Listing Thumbnail

    CrowdStrike Falcon Cloud Security

     Info
    Deployed on AWS
    Vendor Insights
    CrowdStrike Cloud Security unifies cloud security posture management together with breach protection for cloud workloads and containers for any cloud, in a single platform. The cloud-native solution provides end-to-end protection from the host to the cloud and everywhere in between.

    Overview

    CrowdStrike Falcon Cloud Security provides threat detection and response, breach protection, and continuous posture management for any with our adversary-focused Cloud Native Application Protection Platform powered by holistic intelligence and end-to-end protection from the host to the cloud, delivering greater visibility, compliance and the industry's fastest threat detection and response to outsmart the adversary.

    CrowdStrike's Cloud Security Offerings Include:

    Falcon Cloud Security: Breach protection including threat intelligence, detection and response, workload runtime protection and cloud security posture management across AWS, Azure and GCP.

    Falcon Cloud Security for Containers: Includes the features and capabilities of Falcon Cloud Security, and also container and Kubernetes protection. It can be deployed across on-premises, hybrid and multi-cloud environments.

    Falcon for Managed Containers: Container security and runtime protection for cloud service providers managed containers, including threat intelligence, detection and response, container image security and Kubernetes protection.

    CrowdStrike Falcon Cloud Security leverages AWS Built-in for event-driven deployment automation in multi-account environments. Integrations with AWS services including CloudTrail, EventBridge, IAM, Systems Manager, AWS Control Tower, and AWS Organizations will dynamically keep your cloud resources protected. Use the AWS Built-in template for the simplest deployment path. Documentation and templates available at https://aws-abi.s3.amazonaws.com/guide/cfn-abi-crowdstrike-fcs/overview/index.html 

    Learn more at: https://www.crowdstrike.com/products/cloud-security/ 

    CrowdStrike Sensor Licensing FAQ: https://www.crowdstrike.com/crowdstrike-sensor-licensing-faq/ 

    Highlights

    • End-to-end Cloud Native Security: Gain real-time visibility, detection, and response to prevent data breaches, enforce security policies and ensure compliance, reduce alert fatigue creating less work for security teams and optimize cloud deployments
    • Discovery, Visibility and Compliance For Any Cloud: Gain visibility into your entire cloud infrastructure, continuously monitor for misconfigurations, ensure security policy and compliance enforcement, and proactively detect and prevent threats
    • Protect Workloads, Hosts and Containers: Get access to automated discovery, runtime protection, EDR for cloud workloads and containers, and managed threat hunting on a single lightweight agent enabling you to securely deploy applications in the cloud

    Details

    Categories

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Trust Center

    Trust Center
    Access real-time vendor security and compliance information through their Trust Center powered by Drata. Review certifications and security standards before purchase.

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Vendor Insights

     Info
    Skip the manual risk assessment. Get verified and regularly updated security info on this product with Vendor Insights.

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. Request a private offer to receive a custom quote. Sign in to view any offers that have been extended to you.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    You can log a support ticket for any issues directly from the Falcon Portal or by emailing the support team at cloudmarketplaceoffers@crowdstrike.com  Basic support services such as email communications to the CrowdStrike Support team, access to the support portal and basic troubleshooting and technical assistance.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    25
    In Security
    Top
    100
    In Security
    Top
    10
    In Education & Research

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Cloud Security Posture Management
    Unified cloud security management across AWS, Azure, and GCP with continuous monitoring and configuration assessment
    Threat Detection and Response
    Advanced threat intelligence and detection capabilities with real-time monitoring and response mechanisms for cloud environments
    Container and Kubernetes Protection
    Comprehensive security for containerized applications and Kubernetes environments with runtime protection and image security
    Multi-Cloud Workload Security
    End-to-end protection for cloud workloads across on-premises, hybrid, and multi-cloud infrastructure with a single lightweight agent
    Event-Driven Security Automation
    Dynamic cloud resource protection through integration with cloud service provider event and management services
    Multi-layered Protection
    Provides comprehensive security across on-premises, cloud, and disconnected environments using a single agent
    Advanced Threat Detection
    Utilizes Next Generation Antivirus, Adaptive Threat Protection, and Threat Intelligence Exchange for detecting sophisticated threats
    Generative AI Security Analytics
    Employs AI-powered capabilities for multi-lingual threat hunting, interactive threat investigation, and threat knowledge graph generation
    Endpoint Detection and Response
    Combines advanced detection, investigation, forensics, and response capabilities with unified platform for comprehensive threat management
    Security Control Integration
    Includes host firewall, web device control, application controls, and native security protection mechanisms across different deployment models
    Threat Detection Mechanism
    Advanced endpoint detection and response (EDR) capabilities with multi-stage threat identification across attack vectors
    Malware Prevention Technology
    Sophisticated prevention-first approach using advanced blocking technologies against broad range of cyber attacks
    Security Investigation Tools
    Unified XDR platform enabling comprehensive threat investigation, detection, and response capabilities
    Attack Vector Coverage
    Multi-layered protection mechanism targeting different stages and types of cybersecurity threats
    Endpoint Protection Framework
    Comprehensive security solution with default strong protection settings and drift identification capabilities

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    3.5
    2 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    100%
    0%
    0%
    2 AWS reviews
    |
    97 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    Chethan R

    Has improved threat detection accuracy and helped monitor endpoints across hybrid environments

    Reviewed on Sep 17, 2025
    Review provided by PeerSpot

    What is our primary use case?

    We mostly use CrowdStrike Falcon Cloud Security  for different clients across the globe, and we have installed all the agents on most machines to monitor each and every employee, along with laptops and servers in AWS . We are the core monitoring staff with a SOC where we monitor for viruses, malware, and to remove harmful files. Our primary use cases involve monitoring miscellaneous activities.

    I have been using CrowdStrike Falcon Cloud Security 's workload protection features because it's a very lightweight agent. Its detection speed is remarkable compared to other tools on the market, including Trend Micro. CrowdStrike Falcon Cloud Security is user-friendly and provides detection transparency, allowing us to present real-time documentation to our executives clearly explaining any detected issues.

    Workload protection features influence our security strategy significantly, particularly by blocking any suspicious activities on public-facing servers and generating immediate notifications for us to act upon. It helps in quickly identifying whether potential issues need to be whitelisted or blocked, and assists in troubleshooting when applications trigger false alerts due to bugs.

    What is most valuable?

    The most valuable capabilities of CrowdStrike Falcon Cloud Security relate to preventing attacks caused by human error, such as when someone plugs in a USB device or downloads something without caution. It automatically blocks duplication and activities that could result in data loss, effectively preventing unintended copying of data to personal devices.

    Deduplication prevention is definitely the most valuable feature.

    CrowdStrike Falcon Cloud Security excels in threat detection with a vast investigation structure, allowing us to verify suspicious activities to identify root causes. It helps us trace back to the origin and fix issues, making it a user-friendly tool for this kind of detection.

    CrowdStrike Falcon Cloud Security is built on AI and ML technology, enabling it to detect various threats and block suspicious activities immediately, which is particularly effective compared to traditional AVs and EDRs.

    The analytics provided by CrowdStrike Falcon Cloud Security is key for maintaining a proactive security posture. Its AI and ML foundations offer extensive information on threats and suspicious activities, making it renowned for analysis in the industry.

    What needs improvement?

    The improvements needed for CrowdStrike Falcon Cloud Security include reducing its high cost, which is currently quite expensive, and enhancing the executive reports that are user-friendly for technical engineers but require improvement for higher management.

    More detailed and granular reports would be beneficial for better executive comprehension.

    For how long have I used the solution?

    I have been using CrowdStrike Falcon Cloud Security for more than eight to nine years, but for the past two years, I have not been using it much because I moved into a different domain.

    What do I think about the stability of the solution?

    When evaluating the stability of CrowdStrike Falcon Cloud Security, their partnerships with all major cloud service providers ensure their servers are optimally positioned, leading to no latency or stability issues that I have observed.

    What do I think about the scalability of the solution?

    CrowdStrike Falcon Cloud Security is indeed highly scalable, ideally for enterprises with a minimum of 2,000 servers to ensure cost efficiency and easier setup.

    CrowdStrike Falcon Cloud Security is primarily suited for larger enterprises and not for small or medium companies.

    How are customer service and support?

    I have a very good in-house team of about 20 to 30 people working with CrowdStrike Falcon Cloud Security, and we maintain excellent communication with their technical support, resolving any issues immediately without complaints on technical aspects or delays.

    Based on my experience with CrowdStrike Falcon Cloud Security's technical support, I would rate them a solid 10 out of 10.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    With 19 years of experience in the industrial field, I have also used technologies such as BigFix , Ivanti, Qualys, and I am considering reviewing Tenable, Ivanti Endpoint Manager , Ivanti Security Control, Tanium , and others, including HCL BigFix  and Qualys Patch Management .

    How was the initial setup?

    I participated in the initial setup and deployment of CrowdStrike Falcon Cloud Security.

    The implementation plan I typically follow involves multiple installation methods, one being agentless via AD to push agents, and the other using patching tools such as Ivanti and BigFix. This process can take around 15 to 20 days for 2,000 to 3,000 servers or endpoints due to its user-friendly cloud-based configuration.

    During the initial setup, I faced some false alerts due to older versions of some applications we used, which may exhibit atypical behavior. Normalizing these false alerts generally takes around one to two weeks after the initial installation to resolve and ensure smooth operation.

    What about the implementation team?

    Our company has a partnership with CrowdStrike, so we are one of their partners, and that is how we acquired CrowdStrike Falcon Cloud Security. I bought it directly from CrowdStrike.

    Some of our customers purchase CrowdStrike Falcon Cloud Security directly from CrowdStrike while others purchase it via AWS Marketplace  or other marketplaces.

    What was our ROI?

    More than 12 million vulnerabilities have been identified and resolved while working with CrowdStrike Falcon Cloud Security over the past 10 years, which I have been monitoring diligently. This figure reflects the work done not only by me but also collectively with about four customers in one single console, giving a complete picture of our efforts.

    What's my experience with pricing, setup cost, and licensing?

    The cost of CrowdStrike Falcon Cloud Security is currently quite high, which is an area that needs improvement, particularly for the executive reports that are user-friendly for technical engineers but require enhancement for higher management.

    Which other solutions did I evaluate?

    With 19 years of experience in the industrial field, I have used technologies such as BigFix, Ivanti, Qualys, and I am considering reviewing Tenable, Ivanti Endpoint Manager , Ivanti Security Control, Tanium , and others, including HCL BigFix and Qualys Patch Management .

    What other advice do I have?

    I use CrowdStrike Falcon Cloud Security internally in my company. CrowdStrike Falcon Cloud Security is recognized for its reliability, and I can guarantee they are very reliable. My overall rating for CrowdStrike Falcon Cloud Security is 8 out of 10.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Vijay T.

    It simplifies Incident analysis.. must to have in cloud infrastructure

    Reviewed on Sep 10, 2025
    Review provided by G2
    What do you like best about the product?
    Interactive dashboard, very detailed analysis of the incident, less false positives, easy integration with other tools
    What do you dislike about the product?
    Other than the cost factor, I don't see anything to dislike
    What problems is the product solving and how is that benefiting you?
    Cloud infrastructure is always prone to attack and data leakage, with CrowdStrike Falcon Cloud Security it makes the cloud infra safe, especially in a multi cloud environment.
    Oil & Energy

    Its an integrated platform for securing cloud, real-time threat detection & AI-powered analysis.

    Reviewed on Sep 09, 2025
    Review provided by G2
    What do you like best about the product?
    CrowdStrike Falcon Cloud Security is an integrated platform for securing cloud environments, praised for its real-time threat detection, AI-powered analysis, and features like attack path analysis and compliance benchmarks.
    What do you dislike about the product?
    High cost, a steep learning curve, and potential complexities with alerts and integrations.
    What problems is the product solving and how is that benefiting you?
    Uses machine learning and AI to identify and prevent threats in real-time, even without relying solely on signatures.Visualizes potential routes attackers can take to compromise critical assets, highlighting risks from misconfigurations.Provides automated checks against standards like CIS, HIPAA, and PCI to identify and help remediate misconfigurations. Extends security to containers and Kubernetes environments, offering protection from development to deployment.
    Felipe M.

    Excellent cybersecurity tool

    Reviewed on Aug 29, 2025
    Review provided by G2
    What do you like best about the product?
    Ease of implementation.....................
    What do you dislike about the product?
    so far it is a very good tool
    What problems is the product solving and how is that benefiting you?
    Protect the endpoints, servers, mobiles
    Luis S.

    EDR Best Product

    Reviewed on Jun 12, 2025
    Review provided by G2
    What do you like best about the product?
    Provides tools to customers that allow them to detect events well in advance of an incident being detected.
    What do you dislike about the product?
    The price lists are not clear as to the scope of each item. is only for a few clouds
    What problems is the product solving and how is that benefiting you?
    Validate the security posture of workloads across all clouds from a single platform
    View all reviews