security analysts handle rules and investigations swiftly with real-time detection
What is our primary use case?
As a security analyst, I primarily focus on creating rules, conducting investigations, and integrating new devices with our CrowdStrike system. After these integrations, I also check the status to ensure everything is functioning properly.
What is most valuable?
For threat detection, CrowdStrike provides queries and searches. If I need to find any IOCs, I would say that is my best option. During a cyber war, once we gather some IOCs, we can ingest them into CrowdStrike. This ensures that if we encounter an attack using those IOCs in the future, we receive alerts, allowing us to investigate further. Also, the detection capability of CrowdStrike is quite real-time. If we enforce a policy preventing users from inserting USBs into the PC and it triggers, it happens in real-time without delay.
What needs improvement?
Currently, users manually input IOCs, and it would be beneficial if IOCs released by major companies were automatically integrated into CrowdStrike. We retrieve files from vendors, which incurs costs. Automating this process could be cost-effective and time-saving.
For how long have I used the solution?
I think I have been using it for around seven and a half years.
What was my experience with deployment of the solution?
There is no maintenance required because I, as a user of CrowdStrike, am part of the security team. I mainly configure new threat detections or explore new dashboards.
What do I think about the stability of the solution?
The stability is quite impressive, and I am enjoying it.
What do I think about the scalability of the solution?
It is stable, and I haven't encountered any issues. It is manageable and comfortable.
Which solution did I use previously and why did I switch?
I am a security analyst, and CrowdStrike is utilized as part of EDR. For websites, other attacks, and banking systems, we have used QRadar, ELK, Sentinel, and some locally built detection systems.
How was the initial setup?
For me, as a security analyst, it doesn't require months or days. Many tasks can be completed in hours. With experience, even critical tasks can be done in minutes.
What about the implementation team?
Whenever our company hires a new employee, they provide him with credentials. He installs the agent and inputs the credentials. The process is entirely console-based.
What was our ROI?
It depends on the size of the company and the tasks we undertake.
What's my experience with pricing, setup cost, and licensing?
I don't have much information about the setup costs, but it was manageable. CrowdStrike offers three or four packages depending on the company's size, and we purchased the most expensive one for better operations.
What other advice do I have?
I would recommend that if you need a quick response against real-time attackers, you should consider purchasing CrowdStrike. Windows Defender doesn't match up, so configuring it on EC2 instances is better for small and large-scale companies as well. Overall rating: nine out of ten.
Detects anomalies and helps with fast threat identification and response
What is our primary use case?
We are using it for endpoint protection, as well as for cloud security coverage. It includes monitoring all our critical servers and endpoint devices. We also design workflows for anomaly behavior detection using machine learning techniques for anything malicious or abnormal. We monitor everything suspicious. We either design the workflows or use CrowdStrike to monitor any new detections and anomaly behaviors, as well as do vulnerability management.
How has it helped my organization?
The best benefit of CrowdStrike Falcon is 99% MITRE coverage. It detects suspicious or undetected activities on the system and provides protection for zero-day vulnerabilities. If there is a sudden rise in CPU consumption or abnormal storage use, it helps us by creating a ticket, allowing us to investigate any abnormal behavior present. We can look into the machine and investigate. It reduces the false negatives common with other technologies.
The real-time response helps with MTTR. We achieve faster detection and response times.
It helped prevent breaches. In the past, there was abnormal consumption of RAM along with CPU on a server. It also started communicating with other subnets. CrowdStrike Falcon triggered an alert. We did our investigation and found that we had ransomware. We successfully mitigated it.
What is most valuable?
The machine learning behavior for anomaly detection is a valuable feature. It helps identify any suspicious or unusual activities within the system.
Furthermore, it has impressive MITRE coverage.
What needs improvement?
Deployment in cloud environments is challenging. Another concern is CrowdStrike's GUI. It changes annually, making it hard to work and find options. After a year, options change or integrate with something else, which is challenging for me as it requires relearning. It is time-consuming.
For how long have I used the solution?
I started working on CrowdStrike in 2018.
What do I think about the stability of the solution?
We are following N-1 versions across our environment, which is stable. Due to our requirements, we never switch to the N version; we always stick to N-1 and never face anything abnormal while using it.
What do I think about the scalability of the solution?
It has proven to be a good technology for me. It has adequate coverage and is easy to deploy. Its scalability is good.
It is deployed across the globe.
How are customer service and support?
I would rate them a seven out of ten. They take a lot of time to come back to us.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I have used SentinelOne as well. SentinelOne was similar but had major challenges with workflow implementation. Workflow implementation is far easier in CrowdStrike compared to SentinelOne.
How was the initial setup?
We have it in the on-premises environment and cloud environments. For endpoint hosts, it is very easy, but in the cloud environment, there are challenges, especially if we have AWS technologies with Lambda functions, which are serverless.
My implementation strategy was simple. I segregated servers based on criticality, then network, and finally OS level. Anything critical was based on my CMDB asset configuration. Following criticality was the network, determining internal versus public-facing. The last segmentation was on OS configuration. These three categorizations were primarily used in deploying agents across our environment.
In terms of maintenance, there are patches or version upgrades.
What about the implementation team?
We had a group of five people, which was enough to manage this.
What was our ROI?
What's my experience with pricing, setup cost, and licensing?
It is expensive compared to SentinelOne, but as the market leader, it is worth it.
What other advice do I have?
I would rate CrowdStrike Falcon an eight out of ten. They have some challenges with the cloud environment, which is a major drawback, especially with the serverless aspect. Their GUI also causes issues with regular changes.
If anyone has worked with CrowdStrike, they would promote it. However, cloud security presents challenges. Moving from physical to cloud environments is difficult. I have raised 7-8 tickets to resolve cloud issues, especially with AWS.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Great Product I
What do you like best about the product?
I love how Falcon takes the worry away from Identity theft. They will also help you make things right
What do you dislike about the product?
There is really nothing to dislike about this service
What problems is the product solving and how is that benefiting you?
It helps protect against hacking that could be devastating
Fully managed identity protection solution, delivering frictionless
What do you like best about the product?
Deep visibility across your hybrid identity landscape.
What do you dislike about the product?
Administration part is not good as expected
What problems is the product solving and how is that benefiting you?
It integrates seamlessly with Microsoft Entra ID through the external authentication method
Falcon Identity protection genuine review
What do you like best about the product?
Falcon Identity Protection provides proactive threat detection, using AI-driven behavioral analytics to identify unusual activities and prevent identity-based attacks. It also secures privileged accounts, offering visibility and control over high-risk users to reduce credential misuse.
What do you dislike about the product?
The cost of falcon identity is bit higher so if its price may vary then it would one of best software to use , plus the complexity to use should be improved so that it can be populated worldwide
What problems is the product solving and how is that benefiting you?
We are currently using in Bank portal terminal which is account receivable and accounts payable part so its help to reduce the threats from the scammer
Review on Falcon Identity
What do you like best about the product?
It provides real time threat protection and it also has behaviour analysis which is easy to track any incidents and protect our systems.
What do you dislike about the product?
It has limited features for small size businesses and the cost to purchase the tool is also expensive.
What problems is the product solving and how is that benefiting you?
Identifying the threats and mitigating it.