We performed a comparison between CrowdStrike Falcon Complete and eSentire based on real PeerSpot user reviews.
Find out what your peers are saying about CrowdStrike, Arctic Wolf Networks, Huntress and others in Managed Detection and Response (MDR)."The best part about Binary Defense MDR is that it runs on everything, and they keep an eye on things 24/7."
"Binary Defense's most valuable feature is the 24/7 monitoring and threat hunting. Their team checks the latest breaches and how they're done."
"The most valuable part of Binary Defense is its team of cybersecurity analysts. Their analysts filter out the noise and only forward the critical threats that require a response instead of false positives."
"With Binary Defense, we don't just get an alert, but also a detailed rundown of why they're alerting us on it. They tell us what was executed, or the username, script, or IP. That way, we're not wasting time investigating."
"The most valuable features are the SIEM and the ticketing function; the latter is very smooth and easy to read and understand. We don't have any issues looking at the ticketing information when we're trying to identify what's going on."
"One of the main benefits of Binary Defense MDR is the ability to easily meet with their support team to discuss any issues we encounter."
"The speed at which their services are reactive is valuable. Nowadays, when a threat hits an endpoint, you've got minutes, not hours or days. Their average response time is about four minutes on an alert. For anything that needs to be sent to us, it's about fourteen minutes, which is pretty good. They're the third SOC that I've used in fifteen years. By far, they are the quickest ones to act. When you're looking at prevention, that's a key factor."
"The customization has been the most valuable aspect and was really the reason we ended up selecting Binary Defense. They worked with us to provide exactly the level of support, features, response, and collaboration we needed."
"What I found most valuable in CrowdStrike Falcon Complete is that it has a lot of monitoring dashboards and use cases, and I saw that it's a very good product, but my company has only tested it, so it's not been used for real use cases. My company hasn't tested the complete license for CrowdStrike Falcon Complete, so the team hasn't checked the open fiber rooms for zero-day attacks, IOAs and IOCs, or any indicators of fraudulent activities. I was also amazed at the solution and its licensing. My company did a competitive analysis of many EDR solutions, but it went with CrowdStrike Falcon Complete. It's one of the top-rated solutions on CyberRatings as well."
"The stability is great for CrowdStrike Falcon Complete."
"It is an endpoint protection product. It has a very good reporting engine and dashboard. It has a good set of endpoint controls. It provides an effective set of protections. When we throw malware and stuff like that at it, it is able to stop them."
"The features I have found valuable are artificial intelligence, which protects us against malicious forces of any kind, and device control through the remote execution tool."
"Their intelligence is really good. The security whitepapers that they write are outstanding. They handle it all for the clients. CrowdStrike Complete is managed by CrowdStrike. They only call a client if there is a problem that they can't address. They pretty much contain and eradicate. This is not something that every vendor provides."
"The initial setup was easy."
"CrowdStrike Falcon Complete provides complete details of any malicious activity, including the impact date and file source."
"The continuous improvement in detections and response times is valuable. They are more focused on threats that come from the cloud, not only that we see."
"The Managed Detection and Response (MDR) feature was really good and most valuable. We were handling very sensitive data, and we needed a quick response in real-time, which eSentire provided. It was also cost-effective, and their SOC team was very responsive."
"The managed detection response (MDR) product was the most valuable."
"I would like to see more frequent check-ins with our security status."
"We found a couple of bugs in the user interface."
"We should be able to isolate devices faster. They should shorten the time between clicking on a device to contain it and carrying out the action. That would be a welcome improvement."
"The most significant area for improvement is in support for non-English speakers; we're a global organization, so many of our users are not English speakers, which can make interacting with them a challenge. There's no Chinese language support, so we must rely on what we can do with the internet. We don't expect Binary Defense to build a language staff, but details can get lost in translation when we assume the whole world speaks English."
"The only area I see for improvement with Binary Defense is their service portal. It could benefit from some enhancements."
"If I were shopping for an MDR solution today, I would not only look for a company that has the ability to alert, detect, and remediate, but also the ability to integrate vulnerability management. That's a big thing that they're lacking today."
"Binary Defense MDR could be even better with additional features, like automatic scans and file quarantine."
"We found that an earlier version of the agent had high memory usage and that was a bit concerning, but we raised the concern with their support team and they immediately replied that they had noticed the same thing and had a candidate fix already available... it totally fixed the issue."
"The reporting could be better. It's not as good as it could be."
"The training provided could be better. There is a need to have more training to allow us to fine-tune our settings. Not that training is not comprehensive; they do provide training in hotels where we can go and see videos and other helpful information. However, they should be providing hands-on experience to the system administrators because this would be more useful. The training is normally for corporations and should be available for personal users as well."
"There have been some issues with Falcon Complete's performance."
"CrowdStrike Falcon Complete MDR offers an optional module that might not be cost-effective for all organizations."
"It has a lot of false positives, which can be an issue, but you can verify these false positives."
"Pricing is definitely a problem. It could be cheaper for licensing."
"We'd like the pricing to be a bit lower in the future."
"All of our customers complain about the reporting and say that it is very poor."
"Its GUI can be a lot better."
"From my standpoint, their MSP program, in general, needed to be worked on. It should be made much more simple. It's too convoluted in its process. I know it was in the process of being revamped, and as of the end of January, it was not finished."
CrowdStrike Falcon Complete is ranked 1st in Managed Detection and Response (MDR) with 75 reviews while eSentire is ranked 24th in Managed Detection and Response (MDR) with 2 reviews. CrowdStrike Falcon Complete is rated 8.6, while eSentire is rated 7.6. The top reviewer of CrowdStrike Falcon Complete writes "Great next-generation antivirus with breach warranty and good intrusion protection". On the other hand, the top reviewer of eSentire writes "A solid product for security, but the MSP program should be simpler". CrowdStrike Falcon Complete is most compared with Arctic Wolf Managed Detection and Response, Blackpoint Cyber MDR, Secureworks Taegis ManagedXDR, Sophos MDR and Expel, whereas eSentire is most compared with Arctic Wolf Managed Detection and Response, Sophos MDR, Red Canary, Huntress and Secureworks Taegis ManagedXDR.
See our list of best Managed Detection and Response (MDR) vendors.
We monitor all Managed Detection and Response (MDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.