We performed a comparison between AgileBlue and CrowdStrike Falcon based on real PeerSpot user reviews.
Find out what your peers are saying about CrowdStrike, SentinelOne, Wazuh and others in Extended Detection and Response (XDR)."The comprehensiveness of Microsoft's threat detection is good."
"The 'Incidents and Alerts' tab is a valuable feature where we can find triggered alerts."
"It has been great for us. Previously, we didn't have a solution to protect us, especially from malware, whereas now, we are getting protection up front, especially from the malware attacks coming through emails or endpoints."
"It has great stability."
"Defender is easy to use. It has a nice console, and everything is all in one place."
"Having a single pane of glass for all Microsoft security services makes everything much easier. A security analyst can go to a single portal and see everything in one view. The integration of everything into one portal is a huge benefit."
"I like Defender XDR's automation capabilities. XDR isn't automated by default, but you can automate it to respond. If an attack is performed anywhere within the organization, you can isolate that instance from the network. This is what I can figure out for it. When integrated with Sentinel, you can set up playbooks to automate all the alerts gathered on Sentinel from different Microsoft solutions. Sentinel has a wider range of capabilities than XDR."
"Microsoft Defender's most critical component is its CASB solution. It has many built-in policies that can improve your organization's cloud security posture. It's effective regardless of where your users are, which is critical because most users are working from home. It's cloud-based, so nothing is on-premise."
"In addition to managing the SOC, they offer Endpoint Detection and Response (EDR) capabilities for servers and systems. What stood out for us is the product's lightweight nature, unlike other EDRs we evaluated that tend to be system-intensive. This lightweight feature significantly piqued our interest and influenced our decision to use the solution. The solution is stable. I rate it a seven out of ten. The solution is scalable. I rate it an eight out of ten. The support team is remarkably prompt. They quickly resolve any issues we encounter. The initial setup was straightforward. With strong timings and BSLAs, AgileBlie stands out when compared to competitors."
"I like the overall reports of this solution. They are crisp, and to the point."
"Its integration capability is valuable. It integrates easily with any OS."
"CrowdStrike Falcon's most valuable features are the lightweight agent which has absolutely zero performance issues. There is no performance deterioration on the laptop on the network. It is a signature-less antivirus and anti-malware solution, it doesn't depend on signatures which better protects the systems."
"The feature that I find to be the most valuable, is being able to look at the system analysis and being able to baseline what is installed on the system."
"The feature I like the most is the solution's detection."
"The most valuable feature of CrowdStrike Falcon is its accuracy. That's very important for me. False-positive are very bad for everyone. As we are a financial institution, it's even worse. I like Falcon because it's very accurate."
"The most valuable feature is the machine learning that they use to check certain patterns in the endpoint devices. It checks the whole ecosystem or entire environment."
"The solution is silent and sits on your system as one single agent."
"From an integration standpoint, it is always improving overall. With Security Copilot coming out, as partners, we are waiting for the GDAP support so that we can actually see Security Copilot on behalf of customers if they subscribe to it."
"The price could be better. It'll also help if they can continuously update and upgrade the solution. Every day there's a new virus uploaded into the network, and we have to keep updating it to identify all these things."
"In the future, it would be beneficial for Microsoft to consider making the product more user-friendly or simplified for those who are interested in using it. Currently, it requires a high level of technical expertise, making it challenging for beginners or less experienced individuals."
"Advanced attacks could use an improvement."
"The patching capability should be there. Patching is something that you cannot do even though you see the vulnerabilities present in your environment. For patching, you have to depend on another solution."
"365 Defender has multiple subsets, including Defender for Cloud Apps. When integrating Defender for Cloud Apps with apps on third-party cloud platforms like AWS or GCP, there are limitations on our ability to control user activities. If Microsoft added more control over third-party products, that would be a game-changer and help us quite a lot."
"Microsoft Defender XDR is not a full-fledged EDR or XDR."
"There could be a way to proactively monitor unusual activity ."
"There is always room for improvement. There's potential for further enhancement in the capabilities of the EDR. However, there are positive changes we are satisfied with. They revamped the dashboard, addressing a previous issue."
"There is room for improvement in managing multiple customer IDs."
"It would be nice if they did have some sort of Active Directory tie-in, whether that be Azure or on-prem. Sometimes, it is difficult for us to determine if we are missing any endpoints or servers in CrowdStrike. We honestly don't have a great inventory, but it would be nice if CrowdStrike had a way to say this is everything in your environment, Active Directory-wise, and this is what doesn't have sensors. They try to do that now with a function that they have built-in, but I have been unsuccessful in having it help us identify what needs a sensor. So, better visibility of what doesn't have a sensor in our environment would be helpful."
"In terms of features, I would like them to add detailed logging functionality in CrowdStrike. Currently, CrowdStrike detects the threats immediately based on the IOCs and the signature-based policies or many threat behaviors, but in terms of logging those threats, it is not very good. The information that they provide in the logs is very little. They can build more analytics into it."
"I have experience with a product called SentinelOne, which has a feature that allows for the customization of query languages. I would like to see such a feature for CloudStrike."
"It does take more time to scan than other solutions."
"The console is a little cluttered and at times, finding what you're looking for is not intuitive."
"Falcon could include more integrative features."
"On the firewall management side, there should be more granularity. There should also be more granularity for device control. Everything else is brilliant."
AgileBlue is ranked 25th in Extended Detection and Response (XDR) with 1 review while CrowdStrike Falcon is ranked 1st in Extended Detection and Response (XDR) with 107 reviews. AgileBlue is rated 8.0, while CrowdStrike Falcon is rated 8.8. The top reviewer of AgileBlue writes "A Lightweight Solution Offering a Seamless Experience". On the other hand, the top reviewer of CrowdStrike Falcon writes "Easy to set up with good behavior-based analysis but needs a single-click recovery option". AgileBlue is most compared with SentinelOne Singularity Complete, whereas CrowdStrike Falcon is most compared with Darktrace, Microsoft Defender for Endpoint, Trend Micro Deep Security, Trend Vision One and SentinelOne Singularity Complete.
See our list of best Extended Detection and Response (XDR) vendors.
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.