Barkly vs CrowdStrike

Barkly is ranked 36th in Endpoint Protection vs CrowdStrike which is ranked 11th in Endpoint Protection with 1 review. The top reviewer of CrowdStrike writes "We can see what processes are running on the system, what registry keys have been enabled". Barkly is most compared with Symantec Endpoint Protection, Check Point Endpoint Security and Cylance. CrowdStrike is most compared with Cylance, Carbon Black Cb Defense and Symantec Endpoint Protection.
Cancel
You must select at least 2 products to compare!
+Add products to compare
Most Helpful Review
Find out what your peers are saying about Symantec, IBM, McAfee and others in Endpoint Protection.
287,566 professionals have used our research since 2012.

Quotes From Members Comparing Barkly vs CrowdStrike

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
report
Use our free recommendation engine to learn which Endpoint Protection solutions are best for your needs.
287,566 professionals have used our research since 2012.
Ranking
RANKING
Views
1,318
Comparisons
1,100
Reviews
0
Followers
117
Avg. Rating
N/A
Views
16,380
Comparisons
11,477
Reviews
1
Followers
782
Avg. Rating
8.0
Top Comparisons
Top Comparisons
Compared 11% of the time.
See more Barkly competitors »
Compared 27% of the time.
See more CrowdStrike competitors »
Website/Video
Website/VideoBarkly
CrowdStrike
Overview
Overview

Hackers engineer attacks to get past your existing protection. A new file signature may be enough to get past antivirus, and new techniques like fileless delivery and built-in dwell time enable hackers to evade more sophisticated forms of protection.

At Barkly, we recognize that even the most cleverly disguised malware must reveal its malicious nature eventually. Files signatures and attributes change, but the underlying techniques used by malware to gain access and infect your system remain the same. By recognizing these behaviors as they happen, Barkly even blocks never-before-seen attacks.

Instead of looking at files, Barkly analyzes activity locally across multiple levels of the system. We recognize malware based on patterns of behavior, and automatically block its execution before any harm is done.

Falcon sensor (small and light) and cloud (big and powerful) work seamlessly to deliver real-time protection and visibility -- yes, even when the sensor is not connected to the internet. The simplicity of CrowdStrike’s architecture finally gives you the freedom to replace and retire the complicated, performance-robbing security layers that clutter your environment.

This architecture lies at the heart of Falcon, CrowdStrike’s pioneering cloud-delivered endpoint protection platform. It both delivers and unifies next-generation antivirus, endpoint detection and response (EDR), managed threat hunting, security hygiene and threat intelligence. Using its purpose-built cloud native architecture, the Falcon Platform collects and analyzes more than 30 billion endpoint events per day from millions of sensors deployed across 176 countries.

OFFER
Learn more about Barkly
Learn more about CrowdStrike
Sample Customers
Sample CustomersTalkTalk, Monadnock Regional School District Rackspace Inc.
Find out what your peers are saying about Symantec, IBM, McAfee and others in Endpoint Protection.
Download now
287,566 professionals have used our research since 2012.
We monitor all Endpoint Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email