We performed a comparison between CrowdStrike Falcon and Cymulate based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, SentinelOne, CrowdStrike and others in Endpoint Detection and Response (EDR)."The setup is pretty simple."
"The solution was relatively easy to deploy."
"Fortinet is very user-friendly for customers."
"This is stable and scalable."
"It is stable and scalable."
"he solution is an anti-malware product that integrates well with other vendor products such as firewalls, SIEM, etc. It captures threat intelligence and gives you better visibility. The product also has sandboxing features."
"The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration."
"Additionally, when it comes to EDR, there are more tools available to assist with client work."
"The most valuable feature is its threat analysis."
"CrowdStrike displays a threat score when it detects an infection. This is helpful because not all detections are the same. It will classify them as ransomware, malware, phishing, etc. This feature helps us prioritize and cross-check with other EDR tools."
"The features I like the most are the response time and the dashboard are both excellent."
"The most valuable features of CrowdStrike Falcon are the AI in detecting and real-time detections."
"The most useful feature is that we do not need to install or keep signature files. Regular scanning that consumes a lot of computer resources is not needed."
"The Protect functionality on the laptops provides great visibility into what's occurring, and the cloud management of the platform is what we needed."
"Cyberattack detection is very good. We use it for detecting different vulnerabilities, such as ransomware, virus, and malware. It is a good product today when compared to Symantec that we used previously."
"From what we have seen, it is very scalable. We have recently acquired a company where someone had a ransomware attack when we joined networks. Within the course of just a few days, we were able to easily get CrowdStrike rolled out to about 300 machines. That also included the removal of that company's legacy anti-malware tool."
"The reporting capabilities are very good."
"The most valuable feature for us is the zero-day."
"FortiEDR could add a separate scanning dashboard. In incident management, we prefer to remove the endpoint system from the environment and scan the system. We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things."
"I haven't seen the use of AI in the solution."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"The EDR console should have more extensive reporting. You shouldn't need to purchase FortiAnalyzer. It should be included in the EDR part. The security adviser cloud platform could be improved with more options for exclusive or intensive rules for devices."
"Integration with Azure and SaaS provisioning tools could improve Fortinet FortiEDR."
"Once, we had an event that was locked and blocked, but information about it came to us two or three days later."
"The support needs improvement."
"The only minor concern is occasional interference with desired programs."
"CrowdStrike Falcon needs to improve their host management system."
"I would rate it an eight out of ten. It does what it needs to do but there's always room for improvement."
"The solution needs to have integration with on-premises security devices and security facilities. That means all the security products, including the perimeter firewall, the DMZ."
"We'd like to see more integration capabilities."
"They should provide us with good visibility for everything."
"This solution could be improved with greater scope for admins to make changes to the solution."
"CrowdStrike Falcon could be enhanced by extending its security capabilities to include NDR and XDR."
"In a future release, I would like to see more integrations for data breaches and security features."
"The reporting process requires significant improvement as it often takes longer than expected and the quality is lacking."
"The product must provide consultancy for initial setup."
CrowdStrike Falcon is ranked 3rd in Endpoint Detection and Response (EDR) with 105 reviews while Cymulate is ranked 14th in Threat Intelligence Platforms with 2 reviews. CrowdStrike Falcon is rated 8.8, while Cymulate is rated 9.0. The top reviewer of CrowdStrike Falcon writes "Easy to set up with good behavior-based analysis but needs a single-click recovery option". On the other hand, the top reviewer of Cymulate writes "An affordable solution that improves an organization’s security posture and provides excellent reporting capabilities". CrowdStrike Falcon is most compared with Microsoft Defender XDR, Darktrace, Microsoft Defender for Endpoint, Trend Micro Deep Security and VMware Carbon Black Endpoint, whereas Cymulate is most compared with Pentera, Picus Security, XM Cyber, SafeBreach and CrowdStrike Falcon Threat Intelligence.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.