We performed a comparison between CrowdStrike Falcon and Webroot Business Endpoint Protection based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Protection Platform (EPP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The console is easy to read. I also like the scanning part and the ability to move assets from one to the other."
"Impressive detection capabilities"
"The most valuable feature is the analysis, because of the beta structure."
"This is stable and scalable."
"Forensics is a valuable feature of Fortinet FortiEDR."
"The price is low and quite competitive with others."
"Fortinet is very user-friendly for customers."
"he solution is an anti-malware product that integrates well with other vendor products such as firewalls, SIEM, etc. It captures threat intelligence and gives you better visibility. The product also has sandboxing features."
"The detection is very reliable. Also, OverWatch is a great feature."
"We haven't had any infections or down time."
"As an EDR tool, we can integrate log management and event management. The solution deals with threats automatically, that's the advantage."
"The initial setup is a very fast process."
"CrowdStrike Falcon's most valuable features are the lightweight agent which has absolutely zero performance issues. There is no performance deterioration on the laptop on the network. It is a signature-less antivirus and anti-malware solution, it doesn't depend on signatures which better protects the systems."
"The solution is silent and sits on your system as one single agent."
"Its integration capability is valuable. It integrates easily with any OS."
"Falcon's best feature is its detection and blocking of threats."
"It is very lightweight on the workstations, not slowing them down while still doing its job very well."
"The ease of use of the centralized admin console is its best asset."
"They have a lot of features integrated from way back, which shows that the product developers know exactly what they're doing."
"Low performance requirements."
"The initial setup is not complex at all. It's very straightforward."
"Auto-Remediation"
"The solution is very simple and straightforward to use."
"I haven't observed any of the instabilities in the solution. It is a stable solution."
"The support needs improvement."
"The dashboard isn't easy to access and manage."
"There's room for improvement in the quick response time and technical support for integration issues, especially when dealing with multiple vendors."
"ZTNA can improve latency."
"Everything with Fortinet having to do with their cloud services. They need to invest more in their internal infrastructure that they are running in the cloud. One of the things I find with their cloud environment compared to others' is that they go cheap on the equipment. So it causes some performance degradation."
"The solution is not stable."
"The SIEM could be improved."
"The only minor concern is occasional interference with desired programs."
"CrowdStrike Falcon could improve the logs by making them free to the API."
"If we have a dashboard capability to uninstall agents, I think that would be great."
"We can't do scanning audits or device blocking or application control."
"The pricing structure should allow for some flexibility."
"The GUI can use improvement, it's cloud-based so sometimes the interface can be a bit slow. The interface could use a little bit more speed."
"I would like to see a more accurate integration and an option to check the local machine."
"I would like to see a little bit more in the offline scanning ability. This just comes from my background in what I have done in other positions. They only scan on demand, so I always have this fear that we sometimes maybe email out a dormant virus and can be held liable for that. That is something where I would like to see a little bit more robustness to the tool."
"We can do a threat analysis of any machine at any time, but that threat analysis is very limited."
"Since they're dealing with multi-core environments now, the best option would be for them to enhance the product so that the product can automatically do an assessment on the machine."
"It would be nice if it had a feature for automatically generating reports on the client end for device status, security status and backup information."
"It would be great if there was a feature which would allow you to scan an individual file on an endpoint user's computer."
"The reporting is the weakest part of the Webroot console. Frequently, I export to Excel to massage something into it to pass on to others."
"Webroot is very reactionary. It waits until the threat is active within memory to try and detect it. They need better pre-execution detection and prevention."
"I did notice that my OS slowed down, but I don't know if that's due to Webroot."
"It doesn't do anything proactive. The virus has to hit the machine before it detects it."
"We need to have a stronger defense against CryptoLock and other attackers."
More Webroot Business Endpoint Protection Pricing and Cost Advice →
CrowdStrike Falcon is ranked 3rd in Endpoint Protection Platform (EPP) with 107 reviews while Webroot Business Endpoint Protection is ranked 35th in Endpoint Protection Platform (EPP) with 30 reviews. CrowdStrike Falcon is rated 8.8, while Webroot Business Endpoint Protection is rated 8.2. The top reviewer of CrowdStrike Falcon writes "Easy to set up with good behavior-based analysis but needs a single-click recovery option". On the other hand, the top reviewer of Webroot Business Endpoint Protection writes "Lightweight and not hard to set up however, does not offer good reporting". CrowdStrike Falcon is most compared with Microsoft Defender XDR, Darktrace, Microsoft Defender for Endpoint, Trend Micro Deep Security and VMware Carbon Black Endpoint, whereas Webroot Business Endpoint Protection is most compared with Microsoft Defender for Endpoint, Huntress, HP Wolf Security, Intercept X Endpoint and Panda Adaptive Defense 360. See our CrowdStrike Falcon vs. Webroot Business Endpoint Protection report.
See our list of best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.