Overview
CrowdStrike Falcon Cloud Security provides threat detection and response, breach protection, and continuous posture management for any with our adversary-focused Cloud Native Application Protection Platform powered by holistic intelligence and end-to-end protection from the host to the cloud, delivering greater visibility, compliance and the industry's fastest threat detection and response to outsmart the adversary.
CrowdStrike's Cloud Security Offerings Include:
Falcon Cloud Security: Breach protection including threat intelligence, detection and response, workload runtime protection and cloud security posture management across AWS, Azure and GCP.
Falcon Cloud Security for Containers: Includes the features and capabilities of Falcon Cloud Security, and also container and Kubernetes protection. It can be deployed across on-premises, hybrid and multi-cloud environments.
Falcon for Managed Containers: Container security and runtime protection for cloud service providers managed containers, including threat intelligence, detection and response, container image security and Kubernetes protection.
CrowdStrike Falcon Cloud Security leverages AWS Built-in for event-driven deployment automation in multi-account environments. Integrations with AWS services including CloudTrail, EventBridge, IAM, Systems Manager, AWS Control Tower, and AWS Organizations will dynamically keep your cloud resources protected. Use the AWS Built-in template for the simplest deployment path. Documentation and templates available at https://aws-abi.s3.amazonaws.com/guide/cfn-abi-crowdstrike-fcs/overview/index.htmlÂ
Learn more at: https://www.crowdstrike.com/products/cloud-security/Â
CrowdStrike Sensor Licensing FAQ: https://www.crowdstrike.com/crowdstrike-sensor-licensing-faq/Â
Highlights
- End-to-end Cloud Native Security: Gain real-time visibility, detection, and response to prevent data breaches, enforce security policies and ensure compliance, reduce alert fatigue creating less work for security teams and optimize cloud deployments
- Discovery, Visibility and Compliance For Any Cloud: Gain visibility into your entire cloud infrastructure, continuously monitor for misconfigurations, ensure security policy and compliance enforcement, and proactively detect and prevent threats
- Protect Workloads, Hosts and Containers: Get access to automated discovery, runtime protection, EDR for cloud workloads and containers, and managed threat hunting on a single lightweight agent enabling you to securely deploy applications in the cloud
Details
Unlock automation with AI agent solutions

Features and programs
Trust Center
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Custom pricing options
How can we make this page better?
Legal
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Support
Vendor support
You can log a support ticket for any issues directly from the Falcon Portal or by emailing the support team at cloudmarketplaceoffers@crowdstrike.com Basic support services such as email communications to the CrowdStrike Support team, access to the support portal and basic troubleshooting and technical assistance.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

Standard contract
Customer reviews
Seamless cloud asset monitoring and improved threat detection have strengthened client security posture
What is our primary use case?
I usually work with CrowdStrike Falcon Cloud Security . I work with all the modules, IDP , and the Falcon EDR. My experience with them has been great. I requested information because a customer was about to switch from CrowdStrike IDP to Microsoft ITDR , so I needed to understand the differences and what makes ITDR special. I work as customer support for the majority of banks in Nigeria, supporting their CrowdStrike Falcon Cloud Security implementation. I needed to understand what was making some of them switch from CrowdStrike to ITDR, and the basic reason was cost. In terms of technicality, CrowdStrike Falcon Cloud Security was obviously better, but it was a bit expensive for them.
The typical use case for cloud security varies. Sometimes, rather than using Rapid7 exposure management, some customers use CrowdStrike Falcon Cloud Security to monitor their assets on the cloud, providing insights into vulnerabilities on machines, exposed assets, and misconfigurations.
How has it helped my organization?
Compared to before, in respect to breaches and downtime, they have seen significant differences.
What is most valuable?
Customers love the UI of CrowdStrike Falcon Cloud Security. They appreciate everything about the dashboard and dashlet. The majority of customers particularly love how seamless the integration is - just copy and paste in your AWSÂ terminal and you're good to go.
The threat detection capability of CrowdStrike Falcon Cloud Security has always been the major seller, and it works effectively. Looking at the detection index for the last two years, CrowdStrike Falcon Cloud Security is consistently ranked number one. Then you have MD and Sentinel alternating positions. In terms of threat detection, CrowdStrike Falcon Cloud Security has always been top-notch in how they explain the workflows.
What needs improvement?
In terms of improvement, CrowdStrike Falcon Cloud Security could expand into the remediation path. While there is the IT security module, looking at competitors such as Vicarious and SCCM, there is room for advanced capabilities. If CrowdStrike Falcon Cloud Security could implement pushing out remediation from the sensor installed on machines, that would be beneficial. This feature is likely in their pipeline, but implementing it faster would help them maintain their competitive edge.
For how long have I used the solution?
I am a partner with CrowdStrike Falcon Cloud Security.
How was the initial setup?
The initial setup and deployment of the solution is straightforward.
What was our ROI?
I have seen a return on investment with CrowdStrike Falcon Cloud Security.
What other advice do I have?
CrowdStrike Falcon Cloud Security is relatively new, approximately a year or two old. I have experience working with both CrowdStrike Falcon Cloud Security and Microsoft Defender for Identity .
I work with CrowdStrike Falcon Cloud Security, Falcon LogScale , Observability , and Sandbox. Different teams manage different parts of CrowdStrike's workload protection features.
I rate CrowdStrike Falcon Cloud Security 9 out of 10 overall.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Crowdstrike falcon Cloud Security helps for Secure our network from cyber attacks
Visibility
Alerting
Auto update ptaches
Need to Improve Performance
Has improved threat detection accuracy and helped monitor endpoints across hybrid environments
What is our primary use case?
We mostly use CrowdStrike Falcon Cloud Security for different clients across the globe, and we have installed all the agents on most machines to monitor each and every employee, along with laptops and servers in AWS . We are the core monitoring staff with a SOC where we monitor for viruses, malware, and to remove harmful files. Our primary use cases involve monitoring miscellaneous activities.
I have been using CrowdStrike Falcon Cloud Security 's workload protection features because it's a very lightweight agent. Its detection speed is remarkable compared to other tools on the market, including Trend Micro. CrowdStrike Falcon Cloud Security is user-friendly and provides detection transparency, allowing us to present real-time documentation to our executives clearly explaining any detected issues.
Workload protection features influence our security strategy significantly, particularly by blocking any suspicious activities on public-facing servers and generating immediate notifications for us to act upon. It helps in quickly identifying whether potential issues need to be whitelisted or blocked, and assists in troubleshooting when applications trigger false alerts due to bugs.
What is most valuable?
The most valuable capabilities of CrowdStrike Falcon Cloud Security relate to preventing attacks caused by human error, such as when someone plugs in a USB device or downloads something without caution. It automatically blocks duplication and activities that could result in data loss, effectively preventing unintended copying of data to personal devices.
Deduplication prevention is definitely the most valuable feature.
CrowdStrike Falcon Cloud Security excels in threat detection with a vast investigation structure, allowing us to verify suspicious activities to identify root causes. It helps us trace back to the origin and fix issues, making it a user-friendly tool for this kind of detection.
CrowdStrike Falcon Cloud Security is built on AI and ML technology, enabling it to detect various threats and block suspicious activities immediately, which is particularly effective compared to traditional AVs and EDRs.
The analytics provided by CrowdStrike Falcon Cloud Security is key for maintaining a proactive security posture. Its AI and ML foundations offer extensive information on threats and suspicious activities, making it renowned for analysis in the industry.
What needs improvement?
The improvements needed for CrowdStrike Falcon Cloud Security include reducing its high cost, which is currently quite expensive, and enhancing the executive reports that are user-friendly for technical engineers but require improvement for higher management.
More detailed and granular reports would be beneficial for better executive comprehension.
For how long have I used the solution?
I have been using CrowdStrike Falcon Cloud Security for more than eight to nine years, but for the past two years, I have not been using it much because I moved into a different domain.
What do I think about the stability of the solution?
When evaluating the stability of CrowdStrike Falcon Cloud Security, their partnerships with all major cloud service providers ensure their servers are optimally positioned, leading to no latency or stability issues that I have observed.
What do I think about the scalability of the solution?
CrowdStrike Falcon Cloud Security is indeed highly scalable, ideally for enterprises with a minimum of 2,000 servers to ensure cost efficiency and easier setup.
CrowdStrike Falcon Cloud Security is primarily suited for larger enterprises and not for small or medium companies.
How are customer service and support?
I have a very good in-house team of about 20 to 30 people working with CrowdStrike Falcon Cloud Security, and we maintain excellent communication with their technical support, resolving any issues immediately without complaints on technical aspects or delays.
Based on my experience with CrowdStrike Falcon Cloud Security's technical support, I would rate them a solid 10 out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
With 19 years of experience in the industrial field, I have also used technologies such as BigFix , Ivanti, Qualys, and I am considering reviewing Tenable, Ivanti Endpoint Manager , Ivanti Security Control, Tanium , and others, including HCL BigFix and Qualys Patch Management .
How was the initial setup?
I participated in the initial setup and deployment of CrowdStrike Falcon Cloud Security.
The implementation plan I typically follow involves multiple installation methods, one being agentless via AD to push agents, and the other using patching tools such as Ivanti and BigFix. This process can take around 15 to 20 days for 2,000 to 3,000 servers or endpoints due to its user-friendly cloud-based configuration.
During the initial setup, I faced some false alerts due to older versions of some applications we used, which may exhibit atypical behavior. Normalizing these false alerts generally takes around one to two weeks after the initial installation to resolve and ensure smooth operation.
What about the implementation team?
Our company has a partnership with CrowdStrike, so we are one of their partners, and that is how we acquired CrowdStrike Falcon Cloud Security. I bought it directly from CrowdStrike.
Some of our customers purchase CrowdStrike Falcon Cloud Security directly from CrowdStrike while others purchase it via AWS Marketplace or other marketplaces.
What was our ROI?
More than 12 million vulnerabilities have been identified and resolved while working with CrowdStrike Falcon Cloud Security over the past 10 years, which I have been monitoring diligently. This figure reflects the work done not only by me but also collectively with about four customers in one single console, giving a complete picture of our efforts.
What's my experience with pricing, setup cost, and licensing?
The cost of CrowdStrike Falcon Cloud Security is currently quite high, which is an area that needs improvement, particularly for the executive reports that are user-friendly for technical engineers but require enhancement for higher management.
Which other solutions did I evaluate?
With 19 years of experience in the industrial field, I have used technologies such as BigFix, Ivanti, Qualys, and I am considering reviewing Tenable, Ivanti Endpoint Manager , Ivanti Security Control, Tanium , and others, including HCL BigFix and Qualys Patch Management .
What other advice do I have?
I use CrowdStrike Falcon Cloud Security internally in my company. CrowdStrike Falcon Cloud Security is recognized for its reliability, and I can guarantee they are very reliable. My overall rating for CrowdStrike Falcon Cloud Security is 8 out of 10.