BigFix and CrowdStrike Falcon compete in the endpoint management and security category. CrowdStrike Falcon has the upper hand due to its advanced threat detection capabilities, despite BigFix’s comprehensive feature set and competitive pricing.
Features: BigFix offers robust automated patch management, extensive compliance capabilities, and can manage a wide range of devices. CrowdStrike Falcon stands out with superior threat intelligence, real-time monitoring, and efficient incident response.
Room for Improvement: BigFix requires a more intuitive setup process and better scalability options. CrowdStrike Falcon could improve its reporting tools and integration with other security products.
Ease of Deployment and Customer Service: BigFix has a robust but complex deployment model that can be time-consuming; its customer service is generally well-regarded. CrowdStrike Falcon offers a streamlined deployment process with a cloud-native approach and excellent customer service support.
Pricing and ROI: BigFix provides competitive setup costs and a good return on investment through its extensive device management capabilities. CrowdStrike Falcon, although higher in cost, offers significant ROI with its advanced security features and effective threat mitigation.
CrowdStrike Falcon saves time and offers good value for money, especially for enterprise companies, because it can stop breaches.
It's very easy to deploy without many IT admins, saving time.
On a scale from one to ten, with ten being the highest quality, enterprise support provides timely responses, typically within four to eight hours.
Technical support from HCL is satisfactory unless there are customization requirements.
On a scale of one to ten, I would rate the technical support as a 10 because they resolve many issues for us.
The CrowdStrike team is very efficient; I would rate them ten out of ten.
They could improve by initiating calls for high-priority cases instead of just opening tickets.
BigFix requires some minimum configuration requirements.
It has adequate coverage and is easy to deploy.
In terms of scalability, I find CrowdStrike to be stable, and I have not encountered any limitations with it.
There's no scalability limitation from CrowdStrike itself, as it just requires agent deployment.
I have never seen instability in the CrowdStrike tool.
We are following N-1 versions across our environment, which is stable.
The biggest issue occurred when every computer worldwide experienced a blue screen.
Building a management console is quick and simple, taking only one to two hours for setup.
The problem was related to the hardware configuration and hardware specifications.
In addition to reporting improvements, there should be a feature for application control to allow or disallow certain applications from being executed on endpoints.
Simplifying the querying process, such as using double quote queries or directly obtaining logs based on IP addresses or usernames, would be beneficial.
Another concern is CrowdStrike's GUI. It changes annually, making it hard to work and find options.
Threat prevention should be their first priority.
The pricing is pretty good and now follows a subscription model similar to SolarWinds, making it easier for customers to subscribe and unsubscribe.
It is expensive compared to SentinelOne, but as the market leader, it is worth it.
The licensing cost and setup costs are affordable.
The solution is a bit expensive.
The BigFix features that have proven most effective include inventory, software delivery, software distribution, software catalog, and both software and hardware management.
I use this mainly to capture inventory for IBM products, and as BigFix was part of IBM, it gets easily integrated with IBM solutions.
BigFix supports something known as Patch Policies, which allows users to define that whenever critical patches are released, they should get evaluated against machines and automatically deploy them.
I can investigate by accessing the customer's host based on the RTR environment and utilize host search to know details for the past seven days, including logins, processes, file installations, malicious processes, and network connections.
The real-time analytics aspect of CrowdStrike performs well because we get all logs in real-time, with no delay, allowing us to take action immediately.
Being an EDR solution, it helps us identify attacks in real-time.
Product | Market Share (%) |
---|---|
CrowdStrike Falcon | 7.9% |
BigFix | 1.2% |
Other | 90.9% |
Company Size | Count |
---|---|
Small Business | 30 |
Midsize Enterprise | 12 |
Large Enterprise | 66 |
Company Size | Count |
---|---|
Small Business | 46 |
Midsize Enterprise | 34 |
Large Enterprise | 61 |
HCL BigFix is a powerful patch management tool that enables organizations to simply control their patch management operations. It is designed so that IT security and operations teams can collaborate in the most effective way possible. Users that employ BigFix can find and fix issues with their endpoints faster than those that employ its competitors. It comes with thousands of security checks that can be deployed quickly and easily. These enable users to safeguard themselves from a wide variety of digital threats.
HCL BigFix Benefits
Some of the ways that organizations can benefit by choosing to deploy HCL BigFix include:
BigFix Features
Reviews from Real Users
HCL BigFix is a highly effective solution that stands out when compared to most of its competitors. Two major advantages it offers are its auto-patching capability and its user-friendly tools.
Santhosh K., the chief executive officer of Catnip Infotech Private Limited, writes, “The second valuable feature is, BigFix also has an auto patch updating feature, where the latest patches, and what is required for my system are automatically downloaded and kept ready for me. The solution applies the patch and notifies me after applying the patch. BigFix also gives me a ping saying that I should reset my system within a certain period of time, while the patch is being applied. Let's say, the patch is being applied and if there's an issue, the solution can revoke the applied patch, and revert back to the old state.”
Benedikt S., an application administrator, says, “It's very straightforward. The usability is very close to everyday technical tools that you use as a systems administrator. So it's quite user-friendly.”
CrowdStrike Falcon offers comprehensive endpoint protection with real-time threat detection, AI-driven capabilities, and seamless integration with other platforms. Its cloud-native design provides robust security across diverse environments, making it a reliable choice for modern cybersecurity needs.
CrowdStrike Falcon is heralded for features like robust endpoint visibility, threat detection, and AI-driven capabilities. Users value its efficient real-time monitoring, which maintains low impact on performance while offering seamless integration with platforms. The lightweight design, coupled with comprehensive dashboards and automated threat responses, enhances security operations while reducing resource strain. CrowdStrike's cloud-native architecture ensures flexible, always-on protection, making it adaptable to a wide range of environments. However, improvements can be made in log management, compatibility with diverse operating systems, and integration with third-party technologies. Users also seek more robust reporting features, fewer false positives, and better support for legacy systems. Enhanced policy application, AI capabilities, and extended on-demand scanning are desired, while pricing and technical support responsiveness are concerns.
What are CrowdStrike Falcon's key features?CrowdStrike Falcon is implemented widely in industries relying on robust endpoint protection for monitoring, securing endpoints, forensic analysis, and malware detection. Its cloud-based AI capabilities ensure comprehensive security across devices, making it a preferred choice for networks, servers, and workstations globally. The efficient management of security threats and compliance with regulations is achieved with minimal resource consumption.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.