We changed our name from IT Central Station: Here's why

CrowdStrike Falcon Questions

Netanya Carmi
Content Manager
PeerSpot (formerly IT Central Station)
Dec 06 2021

Which is better and why?

1 Answer
Netanya Carmi
Content Manager
PeerSpot (formerly IT Central Station)
Nov 06 2021

Which would you choose and why?

2 Answers
Netanya Carmi
Content Manager
PeerSpot (formerly IT Central Station)
Netanya Carmi
Content Manager
PeerSpot (formerly IT Central Station)
Sep 13 2021

Which would you choose?

Henrique BarjasThe CrowdStrike solution delivers a lot of information about incidents. It has a… more »
2 Answers
Netanya Carmi
Content Manager
PeerSpot (formerly IT Central Station)
Netanya Carmi
Content Manager
PeerSpot (formerly IT Central Station)
Aug 22 2021

Which would you choose?

reviewer1650858Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd… more »
1 Answer
Ron Dutta
Director Information Technology at McCullough Robeertson Lawyers
Aug 20 2021
Hi community members,  I work as the Director of Information Technology at a legal firm and I'm looking at replacing our Symantec EDR with either SentinelOne or CrowdStrike but can't seem to get any balanced views other than those from each vendor.   Currently, I'm doing a POC on both and am in...
Read More »
ITSecuri7cfdWe RFI/POC'd them all.  Sentinel One came out on top for every aspect of the… more »
6 Answers
Bertha Asare
Information Technology Security Analyst at rapid micro bio
Oct 15 2021
Hello, I'm working at a Biotechechnological company and I have been researching Endpoint Protection (EPP) solutions.  I need some help from the community to understand which product has a better reputation: Carbon Black CB Defense or CrowdStrke Falcon. Please share your advice.  Thanks in adva...
Read More »
Dennis CaryThey are both fantastic tools for protection, however, Carbon Black's… more »
1 Answer
Michael LeBron
Systems Engineer at Fortinet
Jul 30 2021

Hi,

I'm looking for a comparison between these 2 products: CrowdStrike Falcon and Fortinet FortiEDR. In addition, business cases and customer testimonials will be a plus. 

Can anyone assist with this information?

Thank you.

1 Answer
Alfonso Minaya
Product Director at a tech services company with 501-1,000 employees

I am a product director at a tech services company with 501-1,000 employees. 

I am currently researching Carbon Black CB Defense, CrowdStrike, and SentinelOne. What are the biggest differences between the three? Which would you recommend?

Thanks! I appreciate the help. 

reviewer1275819A short answer: Perhaps the biggest IMO is SentinelOne is the only one of these… more »
ShreekumarNairDo evaluate www.cynet.com and you will find that Cynet is way ahead in the way… more »
ABHILASH THCrowdstrike USPs compared to CB and SentinelOne: 1. Very powerful Machine… more »
8 Answers
Janet Peng
Manager of IT at a financial services firm with 10,001+ employees

Hi. I need to compare CrowdStrike and Carbon Black. What is the advantage of CrowdStrike over Carbon Black and vice versa? For an enterprise, how do I decide which one is better for my needs?

NachiketSathayePointers are based on the tests performed during the evaluation a few months… more »
Rodney LeeI agree with some of the comments. Crowdstrike is way ahead of CB. However, both… more »
Ankit SatsangiWhile Carbon Black is great for good detections and incident Response… more »
10 Answers
Miriam Tover
Content Specialist
PeerSpot (formerly IT Central Station)
Nov 17 2021

Hi,

We all know it's really hard to get good pricing and cost information.

Please share what you can so you can help your peers.

25 Answers
Miriam Tover
Content Specialist
PeerSpot (formerly IT Central Station)
Nov 17 2021

Hi Everyone,

What do you like most about CrowdStrike Falcon?

Thanks for sharing your thoughts with the community!

29 Answers
Julia Frohwein
Content and Social Media Manager
PeerSpot (formerly IT Central Station)
Nov 17 2021

Please share with the community what you think needs improvement with CrowdStrike Falcon.

What are its weaknesses? What would you like to see changed in a future version?

30 Answers
Miriam Tover
Content Specialist
PeerSpot (formerly IT Central Station)
Nov 17 2021

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

Nachiket SathayeWe are currently using this solution as a replacement for our antivirus… more »
Kunal GuptaWe are currently using this solution as an ERD tool to control and remediate… more »
30 Answers
Julia Frohwein
Content and Social Media Manager
PeerSpot (formerly IT Central Station)
Nov 17 2021

If you were talking to someone whose organization is considering CrowdStrike Falcon, what would you say?

How would you rate it and why? Any other tips or advice?

30 Answers
Endpoint Protection for Business (EPP) Questions
Giusel
IT Engineer at UTMStack
Jan 19 2022

Hi, community!

Usually, when professionals administer the network, they use an Active Directory tool and a cybersecurity solution (e.g., EPP, anti-virus, or SIEM) separately.

Are you aware of SIEM platforms that integrate these tools?

Avraham SonenthalI agree with the users who mentioned Splunk. Splunk is a log message management… more »
5 Answers
Edwin Omondi Ambogo
Senior Technologist at LAIKIPIA UNIVERSITY
Nov 29 2021
Hello dear community, My organization (a university with 500+ employees and ~5000 students) is looking for an endpoint security solution. Currently, we have Seqrite Endpoint Security, Comodo Advanced Endpoint Protection and Kaspersky Endpoint Security on the table for our consideration.  Which ...
Read More »
2 Answers
Satish Singh
Cloud Security Architect at Kyndryl
Nov 06 2021
Hi dear professionals, I'm working as the Cloud Security Architect at a Tech Sevices company with 10,000+ employees and I'm looking for suggestions about on-premise endpoint security solutions.  Please recommend the best product/solution that fits the requirements below (salient features and ex...
Read More »
Eric RiseSatish, Thank you for your well-thought-out and detailed question on this… more »
6 Answers
User at TUBITAK
Nov 23 2021
Hello peers, I am working as an IT member at a research company with 200 employees (at most). I am looking at the pros and cons of SCCM and BigFix software.  At the moment, we are using BigFix just for updating and I think if we switch to SCCM that would be a more complicated and costly soluti...
Read More »
Kumar MahadevanSCCM is very robust but you need more time and people to manage it.  For a… more »
Kirk StephenWe have 1500 users and even with a reasonable sized support team we find SCCM… more »
Muhammad WaseemHi Ihsan,  Hope you are doing well, As per my experience to deploy SCCM for… more »
5 Answers
Rony_Sklar
PeerSpot (formerly IT Central Station)
There are many cybersecurity tools available, but some aren't doing the job that they should be doing.  What are some of the threats that may be associated with using 'fake' cybersecurity tools? What can people do to ensure that they're using a tool that actually does what it says it does?
Read More »
SimonClark Dan Doggendorf gave sound advice. Whilst some of the free or cheap… more »
Dan DoggendorfThe biggest threat is risks you think you have managed are not managed at all so… more »
Javier MedinaYou should build a lab, try the tools and analyze the traffic and behavior with… more »
12 Answers
Rony_Sklar
PeerSpot (formerly IT Central Station)
Dec 07 2021

Hi peers,

What is the difference between a compromise assessment and threat hunting? 

How do each contribute to Endpoint Protection?

Geoffrey PoerA Compromise Assessment (CA) is an active and generally scheduled engagement… more »
Nikki WebbThreat hunting typically comes before a compromise assessment. Threat Hunting… more »
5 Answers
Nurit Sherman
Content Specialist
PeerSpot (formerly IT Central Station)
Aug 25 2021
Hi community,  We all know that it's important to conduct a trial and/or proof-of-concept as part of the buying process.  Do you have any advice for your peers about the best way to conduct a trial/POC?  How do you conduct a trial effectively? Are there any mistakes to avoid?
Read More »
James KielyEnsure you have a defined set of outcomes. Communicate these expectations to the… more »
Jairo Willian PereiraMistakes: 1. Choosing only using a Gartner magic quadrant. 2. Don't consider… more »
ITSecuri7cfdOnce you have narrowed down the top 5 picks for a capability/solution, we… more »
18 Answers
Mostafa
System Administrator at Suez Canal Insurance
Aug 30 2021

What is the best for ransomware infection? 

Alex VakulovInstall all security updates, create an incident response plan, use whitelisting… more »
Siddharth NarayananIPS & Blocking unwanted extensions at gateway level.
Nadeem Syedthere are different solutions for ransomware these days. Best i have found is… more »
7 Answers
Ariel Lindenfeld
Sr. Director of Community
PeerSpot (formerly IT Central Station)
Nov 18 2021

Let the community know what you think. Share your opinions now!

it_user400131evaluation of endpoint protection should look at what the product offers for… more »
it_user762459Key points for me are speed, scale & reporting, and I generally classify my… more »
J RiceBeing more advanced than a signature-based system. Its ability to detect lateral… more »
15 Answers