

Find out in this report how the two Cloud Security Posture Management (CSPM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
More than 12 million vulnerabilities have been identified and resolved while working with CrowdStrike Falcon Cloud Security over the past 10 years.
We have seen a return on investment through time saved and managed employee workload.
It is an expense we are willing to pay to conform to Cyber Essentials Plus and demonstrate responsibility in protecting our data and that of our partners.
There was a specific issue that our other security tooling did not pick up, but XM Cyber did.
It's reduced the timescale to remediate vulnerabilities that are identified as representing a high risk.
Based on my experience with CrowdStrike Falcon Cloud Security's technical support, I would rate them a solid 10 out of 10.
Technical support is quite good.
I have contacted customer service, and they are fast.
The customer support is fantastic; it's probably some of the best we've received across all our security vendors.
Customer support for XM Cyber is good, responsive, and it follows up on issues.
It is deployed across multiple departments and multiple locations.
CrowdStrike Falcon Cloud Security is indeed highly scalable, ideally for enterprises with a minimum of 2,000 servers to ensure cost efficiency and easier setup.
The scalability of CrowdStrike Falcon Cloud Security is good, and it can easily scale up to over 20,000 or 30,000 endpoints.
Its scalability is great; it's easy to deploy and fully scalable.
We have not experienced any issues with scalability or reached its limits.
Occasionally, when the workload increases, it slows down considerably and sometimes becomes unresponsive.
When evaluating the stability of CrowdStrike Falcon Cloud Security, their partnerships with all major cloud service providers ensure their servers are optimally positioned.
We have quite a complex and large IT estate, and we've certainly experienced no limitations or problems arising from the ability of XM Cyber's product to scale across that estate.
If CrowdStrike Falcon Cloud Security could implement pushing out remediation from the sensor installed on machines, that would be beneficial.
The user interface needs improvement as it's sometimes difficult to locate specific dashboards or reports.
Another issue is the lack of proper documentation.
We push the boundaries with digital twins; I understand XM Cyber uses a similar concept of graph databases to map environments.
They could improve support because when we need to create a super case and escalate to resolve with technical support, they resolve our ticket in approximately two weeks.
The part that can be improved is the mobile exposure and the IBM i specific equipment.
The pricing for CrowdStrike Falcon Cloud Security is reasonable, especially for small companies with limited budgets.
No additional cost for maintenance or support; it's all included in the quotation.
However, the main point is that even though it is expensive, it provides a huge capability to the organization.
We have a large, complicated estate, and in the licensing discussions, we were keen not to have the cost balloon because of the complication, the number of PCs and servers that we have.
It automatically blocks duplication and activities that could result in data loss, effectively preventing unintended copying of data to personal devices.
The threat detection capability of CrowdStrike Falcon Cloud Security has always been the major seller, and it works effectively.
CrowdStrike Falcon plays a crucial role in our environment and gives us a clear point where we can focus our efforts rather than hunting down what is happening.
Our loss exposure amount has reduced significantly, leading to two big wins: our loss exposure amount has gone down, and we have direct savings from focusing our team's time on what's important, allowing them to work on other business benefits and generate value for the company.
By far, the best feature of XM Cyber is being able to map out the way vulnerabilities can be exploited based on what they call the choke points in the network where the path that a bad actor would take comes closest to assets within our environment that are most vulnerable but also most valuable.
XM Cyber allows us to quantify the risk, and we are able to track remediation, so we can quantify the risk at an executive level and also to a technical IT team.
| Product | Mindshare (%) |
|---|---|
| CrowdStrike Falcon Cloud Security | 3.8% |
| XM Cyber | 1.0% |
| Other | 95.2% |


| Company Size | Count |
|---|---|
| Small Business | 14 |
| Midsize Enterprise | 6 |
| Large Enterprise | 15 |
CrowdStrike Falcon Cloud Security is a sophisticated platform emphasizing threat detection, real-time response, and automatic blocking, using AI and ML technologies. It effectively integrates with AWS, providing seamless cloud-based management and monitoring.
Falcon Cloud Security leverages AI and ML for comprehensive threat detection and prevention, boasting lightweight resource consumption. Its user-friendly dashboard enhances security management across environments, avoiding data duplication and promoting integration with AWS. Users highlight its effectiveness in protecting endpoints and cloud workloads, assessing configurations, and managing vulnerabilities. While its strategic incorporation of AI enhances security measures, improvements in pricing, integration, and reporting are necessary. Users also report that support services require faster response times. Documentation could be more comprehensive, and enhancements in remediation, Linux capabilities, and multi-cloud visibility would gain value. Users point out navigation issues in the dashboard, affecting user experience.
What are CrowdStrike Falcon Cloud Security's key features?Organizations across various industries utilize Falcon Cloud Security for endpoint and cloud workload protection. It is primarily employed for anomaly detection, network activity monitoring, and threat response, integrating with tools like Splunk to amplify security measures. By identifying and blocking threats such as malware and viruses, it supports security strategies, incident responses, and compliance objectives.
XM Cyber quantifies risk for different organizational levels, enhances patching by targeting choke points, and offers precise attack simulations, optimizing management time and vulnerability resolutions.
XM Cyber empowers organizations to identify significant risks by focusing on choke points and improving patching strategies. The platform excels in providing reliable and precise simulations, informing users about critical vulnerabilities without false positives. It enhances vulnerability management and internal reconnaissance, reducing loss exposure while supporting attack surface management. Users seek improved mobile exposure capabilities and IBM i specific solutions along with better visualization and AI integration.
What are the key features of XM Cyber?XM Cyber is deployed to manage risks in internet-exposed assets and hybrid cloud environments. Its implementation allows organizations to optimize IT resources by identifying vulnerabilities in critical attack paths, thus enhancing efficiency and supporting robust security strategies across industries.
We monitor all Cloud Security Posture Management (CSPM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.