We use the solution for end-user devices.

CrowdStrike Falcon Identity Protection
CrowdStrikeExternal reviews
External reviews are not included in the AWS star rating for the product.
Falcon Identity protection review
Good reporting capabilities and helps track machines much better
What is our primary use case?
What is most valuable?
The reporting console is phenomenal, and I can get a lot of data out of it. The reporting capabilities are much better than anything I've used before. With CrowdStrike Falcon, we can track machines much better.
What needs improvement?
One of the things that we built and used quite regularly is a remote wipe capability within CrowdStrike Falcon. The solution should have included remote wipe capability out of the box.
If we have a compromised or stolen machine, we can quarantine it within the CrowdStrike console. However, it doesn't include a feature that enables you to remotely wipe that machine via the console. We had to build that in separately.
For how long have I used the solution?
I have been using CrowdStrike Falcon for two years.
What do I think about the stability of the solution?
We haven’t faced any issues with the solution’s stability.
What do I think about the scalability of the solution?
The solution's scalability has been amazing. We started by deploying it to 30 users, and over three months, we expanded to 5,000 users with no issues.
How are customer service and support?
For technical support, I open a ticket with the MSP, and they deal with it. Our MSP is excellent at resolving support tickets.
Which solution did I use previously and why did I switch?
We previously used Symantec Endpoint Protection. We switched to CrowdStrike Falcon because it was a new vendor with new technology.
How was the initial setup?
The solution's initial setup was very easy because we did an SCCM push for deployment.
What about the implementation team?
Our MSP did a lot of the deployment work for us. The solution was deployed by a small team in three months. It took four of us to deploy the tool to 5,000 users.
What's my experience with pricing, setup cost, and licensing?
The solution's pricing is great for us.
What other advice do I have?
It took us about three months to adjust to the new client and switch from a file-level scanner to an AI-based CrowdStrike scanner to see where we felt the differences. CrowdStrike Falcon is deployed on the cloud in our organization. From an end-user perspective, the solution does not require any maintenance after deployment.
New users should be prepared for unexpected alerts. CrowdStrike Falcon views things very differently than many conventional antivirus tools.
Overall, I rate the solution a nine out of ten.
Provides efficient security posture and has diverse threat intelligence capabilities
What is our primary use case?
Our primary use case for the product is to enhance our threat intelligence capabilities. We use it to ensure comprehensive security coverage.
How has it helped my organization?
The solution has significantly improved our threat detection capabilities. It has helped us identify and respond to potential threats more effectively, contributing to our security posture. There have been no notable drawbacks; the solution meets our needs and complies with local regulations.
What is most valuable?
The product's most valuable features include its global reach and extensive threat data. Its wide exposure helps gather diverse threat intelligence, crucial for effective security management.
What needs improvement?
Enhancements in reporting and forensic analysis could benefit the product. CrowdStrike could publish detailed threat reports and analyses more consistently than other providers.
For how long have I used the solution?
I have been using CrowdStrike Falcon Threat Intelligence since early 2016.
What do I think about the stability of the solution?
I rate the platform's stability an eight.
What do I think about the scalability of the solution?
The platform is very scalable. It can effectively accommodate growing security needs, which is crucial for organizations with evolving threat landscapes.
How are customer service and support?
Customer service and support vary based on the level of service. Premium support is excellent, but standard support can be less responsive.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We previously used a different solution. We switched to CrowdStrike due to its comprehensive threat intelligence capabilities and global reach, which we found to be more effective for our needs.
How was the initial setup?
The initial setup was straightforward, with the installation taking less than two hours. However, fine-tuning alerts and configuring rules required additional time and effort.
What about the implementation team?
The implementation was carried out in-house.
What was our ROI?
The product has helped us detect threats that might have gone unnoticed, contributing to overall security.
What's my experience with pricing, setup cost, and licensing?
The product is expensive.
Which other solutions did I evaluate?
We evaluated several other options before choosing CrowdStrike. Our decision was based on the product's effectiveness and ability to meet our security requirements.
What other advice do I have?
Overall, it is a robust solution that meets our security needs. However, potential users should know the cost implications and ensure the product meets their requirements.
I rate it an eight.
Robust and detects almost every malicious activity that occurs within the endpoint
What is our primary use case?
We use the solution for endpoint security. We use the tool to ensure the endpoints are protected from abnormal activities, people don't run different scripts, and people don't compromise endpoints and use them to get into the network.
What is most valuable?
The solution's most valuable feature is that it is robust and can detect almost every malicious activity that occurs within the endpoint.
What needs improvement?
I would like a centralized deployment where I could roll out or push it to all endpoints.
For how long have I used the solution?
I have been using CrowdStrike Falcon Surface for two years.
What do I think about the stability of the solution?
CrowdStrike Falcon Surface is a very stable solution.
What do I think about the scalability of the solution?
CrowdStrike Falcon Surface is a very scalable solution. A lot of customers are using CrowdStrike Falcon Surface. One of our customers for the solution has 12,000 endpoints.
How are customer service and support?
The solution's technical support is handled centrally by CrowdStrike, and the support was also good and knowledgeable.
How was the initial setup?
I didn't deploy the solution, but I supported customers that use it. I think it took them up to six months to deploy the CrowdStrike Falcon Surface.
What was our ROI?
The solution somehow doesn't allow intrusion and minimizes fraud or cyber-attacks. Within the time we're using it, CrowdStrike Falcon Surface detected a lot of intrusion from malicious individuals. It was able to prevent a lot of insider threats where people internally will want to run some malicious scripts within the environment.
It detects those malicious attacks quickly, and we can prevent them. It minimized a lot of cyber and fraud-related activities that could have cost the bank a lot of money.
What other advice do I have?
CrowdStrike Falcon Surface is a cloud-based solution. In light of the recent global IT outage that affected CrowdStrike, they should do proper change management.
Overall, I rate the solution a nine out of ten.
Prevent unauthorized access or identity theft from external sites
What is our primary use case?
It also helps you with access, like we have dark web monitoring and admin protection management. So, the use cases can vary from organization to organization, but every organization has different value in it.
What is most valuable?
It helps to prevent unauthorized access or identity theft from external sites. If your identity is stolen, you can ban it.
Real-time monitoring is important because it runs multiple things on a single platform, like IDA, EDR, XDR, and SIM solutions. It captures all technology with one agent, which makes it easier for us to fix customer issues.
Having a single console is helpful, especially when customers have multiple vendors for their products. It's easier to manage one partner. In this case, CrowdStrike Falcon helps.
What needs improvement?
One thing that is not yet available is attack simulation. For example, if someone tries to attack your Active Directory on inactive accounts, a cyber attacker could hack those accounts and try to get into your company. This could be a feature to add. It would give a fake reply each time someone tries to hack it. Multiple companies that I know of would like that.
For how long have I used the solution?
I have been using it for two years.
What do I think about the stability of the solution?
It is a stable product.
What do I think about the scalability of the solution?
I would rate the scalability a nine out of ten. It's a scalable solution that is very easy to deploy.
It is suitable for every kind of business, including small, medium, or enterprise businesses.
How are customer service and support?
Technical support depends on a system integrator.
CrowdStrike technical support regarding Identity Protection has a team, but if there's no issue with the agent, you can work it out yourself.
The support is good.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is easy. We only have one option available right now: on the cloud. It gets applied to endpoints, but it's cloud-based.
It is very easy to integrate this product into our existing environment.
What's my experience with pricing, setup cost, and licensing?
It's a premium product.
What other advice do I have?
From my end, it works. But it can be recommended or viewed by a personal customer. We are not the sole user of CrowdStrike Falcon. It's the end user.
I would recommend using it. For me, it is the best product ever. Overall, I would rate it an eight out of ten.
Which deployment model are you using for this solution?
Prevent privilege escalation with highest credentials but have issues with updates
What is our primary use case?
We use the solution for Windows and non-Windows infrastructure. We have Falcon clients on all our machines.
How has it helped my organization?
We integrate with CyberArk, which includes DNA reporting, particularly for identifying old and ticket-based attacks. We’ve implemented this integration to receive risk-based scoring. Our strategy focuses on preventing privilege escalation, as our last major incident, NotPetya, resulted from this vulnerability. To address this, we’ve implemented measures through CyberArk and CrowdStrike.
What is most valuable?
When we encounter phishing attacks via email, we sandbox any reported items. Whenever a suspicious email is reported, we conduct sandboxing in CrowdStrike and block emails, domains, and IPs based on the resulting threat intelligence.
The most critical aspect is preventing privilege escalation, particularly for domain admins with the highest credentials. With our integration of CyberArk, passwords are never transmitted to the endpoint. Instead, a secure RDP file is created, and Falcon is used to prevent privilege escalation attempts.
What needs improvement?
As customers, we always update our systems whenever a new release is available, with clients connecting directly to the Internet for these updates. We have an agent who manages these updates on the clients, but as an organization, we don’t have control over them. CrowdStrike should assess the impact on endpoints before releasing such updates.
Our organization now seeks AI-based stock monitoring to prioritize thousands of alerts generated across various platforms. The AI integration is still in its early stages, so we would like to see Falcon develop tools that can integrate with multiple platforms and help identify the highest-priority alerts.
For how long have I used the solution?
I have been using CrowdStrike Falcon Threat Intelligence since 2017. We are using the latest version of the solution.
What do I think about the stability of the solution?
I rate the solution’s stability a nine out of ten.
What do I think about the scalability of the solution?
The integration part is very good. CrowdStrike collaborates with most security vendors, so it's very easy to get one platform for our risk factors across the enterprise.
40 thousand devices are using this solution. We get many alerts from Falcon, sometimes from end users and sometimes from Internet-facing servers.
I rate the solution's scalability a nine out of ten.
How are customer service and support?
We struggle to get specialized resources from CrowdStrike in a few cases.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
CrowdStrike Falcon Black is an on-premise solution that was very complicated, so we faced performance issues. The main reason for the switch is the performance issues reported by multiple application owners.
How was the initial setup?
Initially, we faced many challenges because we had to open ports from each of our subnets to Falcon, as it’s a SaaS solution. Each client needs to communicate with Falcon servers for threat intelligence. Due to the complexity of our network, we had to carefully consider all security aspects when opening the external communication ports to Falcon.
It took 25 to 30 days to deploy it completely.
We began with our Tier 0 servers, which had the most critical and highest privileges. After securing those, we moved on to Tier 1 and Tier 2 as we continued deployment. Our approach was to first address the highest risk factors across the enterprise and then gradually move on to securing endpoints like user desktops and laptops.
I rate the initial setup as seven out of ten, where one is difficult, and ten is easy.
What about the implementation team?
We took professional services from CrowdStrike, so it was done in-house with only two people: one from the execution team and one from the cybersecurity team.
What was our ROI?
When we track the annual priority cases, especially the security incidents, we have made many improvements. That is ROI in terms of tracking security incidents.
What's my experience with pricing, setup cost, and licensing?
I rate the product’s pricing a six out of ten, where one is cheap and ten is expensive.
What other advice do I have?
Most customer requirements focus on email security, so we’ve implemented Mimecast. CrowdStrike Falcon integrates with Mimecast, allowing us to provide advanced security beyond Office 365’s capabilities. With DMARC in place, Falcon helps us identify domains that pose a risk to the organization.
I advise you to look for customer feedback, and then they should also look for Gartner and other industry leaders so you get the ranking.
Overall, I rate the solution a seven out of ten.
Which deployment model are you using for this solution?
Offers good AI features to users
What is our primary use case?
I used the tool since my company wanted a product with next-generation antivirus and EDR, as it can help with the detection of malicious activities and behavior detection, and the MI and machine learning part in the tool also helps.
What needs improvement?
Only for the customized IOCs, there is a need to highlight certain aspects, and based on it, we get to block only the hash values but is not based on the file name, like .exe, or other extensions, so I can't block them, making it in an area where the solution needs to improve.
My company had raised a concern with CrowdStrike's support team when one of the antivirus applications that communicates with CrowdStrike started misbehaving. For both the aforementioned tools, the same support ticket had to be raised. If my company had to provide any suggestions regarding the whitelisting part, there was a delay of over a month when dealing with the product's support team. If the tool's support team suggests users follow certain steps, and if it is not followed or is not in progress, then after two or three days, the tool's support team needs to join a video call and provide a resolution to the users.
Some policies in the tool need to be fine-tuned. Customized IOCs need to be improved since they have certain shortcomings. With the customized IOCs, it can be made possible to block a file extension with a filename or file extension type of blocking. Providing users with the ability to customize policies would be a good improvement to the solution.
For how long have I used the solution?
I have been using CrowdStrike Falcon Threat Intelligence for a year. I am a user of the tool.
What do I think about the stability of the solution?
Stability-wise, I rate the solution an eight and a half out of ten.
What do I think about the scalability of the solution?
Scalability-wise, I rate the solution an eight out of ten.
My company's cybersecurity and IT security team use the tool. In my company, there are 15,000 users. For servers, there are 1,500 users.
Right now, there is no need to increase the usage of the tool.
How are customer service and support?
The solution's technical support is not good. I rate the technical support a four to five out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have experience with Palo Alto.
The detection and other functionalities in CrowdStrike and Palo Alto are the same, but cost-wise, CrowdStrike is reasonable. Technically, I would prefer Palo Alto over CrowdStrike.
How was the initial setup?
The product's deployment phase is easy. I rate the setup phase of the tool as a ten on a scale where one is difficult and ten means it is an easy process.
The solution can be deployed in the cloud and on an on-premises model.
The solution can be initially deployed in a minute.
Considering the number of users, servers, cloud, and on-premises environment, it hardly takes 15 to 20 days. When there are laptop and desktop users who are online, and there is a need to install the agent, then there can be some issues, and with such minor things, ten days are more than enough for the installation.
What's my experience with pricing, setup cost, and licensing?
CrowdStrike is a reasonably priced tool.
What other advice do I have?
In terms of the ability of the tool to deal with threats, I would say that the product does it by around 85 percent.
The real-time response of the tool is good, and I feel it is around 90 to 95 percent.
The tool's incident-handling capability is good.
Considering the influence of the product on our company over some time, I would say that the solution is cost-effective and offers good threat detection features. The tool's interface is also good.
The tool's AI features are good, but they are not useful for our company since the area of detection is not something in our bucket right now.
If you have a big budget, go with Palo Alto. If you have a low budget and want a tool that provides more accuracy during detection, then it is better to go with CrowdStrike.
I rate the tool a nine out of ten.
Which deployment model are you using for this solution?
Works with Office 365 and helps to manage threats
What is our primary use case?
The tool helps to increase security because the threats we face keep changing, so we need better protection. In the past, we've faced some attacks on our network, and while we managed to deal with them, we realized we needed even stronger protection. That's why we decided to implement CrowdStrike Identity Protection.
What is most valuable?
The main feature we rely on is the product's intelligence. We appreciate the advice from the team during implementation. One of the main reasons we chose this product is its compatibility with Office 365.
What needs improvement?
Improvement is always possible. It's challenging to gauge how much future mitigation is provided, especially since we've only been using the product for about one and a half years. Every product faces this challenge because nothing is ever completely foolproof. So, besides relying on technology, we also focus on increasing our staff's awareness of security issues. Feedback from my colleagues suggests that the reporting and dashboarding of incidents could be improved.
For how long have I used the solution?
I have been working with the product for one and a half years.
What do I think about the stability of the solution?
I rate the tool's stability an eight out of ten.
What do I think about the scalability of the solution?
Scalability isn't a problem for us. Many big multinational companies use CrowdStrike Identity Protection, so it's designed to handle environments like ours without any issues. My company has 500 users.
How was the initial setup?
The tool's deployment is easy. Thanks to the installation scripting we utilized, the technical rollout took about two weeks. Then, there was some additional time, around two to four weeks, for customization and configuration. After that, the systems were up and running. So, all in all, it took about three months to have our mitigation strategies in place. We have one engineer for maintenance.
What other advice do I have?
I rate the overall product an eight out of ten. I would recommend it to others. However, it's crucial to understand areas where the product might not provide coverage and how to mitigate those gaps. For example, it covers endpoints, networks, and Office 365 environments, but are there other areas in the attack surface that it doesn't address well? It's essential to be aware of any potential gaps upfront.
The solution helps in preventing incidents. However, it's challenging to quantify the exact impact because we don't know what would have happened without it. It's similar to having insurance for your house.
Proactively blocks threats, provides insights, and integrates seamlessly
What is our primary use case?
We use CrowdStrike Falcon for intrusion prevention management.
How has it helped my organization?
CrowdStrike Falcon proactively blocks threats and provides us with insights.
CrowdStrike Falcon integration is seamless.
What is most valuable?
The endpoint and server management are the most valuable features of CrowdStrike Falcon.
What needs improvement?
CrowdStrike Falcon's GUI requires improvement for user-friendliness. The console's available options are unclear, making it difficult to understand and extract details. Additionally, correlating information within the console and reports proves challenging.
For how long have I used the solution?
I have been using CrowdStrike Falcon for two years.
What do I think about the stability of the solution?
CrowdStrike Falcon had some initial stability issues in our environment, likely due to its new integration. However, it appears to have matured and is now functioning reliably.
What do I think about the scalability of the solution?
Being cloud-based, CrowdStrike Falcon offers easy scalability. Adding licenses through procurement increases resources without the need for additional hardware, making scaling straightforward.
How are customer service and support?
While the technical support meets all response time commitments outlined in our Service Level Agreement, some users believe they should strive for a higher standard – a Security Level Target. This means responding to security incidents immediately, not just within SLA windows. Security tools are crucial for our environment's protection, and their use shouldn't be limited by SLA constraints.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
After using Symantec, Trend Micro, McAfee, and VMware Carbon Black, we migrated to CrowdStrike Falcon due to a lack of support from the previous vendors and their shortcomings in comprehensive threat detection.
What other advice do I have?
I would rate CrowdStrike Falcon eight out of ten.
The maintenance required is reasonable.
We have 6,000 endpoints in our environment.
CrowdStrike Falcon shines with its user-friendliness, providing clear insights into the endpoint environment. Proactive features are a major plus, offering actionable items and valuable attack path simulations that empower better decision-making.
Which deployment model are you using for this solution?
The agents are deployed on every workstation, so policy changes can be enforced on all of them
What is our primary use case?
We use Falcon to check the login attempts of the users. We can see who has logged in and when. We can see which workstation is assigned to each user. CrowdStrike helps us enforce policies, such as USB policies and users recycling passwords.
How has it helped my organization?
CrowdStrike is deployed on every workstation, so policy changes can be enforced on all of them. It lowers the manual work on each of the workstations. It has helped us manage device usage in our environment.
What is most valuable?
I like CrowdStrike's policies. The integration is easy to do. I can remember once when Falcon prevented a security breach occurred because someone clicked on a phishing link, and their credential was compromised. We used threat tracking to isolate the device from networks.
For how long have I used the solution?
I have used Falcon for two years.
What do I think about the stability of the solution?
I rate Falcon nine out of 10 for stability.
What do I think about the scalability of the solution?
I rate Falcon eight out of 10 for scalability.
What other advice do I have?
I rate CrowdStrike Falcon nine out of 10.