We performed a comparison between CrowdStrike Falcon Complete and Field Effect Covalence based on real PeerSpot user reviews.
Find out in this report how the two Managed Detection and Response (MDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The best part about Binary Defense MDR is that it runs on everything, and they keep an eye on things 24/7."
"The biggest aspect for us is that they are able to conform to our environment and utilize our tools. That way, we still maintain ownership of all the data and access to the applications, and we never lose control of the ability to run the solution ourselves if we need to."
"With Binary Defense, we don't just get an alert, but also a detailed rundown of why they're alerting us on it. They tell us what was executed, or the username, script, or IP. That way, we're not wasting time investigating."
"The most valuable features are the SIEM and the ticketing function; the latter is very smooth and easy to read and understand. We don't have any issues looking at the ticketing information when we're trying to identify what's going on."
"The speed at which their services are reactive is valuable. Nowadays, when a threat hits an endpoint, you've got minutes, not hours or days. Their average response time is about four minutes on an alert. For anything that needs to be sent to us, it's about fourteen minutes, which is pretty good. They're the third SOC that I've used in fifteen years. By far, they are the quickest ones to act. When you're looking at prevention, that's a key factor."
"The case interface is Binary Defense MDR's most valuable feature."
"The most valuable part of Binary Defense is its team of cybersecurity analysts. Their analysts filter out the noise and only forward the critical threats that require a response instead of false positives."
"Binary Defense's most valuable feature is the 24/7 monitoring and threat hunting. Their team checks the latest breaches and how they're done."
"The most valuable feature is that it has a zero-day approach. It does not work with the signature itself. It looks into what is happening on an endpoint and protects you better against threats that are not yet known but are captured in a signature. It provides far better detection than when it is only signature-based. You get much quicker protection against any new threat. This is the most important feature of the CrowdStrike solution."
"The threat intelligence of CrowdStrike Falcon is the most valuable feature."
"It has good visibility, works well, and it is fast."
"The most valuable feature of CrowdStrike Falcon Complete is the overall endpoint protection."
"The most valuable feature of CrowdStrike Falcon Complete is endpoint detection and response."
"CrowdStrike side, Falcon is the Endpoint Detection, Overwatch is the service that sits behind it. From a human point of view looks at the anomalies that normal AI and machine learning couldn't catch. So it is the combination of the two that really works well."
"Falcon Complete's best features are its detailed reporting and user-friendliness."
"Overwatch is the most valuable feature of CrowdStrike Falcon Complete."
"The most valuable features are Action Recommendations of Observations, which keep us informed about existing vulnerabilities so we can proactively update our endpoints and those of our customers against potential threats."
"I get alerts if there's malicious activity or restrictions, should they any suspicious activity emerge."
"It is very user-friendly. We have regular reports to see what is going on."
"I appreciate the "set it and forget it" nature of Field Effect Covalence."
"The most valuable aspect of Field Effect Covalence is its ability to continuously monitor for and identify potential threats."
"The AROs have been incredibly helpful."
"The solution's advanced detection behaviors, automated notifications and responses, and automated remediation behaviors are valuable features."
"It is easy to manage surveillance."
"It's sometimes difficult to know when to engage Binary Defense or TrustedSec, their sister company. TrustedSec is more focused on offensive security, as opposed to the defensive security that the MDR solution provides. It would be awesome if there were a better bridge between that relationship for when we need to get more proactive services or when we need to do a penetration test."
"We found a couple of bugs in the user interface."
"I don't find any downside to them, but if I have to put one, it would be consistent manpower or staffing. The only area where the solution can be improved is going to be with people. As they grow, they are struggling with the same thing that every other company is, which is getting talent and getting that talent to stay, but they've just revised their tiering system to go from a flat analyst and manager to a three-tier solution where it goes through two or three before it gets elevated. That seems to have worked out well, so if one level misses it, the next one picks it up, and it works out fine."
"Binary Defense MDR could be even better with additional features, like automatic scans and file quarantine."
"We found that an earlier version of the agent had high memory usage and that was a bit concerning, but we raised the concern with their support team and they immediately replied that they had noticed the same thing and had a candidate fix already available... it totally fixed the issue."
"If I were shopping for an MDR solution today, I would not only look for a company that has the ability to alert, detect, and remediate, but also the ability to integrate vulnerability management. That's a big thing that they're lacking today."
"We should be able to isolate devices faster. They should shorten the time between clicking on a device to contain it and carrying out the action. That would be a welcome improvement."
"I would like to see more frequent check-ins with our security status."
"In a future release, it would be ideal if they could add reporting and action histories to their suite of features."
"We have also been using Cisco AMP for Endpoints for three years. We have received multiple detections in Cisco AMP for Endpoints, and we had to take some actions, whereas CrowdStrike has not detected anything critical since it has been implemented. Most of the incidents that it has detected are false positives. They should work on the false-positive issue. When it is implemented throughout the organization, it gets very difficult to check each false positive and investigate what is correct and what is not correct. It requires technical and manual intervention."
"I prefer to put a pound into the prevention and an ounce into the cure, but CrowdStrike put more focus into the EDR. This works as a business model for them, as they get a lot of customers purchasing their MDR services, usually SMBs lacking the staff to leverage the EDR tool themselves adequately. We have many such customers. I would much rather see more refinement and investment into the prevention side of the equation, though CrowdStrike has a good engine. The solution is as effective as SentinelOne and Windows Defender for Endpoint; it's an excellent endpoint protection solution."
"What could be improved in CrowdStrike Falcon Complete is the threat hunting feature and the insights it provides, in particular, the variable analysis feature. Protection against zero-day threats and sandboxing could also be improved in CrowdStrike Falcon Complete. If you compare it with other solutions, it can go head-to-head, but the features I mentioned still need improvement."
"CrowdStrike Falcon Complete could improve the threat visibility and have remediated vulnerabilities that they find."
"The documentation that they had for the use of their API's was not very helpful."
"I would love for the threat intelligence part to be more globalized to provide a tailored response to types of malware and ransomware that are trending in other regions. For example, they can add a feature to tell us that there are separate attacks in South Asia or East Asia occurring at these times, so we can supply those things to our environment and protect ourselves."
"The analysis of the investigation of the incident could be easier."
"In the "Arrows" tab, if we encounter multiple duplicate recommendations, it would be helpful to be able to select and resolve or dismiss them all at once."
"It would be more effective if it could surgically isolate the specific malicious process instead of deleting the entire machine."
"They could use more third-party integrations with other MSP tools."
"Field Effect Covalence could benefit from enhancing its packing slip process."
"The cost of the solution has room for improvement."
"I have had a couple of challenges around updates to the agents where it seems it doesn't automatically replace older versions."
"I would like Covalence to include patching."
"The area where they can make it better is by giving responses to the end-user. For example, when there is an alert to the administrator, I get it. I have to copy and paste everything to everyone... And then I have to follow up with them, and it's a real pain."
CrowdStrike Falcon Complete is ranked 1st in Managed Detection and Response (MDR) with 75 reviews while Field Effect Covalence is ranked 6th in Managed Detection and Response (MDR) with 21 reviews. CrowdStrike Falcon Complete is rated 8.6, while Field Effect Covalence is rated 9.2. The top reviewer of CrowdStrike Falcon Complete writes "Great next-generation antivirus with breach warranty and good intrusion protection". On the other hand, the top reviewer of Field Effect Covalence writes "Helps to manage cybersecurity vulnerabilities, and improve our security team's efficiency and security posture ". CrowdStrike Falcon Complete is most compared with Arctic Wolf Managed Detection and Response, Blackpoint Cyber MDR, Secureworks Taegis ManagedXDR, Sophos MDR and Rapid7 MDR, whereas Field Effect Covalence is most compared with SentinelOne Vigilance, Huntress, Arctic Wolf Managed Detection and Response, Microsoft Defender Experts for Hunting and Blackpoint Cyber MDR. See our CrowdStrike Falcon Complete vs. Field Effect Covalence report.
See our list of best Managed Detection and Response (MDR) vendors.
We monitor all Managed Detection and Response (MDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.