Barkly vs. CrowdStrike

Barkly is ranked 37th in Endpoint Protection vs CrowdStrike which is ranked 11th in Endpoint Protection with 3 reviews. The top reviewer of CrowdStrike writes "I like the overall reports of this solution. They are crisp, and to the point". Barkly is most compared with Symantec Endpoint Protection, Cylance and Check Point Endpoint Security. CrowdStrike is most compared with Cylance, Carbon Black Cb Defense and Symantec Endpoint Protection.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Use Null Product? Share your opinion.
Find out what your peers are saying about Symantec, IBM, Carbon Black and others in Endpoint Protection.
305,918 professionals have used our research since 2012.

Quotes From Members Comparing Barkly vs. CrowdStrike

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Pricing and Cost Advice
Information Not Available
I would like them to further reduce the price, because it is quite pricey at the moment.Purchasing the product through the AWS Marketplace is just a click away. Since we were using the on-premise version of the product, we continued on the cloud by purchasing it through the AWS Marketplace.The pricing will depend upon your volume of usage.

Read more »

Information Not Available
report
Use our free recommendation engine to learn which Endpoint Protection solutions are best for your needs.
305,918 professionals have used our research since 2012.
Ranking
Views
1,560
Comparisons
1,182
Reviews
0
Followers
47
Avg. Rating
N/A
Views
19,428
Comparisons
12,233
Reviews
1
Followers
642
Avg. Rating
8.0
Unranked
In Endpoint Protection
Top Comparisons
Compared 12% of the time.
See more Barkly competitors »
Compared 26% of the time.
See more CrowdStrike competitors »
Compared 29% of the time.
Learn how it works
Barkly
CrowdStrike
Null Vendor
Video Not Available
Overview

Hackers engineer attacks to get past your existing protection. A new file signature may be enough to get past antivirus, and new techniques like fileless delivery and built-in dwell time enable hackers to evade more sophisticated forms of protection.

At Barkly, we recognize that even the most cleverly disguised malware must reveal its malicious nature eventually. Files signatures and attributes change, but the underlying techniques used by malware to gain access and infect your system remain the same. By recognizing these behaviors as they happen, Barkly even blocks never-before-seen attacks.

Instead of looking at files, Barkly analyzes activity locally across multiple levels of the system. We recognize malware based on patterns of behavior, and automatically block its execution before any harm is done.

Falcon sensor (small and light) and cloud (big and powerful) work seamlessly to deliver real-time protection and visibility -- yes, even when the sensor is not connected to the internet. The simplicity of CrowdStrike’s architecture finally gives you the freedom to replace and retire the complicated, performance-robbing security layers that clutter your environment.

This architecture lies at the heart of Falcon, CrowdStrike’s pioneering cloud-delivered endpoint protection platform. It both delivers and unifies next-generation antivirus, endpoint detection and response (EDR), managed threat hunting, security hygiene and threat intelligence. Using its purpose-built cloud native architecture, the Falcon Platform collects and analyzes more than 30 billion endpoint events per day from millions of sensors deployed across 176 countries.

Information Not Available
OFFER
Learn more about Barkly
Learn more about CrowdStrike
Learn more about Null Product
Sample Customers
TalkTalk, Monadnock Regional School District Rackspace Inc.
Information Not Available
Find out what your peers are saying about Symantec, IBM, Carbon Black and others in Endpoint Protection.
Download now
305,918 professionals have used our research since 2012.
We monitor all Endpoint Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email