We performed a comparison between CrowdStrike Falcon and Cynet based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: CrowdStrike Falcon stands out for its minimal impact on system performance, optimal resource utilization, and precise detection of threats. Cynet offers strong ransomware protection and an intuitive interface. CrowdStrike Falcon could benefit from adding a sandbox feature and more detailed firewall management options. Cynet needs to expand device support and add customization options. Users suggest improving network monitoring and strengthening integration with other tools.
Service and Support: CrowdStrike Falcon's customer service has been commended for its promptness and assistance. Cynet's customer service is consistently lauded for its excellence. They have a dedicated support team that is available round the clock, and they also have a contingency plan for urgent incidents.
Ease of Deployment: CrowdStrike Falcon's setup is considered to be simple and efficient, with varying deployment times ranging from a few days to a month. While there may be some challenges during installation, they are generally manageable. Cynet’s setup is highly efficient, with the ability to configure thousands of devices quickly.
Pricing: Some users find CrowdStrike Falcon costly and think the price should be lowered to make it more competitive. Customers generally view Cynet's pricing and licensing experience as affordable and a good value for its features.
ROI: CrowdStrike Falcon offers cost savings by decreasing the required number of engineers and eliminating the necessity for onsite servers. Cynet yields an excellent ROI by preventing cyberattacks and safeguarding sensitive data.
Comparison Results: Our users prefer CrowdStrike Falcon because it efficiently uses system resources and offers a comprehensive analysis of endpoint devices. Users appreciate its accuracy, behavior analysis, and detection capabilities. CrowdStrike Falcon offers more features such as ransomware protection and added antivirus defense.
"Microsoft 365 Defender is a stable solution."
"Microsoft Defender's most critical component is its CASB solution. It has many built-in policies that can improve your organization's cloud security posture. It's effective regardless of where your users are, which is critical because most users are working from home. It's cloud-based, so nothing is on-premise."
"The unified view of the threat landscape on a central dashboard is the most valuable feature."
"The integration with other Microsoft solutions is the most valuable feature."
"The most valuable aspect is undoubtedly the exploration capability"
"Microsoft XDR's system of analysis and investigation is super convenient for our customers. It integrates with other Microsoft solutions like Defender for 365 to protect email traffic from malicious external web links and phishing."
"The solution is well integrated with applications. It is easy to maintain and administer."
"We are connected to Microsoft and have every laptop enrolled. This acts as an endpoint. The tool helps me check security and compliance. I can also check what a device is doing."
"The most useful feature is that we do not need to install or keep signature files. Regular scanning that consumes a lot of computer resources is not needed."
"The UI is simple and self-explanatory. Everything is easy to understand."
"Scalability hasn't been an issue for us."
"The most valuable feature is that we don't need to re-image machines as much as we had to."
"The most valuable feature of CrowdStrike Falcon for me is its unified sensor, applicable across all models."
"I like the Overwatch feature the most."
"Falcon's best feature is its detection and blocking of threats."
"We are happy with CloudStrike's ease of use and touch notification."
"The product is very easy to use. Customers really appreciate that."
"The product has valuable front-end features."
"A good feature is how the solution packages varied information into a single dashboard that's readable and meets our needs."
"The visibility it gives is excellent."
"Cynet's most valuable features are laptop and server performance, internal network monitoring, and external firewall lock management."
"We are protecting all our workstations."
"Its ability to revert back from a previous state is quite notable. This feature is particularly valuable because, for maintaining integrity, it can inspect the socket for any firewall modifications. In practice, it allows us to return to a previous configuration when everything was functioning correctly."
"Advanced detection and protection against ransomware paired with SOC monitoring are the most valuable features. They have 24/7 SOC monitoring and file activity. It is a very robust tool."
"Support is hit or miss. Microsoft wants you to buy premium support contracts. Though they call themselves professional support, it's almost like throwing questions into a black hole. You get an answer, but it's never helpful."
"My client would like the solution to be more customizable without using code. You can only build on the default console, but we're not allowed to change it."
"The onboarding and offboarding need improvement. I work with other vendors as well, and they have an option to add a device or remove a device from the portal, whereas with Microsoft 365 Defender, we need to do that manually. However, once you do that, everything can be controlled through the portal, but getting the device onboarded and offboarded is currently manual. If we have an option to simply remove a device from the portal or get a device added from the portal, it would be more convenient. The rest of the features are similar. This is the only area where I found it different from others. I would also like to be able to simply filter with a few of the queries that are already there."
"The support from Microsoft could improve. There are times I have to wait for a response from a qualified specialist."
"There is no common area where we can manage all the policies for the EDR, third-party solutions, devices, servers, Windows, Mac, etc., but it's on the road map, and we ware waiting for that feature."
"Microsoft frequently changes the names of its products, sometimes even renaming entire portals or features."
"It would be highly beneficial if CoPilot could identify anomalies within the network and notify the IT team."
"The user interface of Microsoft 365 Defender could improve. They could make it simpler."
"The console is a little cluttered and at times, finding what you're looking for is not intuitive."
"They don't really have anything when it comes to scanning attachments."
"I would love to see more investment in Insight because CrowdStrike have an opportunity to potentially displace some of the vulnerability management vendors with the visibility they can see over time. I want to see them continue to evolve, e.g., what other things can they disrupt which are operational things we have to continue to do as an organization."
"CrowdStrike Falcon could improve if it became an XDR. When we look only to an end-point, we lost the context of the environment. I know it's another line of design of the product. However, if CrowdStrike becomes an XDR, it could be very good."
"The management of the solution could improve."
"On the firewall management side, there should be more granularity. There should also be more granularity for device control. Everything else is brilliant."
"Tighter integration around XDR could be included."
"CrowdStrike Suites and the way that it bundles things can be a bit challenging. It should be easier to integrate with the other stuff that they sell or be included with what they sell. We have one piece, then they are talking about another piece on vulnerability management all of the sudden, and we don't own that piece. We can see it in the console, but nothing shows up. It simply appears within the tool as an option, but we can't use it without purchasing it."
"The inability to add contact information inside the Cynet is also an issue because it makes things more complicated. I would like to have a simple feature to enter a contact name and number for the person taking care of that unit or that server."
"Linux servers are not supported."
"I'd like to see more data loss prevention within the product."
"Increased application for SOAR abilities across interconnected devices would be a welcome improvement."
"I would like to see support for mobile protection and some additional reports included."
"A support center in Asia is needed."
"We'd like something that makes it easier to manage specific points."
"Cynet could improve when a reverse proxy is being used to connect to the servers. There could be an easier configuration because it is not plug-and-play."
CrowdStrike Falcon is ranked 3rd in Endpoint Protection Platform (EPP) with 105 reviews while Cynet is ranked 17th in Endpoint Protection Platform (EPP) with 35 reviews. CrowdStrike Falcon is rated 8.8, while Cynet is rated 8.8. The top reviewer of CrowdStrike Falcon writes "Easy to set up with good behavior-based analysis but needs a single-click recovery option". On the other hand, the top reviewer of Cynet writes "Provides memory protection, device control, and vulnerability management". CrowdStrike Falcon is most compared with Darktrace, Microsoft Defender for Endpoint, Trend Micro Deep Security, Trend Vision One and SentinelOne Singularity Complete, whereas Cynet is most compared with SentinelOne Singularity Complete, ESET Endpoint Protection Platform, Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks and Stellar Cyber Open XDR. See our CrowdStrike Falcon vs. Cynet report.
See our list of best Endpoint Protection Platform (EPP) vendors, best Endpoint Detection and Response (EDR) vendors, and best Ransomware Protection vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.