CrowdStrike Falcon and Microsoft Defender Threat Intelligence compete in the endpoint detection and response (EDR) category. CrowdStrike Falcon has the upper hand due to its superior EDR capabilities and remote incident control.
Features: CrowdStrike Falcon provides comprehensive endpoint detection and response with visibility, threat analysis, and automatic alerts, allowing remote connectivity for security analysts. Microsoft Defender Threat Intelligence integrates well within the Microsoft ecosystem, offering a cohesive experience for users already utilizing Microsoft services.
Room for Improvement:CrowdStrike Falcon can improve report functionalities, such as exporting to PDF, and enhance machine learning features to reduce false positives. Support for legacy operating systems is also needed. Microsoft Defender Threat Intelligence could enhance integration with non-Microsoft platforms and reduce false positives. Its pricing model is a concern for those without an M 365 E5, and better collaboration with other IT security vendors would be beneficial.
Ease of Deployment and Customer Service: CrowdStrike Falcon offers extensive deployment options across cloud environments and is praised for its ease of setup and well-regarded technical support, although it could improve response times. Microsoft Defender is well-suited for the Microsoft ecosystem but faces challenges with other IT solutions. Its support is robust within Microsoft products, yet enhanced collaboration with other vendors is desirable.
Pricing and ROI: CrowdStrike Falcon, although costly, offers significant ROI by reducing incident resolution times and enhancing threat management. Its robust functionality saves on IT resources. Microsoft Defender is cost-effective within its ecosystem, especially for M 365 E5 users, but enterprises not aligned with Microsoft services might find CrowdStrike's ROI more advantageous.
CrowdStrike Falcon saves time and offers good value for money, especially for enterprise companies, because it can stop breaches.
It's very easy to deploy without many IT admins, saving time.
It's a value-for-money product.
On a scale of one to ten, I would rate the technical support as a 10 because they resolve many issues for us.
The CrowdStrike team is very efficient; I would rate them ten out of ten.
They could improve by initiating calls for high-priority cases instead of just opening tickets.
Level two support is knowledgeable and knows how the product works, which is very good.
I would give Microsoft an eight for their technical support.
It has adequate coverage and is easy to deploy.
In terms of scalability, I find CrowdStrike to be stable, and I have not encountered any limitations with it.
There's no scalability limitation from CrowdStrike itself, as it just requires agent deployment.
If there were some customizations available, I would rate its scalability as nine out of ten.
I have never seen instability in the CrowdStrike tool.
We are following N-1 versions across our environment, which is stable.
The biggest issue occurred when every computer worldwide experienced a blue screen.
It provides a high level of security and avoids phishing and scam emails.
Simplifying the querying process, such as using double quote queries or directly obtaining logs based on IP addresses or usernames, would be beneficial.
Another concern is CrowdStrike's GUI. It changes annually, making it hard to work and find options.
Threat prevention should be their first priority.
Providing code customization would help keep pace with new vulnerabilities and threats.
The main area of improvement for Microsoft Defender Threat Intelligence is related to how information is conveyed.
From the telemetry data standpoint, I would prefer Defender data to be more open in future updates.
It is expensive compared to SentinelOne, but as the market leader, it is worth it.
The licensing cost and setup costs are affordable.
The solution is a bit expensive.
I can investigate by accessing the customer's host based on the RTR environment and utilize host search to know details for the past seven days, including logins, processes, file installations, malicious processes, and network connections.
The real-time analytics aspect of CrowdStrike performs well because we get all logs in real-time, with no delay, allowing us to take action immediately.
Being an EDR solution, it helps us identify attacks in real-time.
If it wasn't for that real-time threat detection on the vulnerability, I think we would not have survived the attack.
One of the best features is that it provides a certain level of customization, allowing us to set our spam confidence levels.
Our threat detection is enhanced due to the AI agents in Microsoft Defender Threat Intelligence, which helps in detecting automatically.
Product | Market Share (%) |
---|---|
CrowdStrike Falcon | 7.9% |
Microsoft Defender Threat Intelligence | 2.8% |
Other | 89.3% |
Company Size | Count |
---|---|
Small Business | 46 |
Midsize Enterprise | 34 |
Large Enterprise | 61 |
Company Size | Count |
---|---|
Small Business | 16 |
Midsize Enterprise | 2 |
Large Enterprise | 15 |
CrowdStrike Falcon offers comprehensive endpoint protection with real-time threat detection, AI-driven capabilities, and seamless integration with other platforms. Its cloud-native design provides robust security across diverse environments, making it a reliable choice for modern cybersecurity needs.
CrowdStrike Falcon is heralded for features like robust endpoint visibility, threat detection, and AI-driven capabilities. Users value its efficient real-time monitoring, which maintains low impact on performance while offering seamless integration with platforms. The lightweight design, coupled with comprehensive dashboards and automated threat responses, enhances security operations while reducing resource strain. CrowdStrike's cloud-native architecture ensures flexible, always-on protection, making it adaptable to a wide range of environments. However, improvements can be made in log management, compatibility with diverse operating systems, and integration with third-party technologies. Users also seek more robust reporting features, fewer false positives, and better support for legacy systems. Enhanced policy application, AI capabilities, and extended on-demand scanning are desired, while pricing and technical support responsiveness are concerns.
What are CrowdStrike Falcon's key features?CrowdStrike Falcon is implemented widely in industries relying on robust endpoint protection for monitoring, securing endpoints, forensic analysis, and malware detection. Its cloud-based AI capabilities ensure comprehensive security across devices, making it a preferred choice for networks, servers, and workstations globally. The efficient management of security threats and compliance with regulations is achieved with minimal resource consumption.
Microsoft Defender Threat Intelligence [EOL] offers comprehensive security by integrating with Microsoft platforms, retaining data within tenants, and providing real-time threat detection and collaboration. It's designed for both enterprise and SMB environments.
Microsoft Defender Threat Intelligence enhances cybersecurity operations by integrating with Azure Sentinel and Microsoft products like Intune and Azure. Its capabilities in endpoint, email, and cloud security ensure robust protection against a wide range of threats. With global threat data, anti-spam features, and customization options, it addresses threat prevention and vulnerability management. Seamless scaling and proactive incident prevention make it a reliable choice for enterprises looking for collaborative, efficient security management.
What are the key features of Microsoft Defender Threat Intelligence?Microsoft Defender Threat Intelligence is crucial for industries that value data retention and comprehensive threat analyses in safeguarding their operations. Financial institutions, healthcare providers, and technology firms implement this solution to secure their environments by updating security protocols and ensuring compliance with various industry standards. The focus on integration and customization helps these organizations adapt to evolving cybersecurity threats effectively.
We monitor all Threat Intelligence Platforms (TIP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.