We performed a comparison between CrowdStrike Falcon and Uptycs based on real PeerSpot user reviews.
Find out what your peers are saying about CrowdStrike, SentinelOne, Wazuh and others in Extended Detection and Response (XDR)."Another noteworthy feature that I find appealing in Microsoft Defender is the credit-backed simulation. This feature enables organizations to train their users on effectively responding to phishing emails through a simulated training environment."
"The most valuable features are spam filtering, attachment filtering, and antivirus protection."
"The most valuable features of Microsoft 365 Defender are the combination of all the capabilities and centralized management."
"All of the security components are valuable including, antiphishing, antispam, and stage three antivirus."
"We can automate routine tasks and write scripts to carry out difficult tasks, which makes things easier for us."
"Defender XDR has a feature called the timeline that lets you track all activities. It helps a lot with investigations."
"We are connected to Microsoft and have every laptop enrolled. This acts as an endpoint. The tool helps me check security and compliance. I can also check what a device is doing."
"Microsoft Defender XDR is scalable."
"Its integration capability is valuable. It integrates easily with any OS."
"The detection and response console is the most valuable feature."
"We like Falcon's network visibility. We can see how threats are evolving on PCS or in the company network. The solution's real-time incident response is very fast."
"It is an easy product to deploy."
"The UI is simple and self-explanatory. Everything is easy to understand."
"CrowdStrike Falcon's most valuable features are the lightweight agent which has absolutely zero performance issues. There is no performance deterioration on the laptop on the network. It is a signature-less antivirus and anti-malware solution, it doesn't depend on signatures which better protects the systems."
"The most valuable features of CrowdStrike Falcon are the AI in detecting and real-time detections."
"The detection is very effective."
"They have multiple great features."
"There are other SIEM solutions that are easier to use, mainly based on the creation of rules, use cases, and groups."
"The user interface of Microsoft 365 Defender could improve. They could make it simpler."
"The documentation on their website is somewhat outdated and doesn't show properly. I wanted to try a query in Microsoft Defender 365. When I opened the related documentation from the security blog on the Microsoft website, the figures were not showing. It was difficult to understand the article without having the figures. The figures were there in the article, but they were not getting loaded, which made the article obsolete."
"I personally have not seen much evidence of how Defender can enhance the story of zero trust for enterprises."
"The dashboard should be easier to use. There is also improvement needed in the reporting when it comes to exporting or scheduling reports."
"There are a few technical issues with Defender XDR that can be improved. Sometimes, the endpoint devices are not reporting properly to the Defender 365 portal. When you're getting all the information from the Microsoft portal, the devices are sometimes not in sync. We have hundreds of endpoint devices, some needing to be onboarded again."
"The management features could be improved, particularly in terms of better integration with Intune, Microsoft's cloud-based management solution."
"365 Defender has multiple subsets, including Defender for Cloud Apps. When integrating Defender for Cloud Apps with apps on third-party cloud platforms like AWS or GCP, there are limitations on our ability to control user activities. If Microsoft added more control over third-party products, that would be a game-changer and help us quite a lot."
"We would like to be able to perform on-demand scanning, rather than relying on the scheduler."
"I would like them to improve the correlation of data in the search algorithms. When we run an investigation, malware, phishing, etc., I want to look at multiple endpoints at once to correlate that data to see the likenesses, e.g., how are they not alike or what systems and processes are running across those systems? I don't want to have to run the same search in their Spotlight module five, 10, 15, or 100 times to get 100 different results, copy that data out, and then correlate it on my own. In a very simple way, I want to be able to load up a comma-delimited list giving me the spotlight data on these X amount of hosts, letting me search for it quickly. We have had to go back to CrowdStrike, and say, "Our search are taking far too long for even one host." They did bump up the cores and that did improve performance, but it is still kind of slow to get that Spotlight data. That is probably our biggest pain point. I think that needs some help. I understand this kind of information access is probably not the easiest thing to do. It is probably a big ask depending on how their back-end is setup."
"I have worked with their technical support on several problems that were never fully resolved."
"They respond quickly on the weekdays, but the weekend response times are slower."
"It is cloud-based, and this does make some weary of the data being held on the cloud. Privacy requirements must be taken into account."
"We sometimes get false positives."
"A year and a half ago or more, if you put in a support request by email, then it wasn't timely addressed. It could be a day to three days before you received a response, which was a bit frustrating. There was a lot of customer feedback around this issue, which has been greatly refined."
"I have experience with a product called SentinelOne, which has a feature that allows for the customization of query languages. I would like to see such a feature for CloudStrike."
"We end up facing a lot of issues after upgrades."
CrowdStrike Falcon is ranked 1st in Extended Detection and Response (XDR) with 105 reviews while Uptycs is ranked 24th in Extended Detection and Response (XDR) with 1 review. CrowdStrike Falcon is rated 8.8, while Uptycs is rated 8.0. The top reviewer of CrowdStrike Falcon writes "Easy to set up with good behavior-based analysis but needs a single-click recovery option". On the other hand, the top reviewer of Uptycs writes "Great features, good support, and lots of functionality". CrowdStrike Falcon is most compared with Darktrace, Microsoft Defender for Endpoint, Trend Micro Deep Security, Trend Vision One and SentinelOne Singularity Complete, whereas Uptycs is most compared with Aqua Cloud Security Platform, Wiz, Orca Security and Lacework.
See our list of best Extended Detection and Response (XDR) vendors, best Endpoint Protection Platform (EPP) vendors, and best Endpoint Detection and Response (EDR) vendors.
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.