We use Falcon as a cloud-based security platform.
CrowdStrike Falcon Cloud Security
CrowdStrikeExternal reviews
External reviews are not included in the AWS star rating for the product.
Smooth experience!
Cs falcon
But they provide update frequently
With UI feature also they change name and features which require time to adapt
Effective EDR for Large Infrastructure
Good experience
Crowd strike best could security tool
It's a cloud-based solution so it's light on resource usage
What is our primary use case?
What is most valuable?
Falcon is a cloud-based technology, so its resource usage is light. You deploy the agents to your endpoints, but the processing is done on the cloud, so your CPU utilization is only about 2 percent. Some other solutions use between 30 to 60 percent.
CrowdStrike has some of the best threat detection capabilities you can get. It's a market leader.
What needs improvement?
Customers would benefit if CrowdStrike adopted some of SentinelOne's technologies.
For how long have I used the solution?
I have used Falcon for two years.
What do I think about the stability of the solution?
I rate Crowdstrike 10 out of 10 for stability.
What do I think about the scalability of the solution?
CrowdStrike Falcon is 100 percent scalable. I've had no issues.
How are customer service and support?
I rate CrowdStrike support eight out of 10.
How would you rate customer service and support?
Positive
What's my experience with pricing, setup cost, and licensing?
CrowdStrike Falcon is very expensive.
What other advice do I have?
I rate CrowdStrike Falcon Cloud Security eight out of 10. If you're looking for something more advanced than traditional antivirus, I recommend CrowdStrike. It's more adaptable and stable. Falcon is one of the best solutions on the market.
Provides good Cloud security, and stability, but the documentation has room for improvement
What is our primary use case?
We use CrowdStrike Falcon Cloud Security to manage our clients' cloud environments. It provides us with a unified view of all their cloud configurations, across different cloud providers. This allows us to identify security weaknesses, improve their overall security posture, and ultimately limit potential attacks on their systems.
Our CrowdStrike Falcon Cloud Security deployments vary, with some clients utilizing hybrid models, but the majority leverage private clouds hosted on AWS and Azure.
What is most valuable?
The most valuable features of CrowdStrike Falcon Cloud Security are Cloud Security Posture Management and Cloud Workload Protection, offering more visibility and protection across our cloud environment.
What needs improvement?
CrowdStrike Falcon Cloud Security should function as a standalone solution, offering Cloud Security Posture Management, Cloud Infrastructure Entitlement Management, and Cloud Workload Protection capabilities without requiring integration with additional Assurance, Detection, and Response solutions. This would allow clients to implement Falcon Cloud Security independently within their systems, eliminating the need for integrations.
The CrowdStrike partner portal documentation could be improved to provide proper instructions for integrating their products. Currently, the documentation lacks step-by-step details, forcing users to seek assistance from OEM partners. Fortunately, the integration process itself is straightforward.
For how long have I used the solution?
I have been using CrowdStrike Falcon Cloud Security for two months.
What do I think about the stability of the solution?
In the short time I have been using CrowdStrike Falcon Cloud Security it has been stable.
What do I think about the scalability of the solution?
I would rate the scalability of CrowdStrike Falcon Cloud Security eight out of ten.
How are customer service and support?
The technical support is good. We access through our OEM partner whenever support is required.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
After finding that Palo Alto Prisma Cloud's market value seemed to be declining and customer interest in its features waned, we transitioned to CrowdStrike, because it holds a strong market presence in India.
How was the initial setup?
As a CrowdStrike partner, we're currently conducting a review of the Falcon Cloud platform. Following this internal evaluation, we plan to deploy it for one of our largest clients in India, and we're actively preparing for a successful implementation.
The initial deployment is straightforward.
What other advice do I have?
I would rate CrowdStrike Falcon Cloud Security seven out of ten.
CrowdStrike Falcon Cloud Security is deployed in multiple locations in multiple regions and offices in India. Each office has its own cloud systems that reside in its region.
I recommend CrowdStrike Falcon Cloud Security to others.
CrowdStrike Falcon Cloud Security offers a robust and secure solution, backed by a reliable support system to ensure your cloud environment is well-protected.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Powerful and proactive: Crowdstrike falcon EDR delivers top notch endpoint security
It's easy to gather insights and conduct analysis about existing threats
What is our primary use case?
We use Falcon to protect endpoints, including the on-premise systems and cloud environment.
How has it helped my organization?
CrowdStrike protects us from vulnerabilities and threats while mitigating the risk. The security integration is quite good, but we had a few issues integrating with some of our client's endpoints. They wanted us to monitor some of their medical devices, such as MRIs, in case anyone attempted to attack through them.
What is most valuable?
It's easy to gather insights and conduct analysis about existing threats. Threat hunting enables you to track on-prem services, and the real-time response capability improves threat and risk analysis.
What needs improvement?
The threat intelligence and user behavioral analysis could be more comprehensive.
For how long have I used the solution?
I have used CrowdStrike Falcon for 3 years.
What do I think about the stability of the solution?
I rate CrowdStrike Falcon 6 out of 10 for stability.
What do I think about the scalability of the solution?
I rate CrowdStrike Falcon 7 out of 10 for scalability.
How are customer service and support?
I rate CrowdStrike support 8 out of 10. We've had a good experience with them. They're helpful and always respond quickly.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I've worked with Microsoft Defender. I'm more familiar with that.
How was the initial setup?
I don't have hands-on experience with the deployment. My team deployed it. The deployment time varies, and we do it in batches. It involves many tasks, and it can take weeks. After deployment, it requires regular patching.
What's my experience with pricing, setup cost, and licensing?
You can't get a fixed price for these tools. If you subscribe to something and need to deploy it to another team, the price goes up. It's the same with Microsoft Defender. I'm not responsible for the budget, but I think it's cost-effective for providing detection and response for an entire organization.
What other advice do I have?
I rate CrowdStrike Falcon Cloud Security 8 out of 10.
Boasts a wide range of features while remaining exceptionally lightweight and improves our security posture
What is our primary use case?
We use CrowdStrike Falcon Cloud Security for our client's endpoint security in the manufacturing, banking, and IT industries.
How has it helped my organization?
CrowdStrike Falcon Cloud Security has helped improve our security operations. When facing signatureless attacks, CrowdStrike's EDR solution, which also incorporates SOAR capabilities, can prevent attacks in real-time. The SOAR engine detects malicious activity and suspicious file or transaction behavior on the network. Based on this detection, CrowdStrike proactively prevents these attacks. Additionally, features like Spotlight, a valuable tool for vulnerability management, provide remediation actions. Spotlight identifies the specific patches or knowledge base (KB) articles needed to mitigate these types of attacks.
To experience the full value of CrowdStrike Falcon Cloud Security, we recommend deploying the Falcon Agent on at least 500 systems and monitoring their activity for 15 days to a month. This deployment will provide comprehensive visibility into whether CrowdStrike can detect suspicious activity that might be missed by other third-party antivirus solutions and firewalls.
What is most valuable?
The CrowdStrike platform boasts a wide range of features while remaining exceptionally lightweight. Compared to traditional antivirus software, its impact on system resources is minimal. In terms of specific figures, CPU utilization typically ranges from one to two percent, while memory usage falls between 12 and 15 MB. This translates to a very small footprint on our system.
CrowdStrike utilizes signatureless technology, eliminating the need for regular signature updates on endpoint systems. It provides protection based on processes and activity behavior observed on the endpoint. The platform collects raw telemetry data from the endpoint and leverages it to proactively offer prevention and EDR capabilities. This approach offers multiple benefits, including eliminating the need for manual scans and providing broader protection against both known and unknown threats.
What needs improvement?
Due to the time zone difference, we in India experience delays in accessing immediate support for L2 and production-related issues until engineers become available in their respective time zones.
The CrowdStrike dashboard currently lacks a username field. This creates a gap for customers who manage multiple systems under a single username, making it difficult to identify individual systems based on username alone. Adding a dedicated username column to the dashboard would greatly improve its functionality in this regard.
For how long have I used the solution?
I have been using CrowdStrike Falcon Cloud Security for five years.
What do I think about the stability of the solution?
I would rate the stability of CrowdStrike Falcon Cloud Security ten out of ten. We have not received any complaints from our multiple customers related to stability.
What do I think about the scalability of the solution?
I would rate the scalability of CrowdStrike Falcon Cloud Security ten out of ten.
How are customer service and support?
While there may be delays due to time zones, the technical support itself is good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
In collaboration with a security partner, we work with several other OEMs, including Symantec, McAfee, and Trend Micro.
How was the initial setup?
The initial deployment is straightforward.
We utilize several third-party deployment tools for our installations, including Microsoft GPO, SCCM, and solutions offered by other market OEMs. These tools allow us to deploy the CrowdStrike Falcon Agent across all endpoints. Before deployment, we confirm the absence of any existing antivirus software. If the customer is already employing legacy antivirus solutions, we typically configure Falcon prevention policies to operate in "monitor mode." This means Falcon will monitor for threats without actively interfering with the existing antivirus. We refrain from uninstalling the legacy software until it becomes necessary. Once uninstalled, the Falcon prevention mode is switched to "aggressive mode," enabling it to function as the primary antivirus on the endpoint. This approach ensures a smooth transition while safeguarding endpoint security.
What other advice do I have?
I would rate CrowdStrike Falcon Cloud Security ten out of ten.
CrowdStrike Falcon Cloud Security is deployed in multiple locations and departments.
No maintenance is required.
CrowdStrike Falcon Cloud Security offers flexible integration with various third-party security products, including SIEM and proxy solutions. This capability significantly enhances our organization's overall security posture by facilitating seamless integration with existing tools via its robust API functionality.