CrowdStrike Competitors and Alternatives

Read reviews of CrowdStrike competitors and alternatives
Real User
Senior Desktop Engineer at a tech services company with 501-1,000 employees
Nov 14 2017

What is most valuable?

Ability to run custom reports and custom relevance.

How has it helped my organization?

It allowed us to proactively seek out issues as well as quickly react to issues and target only computers which needed fixes. It was very easy to streamline down to what was needed.

What needs improvement?

We need a much better multi-tenant option. We had 60 plus divisions and there was no real way to effectively give those people the help at the division sufficient rights within the console to see just their responsibilities. We wanted Bob at... more»
Real User
Systems Project Manager at a retailer with 1,001-5,000 employees
Jun 09 2017

What is most valuable?

* It is stable * No maintenance is required after a successful installation phase * It is more than a classic Anti-virus solution: both SONAR and IPS help to protect the system * The application and device policies are great features to help... more»

How has it helped my organization?

After the initial setup, you don’t have to worry about the AV clients. It simply works.

What needs improvement?

The management of the server is a bit complex. It takes time get used to it. When upgrading the software for clients, you have to link the upgrade package to every sub-folder, and there is no inheritance.
Real User
Risk Management Specialist
May 28 2018

What is most valuable?

Anti-virus, including anti-spam, trojan, and worm detection and prevention. Kaspersky has a comprehensive virus definition update which is very helpful for threat prevention.

How has it helped my organization?

Decreases IT threats, incidents from outside the environment as well as internal. Reduces cost and time when handling incidents, including mitigation, restore backup, recovery, reducing/preventing file/data error caused by the threat.

What needs improvement?

The need to re-engineer the source code to reduce CPU and memory usage. Other areas for improvement include a data-loss prevention solution, enhanced application control, enhanced device control, an endpoint encryption solution, an advanced... more»

Sign Up with Email