.
Easy to implementation agent and make policies.
Customer Support is provided 24*7.
Number of features like devices control,Exclution.
Easy of integration in on-premise and saas.
Seperate License have to buy for products.
Troubleshooting may be lately solve.
Sometimes may raise ticket for asking queries.