Barkly vs. CrowdStrike

As of March 2019, Barkly is ranked 38th in Endpoint Protection vs CrowdStrike which is ranked 8th in Endpoint Protection with 8 reviews. The top reviewer of CrowdStrike writes "I like the overall reports of this solution. They are crisp, and to the point". Barkly is most compared with Symantec Endpoint Protection, Cylance and CrowdStrike. CrowdStrike is most compared with Cylance, Microsoft Windows Defender and Carbon Black Cb Defense.
Cancel
You must select at least 2 products to compare!
Barkly Logo
1,664 views|1,189 comparisons
CrowdStrike Logo
22,511 views|13,404 comparisons
Most Helpful Review
Find out what your peers are saying about Symantec, IBM, McAfee and others in Endpoint Protection. Updated: March 2019.
325,085 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
Information Not Available
The other administrator and I can log in to check the exact details of what happened, what was running, and what caused the detection. We know exactly what was happening on the end users PC and we can tell if it's something that we actually need or something that's malicious.I do not have experience with the cost or licensing of the product.I would like them to further reduce the price, because it is quite pricey at the moment.Purchasing the product through the AWS Marketplace is just a click away. Since we were using the on-premise version of the product, we continued on the cloud by purchasing it through the AWS Marketplace.The pricing will depend upon your volume of usage.

Read more »

report
Use our free recommendation engine to learn which Endpoint Protection solutions are best for your needs.
325,085 professionals have used our research since 2012.
Ranking
38th
out of 55 in Endpoint Protection
Views
1,664
Comparisons
1,189
Reviews
0
Followers
45
Avg. Rating
N/A
8th
out of 55 in Endpoint Protection
Views
22,511
Comparisons
13,404
Reviews
7
Followers
615
Avg. Rating
8.1
Top Comparisons
Compared 19% of the time.
Compared 11% of the time.
Compared 20% of the time.
Learn
Barkly
CrowdStrike
Overview

Hackers engineer attacks to get past your existing protection. A new file signature may be enough to get past antivirus, and new techniques like fileless delivery and built-in dwell time enable hackers to evade more sophisticated forms of protection.

At Barkly, we recognize that even the most cleverly disguised malware must reveal its malicious nature eventually. Files signatures and attributes change, but the underlying techniques used by malware to gain access and infect your system remain the same. By recognizing these behaviors as they happen, Barkly even blocks never-before-seen attacks.

Instead of looking at files, Barkly analyzes activity locally across multiple levels of the system. We recognize malware based on patterns of behavior, and automatically block its execution before any harm is done.

Falcon sensor (small and light) and cloud (big and powerful) work seamlessly to deliver real-time protection and visibility -- yes, even when the sensor is not connected to the internet. The simplicity of CrowdStrike’s architecture finally gives you the freedom to replace and retire the complicated, performance-robbing security layers that clutter your environment.

This architecture lies at the heart of Falcon, CrowdStrike’s pioneering cloud-delivered endpoint protection platform. It both delivers and unifies next-generation antivirus, endpoint detection and response (EDR), managed threat hunting, security hygiene and threat intelligence. Using its purpose-built cloud native architecture, the Falcon Platform collects and analyzes more than 30 billion endpoint events per day from millions of sensors deployed across 176 countries.

Offer
Learn more about Barkly
Learn more about CrowdStrike
Sample Customers
TalkTalk, Monadnock Regional School District Rackspace Inc.
Find out what your peers are saying about Symantec, IBM, McAfee and others in Endpoint Protection. Updated: March 2019.
325,085 professionals have used our research since 2012.
We monitor all Endpoint Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email