Try our new research platform with insights from 80,000+ expert users
Jasmin Surani - PeerSpot reviewer
Senior Cybersecurity Engineer (Security Operations & Engineering) at a manufacturing company with 10,001+ employees
Real User
Top 5Leaderboard
Enhances the overall safety of our company's environment from cyber threats
Pros and Cons
  • "The most valuable feature of CrowdStrike Falcon Cloud Security is its lightweight sensor, taking minimal space and not impacting server performance."
  • "It would be more convenient if there was an easier way to install CrowdStrike, perhaps through better integration with Active Directory."

What is our primary use case?

I use CrowdStrike Falcon Cloud Security primarily for endpoint protection, including detection and response. It acts like a modern antivirus, automatically detecting and responding to threats based on defined policies. Additionally, it offers a vulnerability management module, highlighting machine vulnerabilities based on the number of managed machines.

What is most valuable?

The most valuable feature of CrowdStrike Falcon Cloud Security is its lightweight sensor, taking minimal space and not impacting server performance. The centralized console is a huge advantage, letting me manage everything from one place. It also allows running scripts directly on machines through the portal, making it highly convenient.

What needs improvement?

In terms of improvement, it would be more convenient if there was an easier way to install CrowdStrike, perhaps through better integration with Active Directory. This could automate the installation process for new machines in the environment.

For how long have I used the solution?

 I have been using CrowdStrike Falcon Cloud Security since 2020.

Buyer's Guide
CrowdStrike Falcon Cloud Security
June 2025
Learn what your peers think about CrowdStrike Falcon Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.

What do I think about the stability of the solution?

CrowdStrike Falcon Cloud Security is highly stable, with minimal false positives and performance issues. It operates smoothly without requiring much intervention.

What do I think about the scalability of the solution?

CrowdStrike Falcon Cloud Security is scalable. While installation is manual on each machine, it is easy to deploy on any number of machines, and their console makes it simple to manage them all. CrowdStrike Falcon Cloud Security is widely used in our company, managing endpoint security on almost every device. The user base is around 50,000 plus.

How are customer service and support?

I have been in touch with CrowdStrike's tech support for the past three years. Their support is excellent, quickly resolving issues and providing top-notch assistance, especially compared to other security vendors I have worked with.

Which solution did I use previously and why did I switch?

We chose CrowdStrike because of its effective detection capabilities with minimal false positives. It enhances the overall safety of our company's environment from cyber threats.

How was the initial setup?

It is a cloud-based solution managed by CrowdStrike. All we need to do is install a simple sensor on our machines, and they take care of the rest, providing us with a comprehensive endpoint security solution. We can easily monitor and manage security through their user-friendly interface. The installation and setup of CrowdStrike Falcon Cloud Security are very easy and require a good internet connection on your machine.

What's my experience with pricing, setup cost, and licensing?

CrowdStrike Falcon Cloud Security is not cheap but it is worth the money. It simplifies administration by handling both vulnerability and endpoint security with just one sensor installation. In terms of cost, it is competitive and comparable to Windows Defender, offering better efficiency without the need for multiple consoles.

Which other solutions did I evaluate?

We explored other options like Trend Micro and Sophos before deciding on CrowdStrike. However, those tools had performance issues, especially on application servers and desktops due to their heavy installers. CrowdStrike stood out as it is lightweight and doesn't impact system performance during operation.

What other advice do I have?

I would strongly recommend CrowdStrike Falcon Cloud Security to others. It is highly effective in providing accurate security and detecting cyber threats without overwhelming you with false positives. It allows you to focus on meaningful alerts, making it a value-for-money product. Overall, I would rate it as a nine out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Vikram Srirama. - PeerSpot reviewer
Deputy General Manager at Sagility
Real User
Top 5
Worth the money and provides a lot of control and visibility
Pros and Cons
  • "Cloud security posture management (CSPM) is most valuable."
  • "There should be cloud storage scanning. We would like to have cloud storage vulnerability and threat management on any cloud storage."

What is our primary use case?

We use it for EDR as well as cloud security posture management. We also use file integrity and vulnerability management.

How has it helped my organization?

By implementing CrowdStrike Falcon Cloud Security, we wanted a 360-degree view of the security landscape of our enterprise. We wanted the complete view in one single dashboard, and our requirement was almost met with this solution.

We gained a lot of control and visibility into our cloud infrastructure using CrowdStrike Falcon Cloud Security. Within 30 days of deployment, we started seeing its value.

What is most valuable?

Cloud security posture management (CSPM) is most valuable.

What needs improvement?

There should be cloud storage scanning. We would like to have cloud storage vulnerability and threat management on any cloud storage.

For how long have I used the solution?

I have been using this solution for three years.

What do I think about the stability of the solution?

It is stable. I would rate it a nine out of ten for stability.

What do I think about the scalability of the solution?

It is scalable. I would rate it a nine out of ten for scalability.

In terms of our environment, we have multiple sites, multiple delivery centers, and multiple clouds. CrowdStrike Falcon Cloud Security is covering all aspects.

Which solution did I use previously and why did I switch?

We had McAfee, and we replaced McAfee with CrowdStrike because of the features such as EDR. We got multiple security features from a single vendor.

How was the initial setup?

It is deployed on the public cloud. We use AWS and Azure.

Its initial setup was straightforward. Its implementation took about 15 days.

We did the agent installation on a test bed or less critical devices. We monitored the performance, and we monitored the data coming into CrowdStrike from those deployments. Once we were satisfied, we followed a phased approach. Phase by phase, we covered all our resources under the CrowdStrike umbrella.

What about the implementation team?

We implemented it in-house. We had two senior engineers involved.

In terms of maintenance, it does not require any maintenance from our side.

What was our ROI?

It is worth the money.

What's my experience with pricing, setup cost, and licensing?

Its price is moderate.

What other advice do I have?

I would recommend trying its features, evaluating it, and seeing if it fits your requirements. Only then proceed with the purchase. 

I would rate CrowdStrike Falcon Cloud Security a ten out of ten. It is good.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
CrowdStrike Falcon Cloud Security
June 2025
Learn what your peers think about CrowdStrike Falcon Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
Sesan SULE - PeerSpot reviewer
SOC Analyst at a tech services company with 10,001+ employees
Real User
Top 10
It's easy to gather insights and conduct analysis about existing threats
Pros and Cons
  • "It's easy to gather insights and conduct analysis about existing threats."
  • "The threat intelligence and user behavioral analysis could be more comprehensive."

What is our primary use case?

We use Falcon to protect endpoints, including the on-premise systems and cloud environment. 

How has it helped my organization?

CrowdStrike protects us from vulnerabilities and threats while mitigating the risk. The security integration is quite good, but we had a few issues integrating with some of our client's endpoints. They wanted us to monitor some of their medical devices, such as MRIs, in case anyone attempted to attack through them. 

What is most valuable?

It's easy to gather insights and conduct analysis about existing threats. Threat hunting enables you to track on-prem services, and the real-time response capability improves threat and risk analysis. 

What needs improvement?

The threat intelligence and user behavioral analysis could be more comprehensive. 

For how long have I used the solution?

I have used CrowdStrike Falcon for 3 years.

What do I think about the stability of the solution?

I rate CrowdStrike Falcon 6 out of 10 for stability. 

What do I think about the scalability of the solution?

I rate CrowdStrike Falcon 7 out of 10 for scalability.

How are customer service and support?

I rate CrowdStrike support 8 out of 10. We've had a good experience with them. They're helpful and always respond quickly. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I've worked with Microsoft Defender. I'm more familiar with that. 

How was the initial setup?

I don't have hands-on experience with the deployment. My team deployed it. The deployment time varies, and we do it in batches. It involves many tasks, and it can take weeks. After deployment, it requires regular patching. 

What's my experience with pricing, setup cost, and licensing?

You can't get a fixed price for these tools. If you subscribe to something and need to deploy it to another team, the price goes up. It's the same with Microsoft Defender. I'm not responsible for the budget, but I think it's cost-effective for providing detection and response for an entire organization. 

What other advice do I have?

I rate CrowdStrike Falcon Cloud Security 8 out of 10.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Intekhab Ahmad. - PeerSpot reviewer
Senior System and cyber security administration at Tankeenhr
Real User
Top 5Leaderboard
Automatic updates and user-friendly reporting features, ensuring robust protection against a wide range of cyber threats
Pros and Cons
  • "The most significant benefit is how quickly malware and other malicious attacks are detected."
  • "The only challenge lies in token verification."

What is our primary use case?

Many different types of data flow into our organization from various sources, each serving different purposes and reaching different departments. For security reasons, we've opted for CrowdStrike Falcon, and it has proven to be highly effective. It consistently detects and removes unwanted viruses and miscellaneous threats from our network and systems. Additionally, we've deployed it on our servers, where it continues to provide robust protection against malware.

It's been employed within our organization to detect and respond to threats in our cloud workload. Upon detection of any issues on a machine, we promptly receive notifications or can view details on the portal, confirming which machines are affected. Additionally, it offers a plethora of features such as investigative tools and deep information sandboxing, enhancing our ability to address security concerns effectively.

How has it helped my organization?

Cloud-native threat intelligence is invaluable to me. The information provided is easily accessible through a dedicated tab, offering a wealth of valuable insights and recommendations. This includes various implementations and suggestions for enhancing security measures. Additionally, there's the option for sandboxing, which proves useful on occasion.

Our security operations have greatly benefited from the real-time response capabilities. Upon verification, potentially harmful downloads are promptly blocked and removed automatically. We have several dialer configurations, including medium, moderated, high, and low, with automated settings deployed across most machines. For servers, I opt for a moderated configuration, considering the occasional lack of generated signatures when deploying new software.

Our results clearly show the impact on our incident response time. Whenever an incident occurs, we receive comprehensive information promptly. Sometimes, we even receive emails providing updates and recommendations on how to address the situation effectively.

What is most valuable?

The most significant benefit is how quickly malware and other malicious attacks are detected. I've extensively tested it on my machine and server by simply double-clicking various files. In many cases, the detection is immediate, preventing the file from running and displaying a message indicating that it contains malware. Additionally, when downloading files for testing purposes, especially from third-party sources, CrowdStrike Falcon often detects potential threats instantly and sometimes even removes them automatically.

What needs improvement?

The only challenge lies in token verification. Generating the token is crucial, and if it doesn't match, it causes problems. However, this issue mainly arises when new users or inexperienced administrators are involved. They may inadvertently remove the token and struggle with the installation process. Initially, there were some challenges with the portal's user-friendliness, particularly when generating reports, but these issues have since been addressed.

For how long have I used the solution?

I have been using it for four years now.

What do I think about the stability of the solution?

It's highly stable with no reported issues. I would rate it ten out of ten.

What do I think about the scalability of the solution?

It provides excellent scalability capabilities. I would rate it nine out of ten.

Which solution did I use previously and why did I switch?

In my previous role at a different company, I managed Symantec Endpoint Protection hosted on local servers rather than in the cloud. We encountered issues related to the HES file and their engines, as they only added virus definitions without making significant changes to their main framework or engine.

How was the initial setup?

The initial setup is straightforward, especially for experienced users who find it easy to handle. However, for newcomers with only a month or two of experience, there might be a learning curve as they familiarize themselves with the process.

Implementing the tool itself poses no issues. I've successfully created the GPO and installed it without any problems.

What about the implementation team?

We've deployed it using two different methods. First, I established a Group Policy Object to deploy it, and second, we utilized Intune. Following deployment, the machines are promptly visible on the portal. However, configuring additional settings is not a one-day task; it requires understanding user requirements and preferences. The complexity of the setup depends on the level of detail and customization desired.

Initially, I deployed the solution on ten testing machines, comprising both servers and local devices. It took approximately two days to configure and fine-tune the setup before finalizing it for deployment across the organization. As the sole manager responsible for both security and system management, I oversaw the entire process. With multiple branches across different locations, totaling eighteen, efficiency was crucial. One notable advantage is the small footprint of the endpoint engine, typically ranging from forty to seventy megabytes, ensuring minimal bandwidth and resource consumption compared to other antivirus solutions. Maintenance is minimal. I typically monitor the machines to ensure they remain active. If a machine has been inactive for more than ten days, it's flagged and moved to a separate section on the portal for review.

What was our ROI?

We've observed a positive return on investment. Additionally, we utilize Microsoft Defender Endpoint with our Microsoft Elastic 365 license. Despite having multiple options, it's noteworthy that the CrowdStrike Falcon solution often detects threats before Microsoft Defender.

What's my experience with pricing, setup cost, and licensing?

The pricing is reasonable, neither overly expensive nor excessively cheap, making it competitive compared to other market options. The best aspect is that there's a single price for all types of endpoints. There's no need to purchase separate licenses for servers and Windows systems.

What other advice do I have?

I would recommend it, particularly for its robust reporting capabilities, which provide access to a wealth of data. Additionally, the automatic updates feature ensures that the software stays current without requiring manual intervention. This eliminates the need to manually update each machine, as the updates are deployed automatically whenever a new version is available. Overall, I would rate it nine out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Pedro Barros - PeerSpot reviewer
Security Analyst at a energy/utilities company with 1,001-5,000 employees
Real User
Top 10
The user interface designs are highly user-friendly with interesting settings
Pros and Cons
  • "The RTR feature stands out as particularly valuable to me due to its capability to log into machines."
  • "Incorporating threat intelligence into the system would be a valuable addition."

What is our primary use case?

CrowdStrike Falcon serves as our go-to tool for endpoint detection and response. We often leverage scripts to implement actions such as blocking and isolating specific machines. These scripts help us pinpoint and flag machines within the system that require investigation. Our focus involves delving into logs, scrutinizing identities, and ensuring a secure cloud posture through effective cloud posture management.

What is most valuable?

The primary focus lies in the swift and effective response to potential threats. CrowdStrike's Remote Threat Response feature allows remote access to machines under investigation, provided they are online. This capability significantly aids in expediting the investigative process. Additionally, the tool supports threat hunting within the Falcon framework. An aspect worth noting is the tool's proficiency in making correlations within internal data, including both machine and user logs.

The RTR feature stands out as particularly valuable to me due to its capability to log into machines. Whether it's a Linux machine, allowing me to execute native Linux commands, or a Windows machine, where I can use PowerShell commands, it empowers me to seamlessly proceed with my investigations. This flexibility is a key factor that enhances the overall effectiveness of my work.

What needs improvement?

I tend to focus more on the forensic aspects, believing there's potential for additional improvements in that area. I've noted that CrowdStrike recently introduced a new feature in their latest update, aimed at enhancing forensic capabilities. Incorporating threat intelligence into the system would be a valuable addition.

For how long have I used the solution?

I have been working with it for two months.

What do I think about the stability of the solution?

The stability of the platform has been consistently reliable, with no instances of downtime or issues encountered during installations. The process has been remarkably smooth, and I have not encountered any problems so far.

What do I think about the scalability of the solution?

The scalability is quite impressive. With thousands of endpoints in our environment, we can effortlessly deploy additional agents on any new endpoint integrated into our system.

How are customer service and support?

Regarding technical support, the response time typically takes a few hours. The speed of response may be influenced by the specific licensing arrangements in place. I would rate it seven out of ten.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

In my previous role, we predominantly relied on Azure solutions. Microsoft Advanced Threat Protection, encompassing Defender for Endpoint, Sentinel for Identity, and Security for Cloud Apps, constituted the core components of our security arsenal.

What about the implementation team?

The deployment spans various locations and departments, encompassing all our endpoints. This includes multiple nationwide locations and extends to different continents. Maintenance is not a significant requirement. While we do make occasional updates to rules, our Security Management service takes care of this aspect. Updates, including new rules, are automatically implemented during the update process. Duplicative rules are removed in the course of these updates. Although we have some custom rules, the entire process is managed as part of a service, ensuring seamless and well-controlled cycles.

Which other solutions did I evaluate?

I have a stronger inclination towards Microsoft ATP. However, since joining this company just three months ago, CrowdStrike Falcon has become a part of my toolkit.

What other advice do I have?

The user interface designs are highly user-friendly with some interesting settings. I would wholeheartedly recommend it to anyone not specifically seeking a source solution but rather a comprehensive Security Orchestration, Automation, and Response platform. The flexibility it offers to analysts is noteworthy, especially when utilizing the RTR feature. This allows seamless remote access to computers, where analysts can execute commands natively without disrupting user activities. It provides a valuable capability for conducting investigations discreetly and efficiently. Overall, I would rate it eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Aviation Officer at Deveillance
Real User
Top 20
Enhances cloud security with advanced automation and improved resource allocation
Pros and Cons
  • "The most valuable features of CrowdStrike Falcon include its automation capabilities, efficacy, and lower risk."
  • "The SIEM needs to be more developed."

What is our primary use case?

CrowdStrike Falcon is used primarily to enhance cloud security through a lot of automation in the platform. It provides benefits like automation, efficacy, and lower risk, allowing security analysts to focus on high-value tasks.

How has it helped my organization?

By deploying CrowdStrike Falcon, the organization can repurpose security analysts to focus on more high-value tasks due to the automation. It also optimizes on licensing because CrowdStrike covers a significant number of capabilities, which allows for the replacement of several vendors, thus reducing licensing and labor costs.

What is most valuable?

The most valuable features of CrowdStrike Falcon include its automation capabilities, efficacy, and lower risk. It also helps optimize on licensing since it covers a wide range of capabilities.

What needs improvement?

The SIEM needs to be more developed. Additionally, AI features could be enhanced.

For how long have I used the solution?

I have been using the solution for only one year.

What do I think about the stability of the solution?

On a scale of one to ten, the stability of CrowdStrike Falcon Cloud Security is nine.

What do I think about the scalability of the solution?

CrowdStrike Falcon is very scalable. I would rate its scalability as nine out of ten.

How are customer service and support?

As far as I know, the technical support for CrowdStrike is rated as another nine out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

One person from the partner side and two people from the customer side are usually involved in the installation process.

What about the implementation team?

One person from our side and about one or two people from the customer's side are generally involved.

What's my experience with pricing, setup cost, and licensing?

CrowdStrike Falcon is definitely affordable compared to competitors in the market. On a scale of one to ten, I would rate the pricing as eight out of ten, indicating some room for improvement.

What other advice do I have?

I'd rate the solution nine out of ten.

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer.
Flag as inappropriate
PeerSpot user
ICT Director at The Ministry of Justice
Real User
Lightweight and has login features like multi factor authentication
Pros and Cons
  • "The solution has login features like multi factor authentication."
  • "The tool could give us more templates so that people who are not updated with the platform can easily get acquainted with how to secure and utilize the product more."

What is our primary use case?

I use the solution for protection on the go for end-user computers, identity management, proactive awareness of devices on the network, and statistical collection on the devices.

What is most valuable?

The solution's most valuable feature is that the solution for IT security is not based on the on-premises solution; it is available on demand. It is lightweight and can be held on a mobile device. The solution has login features like multi factor authentication. The tool facilitates data collection of the equipment on the network, including solutions on whether to remove or keep some computers.

The solution interacts with the domain controller and gives an update on what specifics may be harmful to the environment so that we can tag it to the users before they actually contact the IT team for support.

What needs improvement?

While it may be able to show the user in the drill zone, it could have a listed column at a higher level. That way, it would help the IT team do targeted interventions rather than having to drill into the details. The tool could give us more templates so that people who are not updated with the platform can easily get acquainted with how to secure and utilize the product more.

The only thing I don't like about the application is when a computer name changes, the CrowdStrike app maintains the two devices. The name or the MAC address was different. I'm unsure if the solution can flush the database based on the similarities in the MAC address.

The solution lists the equipment but maintains the tool name on to something else. If we have renamed the equipment that joined the platform before, we just delete it manually. So, we know which one is now the new name.

For how long have I used the solution?

I have been using CrowdStrike Falcon Cloud Security for more than two years.

What do I think about the scalability of the solution?

We are confident that the solution should be able to scale well based on the current features and the modular programming that it appears to be doing. The idea of scalability is that it can handle volumes of data requests outside of what our environment is doing. We not only deploy the solution in one domain controller, but what we can see on the domain controller is based on our environment setup. Based on the hybrid point of view, I think the solution is very scalable.

We have around 500 users working with the solution in our environment. In my environment, we're testing to see if we need to increase usage. If not, the other solution would be mobile device management to handle the other exceptions we currently see.

I rate the solution’s scalability an eight out of ten.

How are customer service and support?

When we recently got the licenses, we were told to do something. When we observed that we didn't want to transfer where we were, they did something else to help with the solution. The technical team is not just technical; they're also human in that they're adaptable to customer needs and provide guidance.

How would you rate customer service and support?

Positive

How was the initial setup?

The team was awesome at implementing the tool. When we transferred to the paid version, the technician or engineer from CrowdStrike transferred to the new tenant without redeploying the endpoint, which was awesome for me.

On a scale from one to ten, where one is difficult and ten is easy, I rate the solution's initial setup a nine out of ten.

What was our ROI?

I can't give you a percentage of the return on investment. The solution protects me from the cybersecurity threats, which is very good for me and my team. So, I'm giving you a qualitative response as opposed to a quantitative response.

What's my experience with pricing, setup cost, and licensing?

It's an expensive package but does what it says it will do. Specialists are usually not cheap, so you expect to have a great package. They help you customize it, so I think it is worth it. The solution's pricing is in the same range as FortiEDR's. We paid over five million dollars for our package based on the number of subscriptions and the other add-ons to the package bundle.

The licensing fee we pay for the solution doesn't include managed services because my technical team and I were able to handle the product. It's very easy to maneuver. There's no additional cost for us to use the product outside the bundle we've requested. We ask for the basics, and then we include add-ons for the identity and server management. That will be the only add-ons cost that is manageable.

I rate the solution’s pricing an eight out of ten.

What other advice do I have?

The dashboard gives an overview of the last login for somebody besides you. You know what is going on at a high level since you don't always have to have one operating system or environment. The suggestion and the data dictionary or the look of the threat environment are also helpful because they help us prepare against the threat landscape once it is known.

Based on how the organization is listed, you could classify the equipment according to an organizational unit to identify the component. That is helpful because if you're being attacked, you can see where the entry point comes from based on the response coming from the panel. This response can be emailed to the team.

The solution is deployed on the cloud. Before buying the solution, understand the technology gap so that you can look for the features you need. Any lightweight product that can be accessed on a mobile device on the go or outside the office is a great product for security specialists. The solution offers good availability and multi factor authentication. Some security concerns are built into the tool's security package.

It helps you understand the ecosystem of lurking threats waiting to come to your network or already on it. It is a great product for those who want inventory insight into their network. It gives you a lot of details that you probably wouldn't have captured if you didn't have great inventory management from an IT perspective.

The tool can also help you plan your next product or procurement of equipment to get better feedback on what's going on from your user experience. For me, the solution's statistics insight is great. The dashboard is awesome because you don't have to look for something. It can tell you exactly which computers are online and which haven't come online for a long time.

From a technological point of view, you can call and find out why equipment is not online to make a proactive decision.

I believe AI has always been a part of the package we've been using for a time. The proactive threat hunt based on statistics in the environment is a part of the AI search feature in the portal. From a cybersecurity point of view, if the product can detect a threat lurking in your network, it helps you sleep better at night because you don't have to look for it all the time.

The statistics provided via email or in the CrowdStrike environment point you in a direction so you can do something. If you don't want to do it yourself, the tool can be trained to do it automatically for you if you allow the settings.

Overall, I rate the solution a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
reviewer2238078 - PeerSpot reviewer
Manager of infrastructure support at Fenix Innovations
Real User
Easy to use and helpful for security, but the console and the support need improvement
Pros and Cons
  • "Cloud security is one valuable feature. Spotlight is the other one. There is also vulnerability management and a couple of more features."
  • "It gets the work done, but the main problem with the solution is that if you remediate anything, it takes 45 days for you to get any of the features displayed on the dashboard. This is the real weakness of CrowdStrike. Their customer support is also not ready to help with it. If you remediate any cloud vulnerability that they are giving you, such as removing a host from your organization, it takes around 45 days for them to remove it from their console."

What is our primary use case?

We took this solution just for security purposes. We do not want someone to attack us, get into our environment, and get sensitive customer data.

How has it helped my organization?

It is good for security. We have a Palo Alto firewall, and we implemented CrowdStrike as an add-on feature. 

What is most valuable?

Cloud security is one valuable feature. Spotlight is the other one. There is also vulnerability management and a couple of more features.

What needs improvement?

The console and the customer service are quite bad. We paid a big amount of dollars to them to implement it. We paid them for premium support. 

It gets the work done, but the main problem with the solution is that if you remediate anything, it takes 45 days for you to get any of the features displayed on the dashboard. This is the real weakness of CrowdStrike. Their customer support is also not ready to help with it. If you remediate any cloud vulnerability that they are giving you, such as removing a host from your organization, it takes around 45 days for them to remove it from their console.

For how long have I used the solution?

It has been around a year since I onboarded it in my company and have been using it.

What do I think about the stability of the solution?

It is stable.

What do I think about the scalability of the solution?

It is scalable, but it depends on the organization's structure and how vast the environment is. Our environment is not that big, so scalability is okay. It is just that you need to deploy the sensors on the hosts.

How are customer service and support?

I would rate their support a five out of ten because they do not respond. We have taken premium support with them. If we raise a case with them, it takes around two to three days to get a call scheduled with them. Even the TAM that we have got from them cannot help. If you go for any service from Google, Microsoft, or Amazon AWS, their TAM is always ready to help you with your queries, but in the case of CrowdStrike, the TAM says that you need to raise a support case, and they will help you out.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I was not there in the organization at the time, so I do not know about it.

How was the initial setup?

I lead a team of 18 people. I get it deployed on all of the EC2 instances through them.

Its initial setup was straightforward. It is very easy to use. 

For the whole organization, it took two weeks because we needed the downtime as well to deploy it in the production environment. 

In terms of maintenance, it does not require any maintenance from our side. 

What about the implementation team?

There was some consulting from the CrowdStrike team. They did help us to implement it.

Overall, five or six people were assigned to deploy the solution. They were infra-support engineers. It was deployed across multiple locations.

What's my experience with pricing, setup cost, and licensing?

I am not the one who handled the pricing. A different team worked on it, but it is pretty expensive.

Which other solutions did I evaluate?

We did our research and after that, we implemented CrowdStrike. Secureworks was there. There were some different players that gave us the quotation, but in terms of the features and the price, CrowdStrike was good. 

CrowdStrike offered us Spotlight, vulnerability management, and cloud solution management. There are different blades to it. We implemented it, and now it supports our environment. It is good.

What other advice do I have?

To those evaluating this solution, I would say that it depends on their needs. If they need this product, they can go ahead and take it. It is straightforward, and it gets the job done.

I would rate it a seven out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free CrowdStrike Falcon Cloud Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Buyer's Guide
Download our free CrowdStrike Falcon Cloud Security Report and get advice and tips from experienced pros sharing their opinions.