Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

10 AWS reviews

External reviews

361 reviews
from and

External reviews are not included in the AWS star rating for the product.


4-star reviews ( Show all reviews )

    Jai Prakash Sharma

Continuous monitoring strengthens security despite past challenges

  • May 21, 2025
  • Review provided by PeerSpot

What is our primary use case?

In my cybersecurity strategy, I use CrowdStrike Falcon mainly as an EDR solution for us. Currently, we are using it as an EDR. We are also in discussion along with the CrowdStrike team where we can have a managed SOC integrated.

In the online industry, we are using CrowdStrike Falcon, specifically in online classified, which you could call e-commerce.

What is most valuable?

For threat detection, the most effective feature I find in CrowdStrike Falcon is 24/7 managed monitoring, which is basically a next-gen antivirus and next-gen endpoint detection and response. In endpoint detection and response, the best part is 24/7 365 continuous monitoring to the endpoint for identifying any suspicious activity.

CrowdStrike Falcon serves as a next-gen AV, which basically does AI-based behavioral analysis to detect and act on malware or ransomware.

The automated response capabilities in CrowdStrike Falcon handle incidents based on the behavior of the activity, performing analysis in case it finds more objectionable content. If there is blocking or breaking any of your site map or something of that sort, it is an untraditional way. If the traffic behaves suspiciously, it triggers an automated response to block it. Additionally, if it detects a file which might have an extension of MIME type of maybe a document whereas it is self-replicating, that sends a suspicious activity alert. In such cases, the detection happens automatically. Because in case it's a zero-day, many times such files automatically get put in a sandbox to extract it and see why it is identified as malware. It offers automated threat detection as well, not only automated response.

Falcon's integration capabilities with other tools enhance my security posture because it has a very lightweight agent, and having a unified console gives us complete visibility, including endpoints, servers, containers, cloud workloads, everything.

What needs improvement?

To make CrowdStrike Falcon better for the next release, I recommend that they should have a model where it works as agentless. In terms of everything which the agent pushes to the server or to the single console, having a feature where you can have another port, which is SNMP or your network devices or OT devices, which you can specifically monitor, would be great.

For how long have I used the solution?

I have been using CrowdStrike Falcon for more than two years now.

What was my experience with deployment of the solution?

CrowdStrike Falcon is fairly easy to set up, according to my experience and our team's experience. Since we have a heterogeneous environment, for Windows it is very straightforward and easy, but for Linux it is a bit complex since you need to automate it. If you have a bulk force, then you have to use some CMF or something similar. Overall, it is still fairly easy.

For deployment, it takes approximately a couple of minutes.

What do I think about the stability of the solution?

During these two years with CrowdStrike Falcon, I certainly faced some problems, including the known CrowdStrike outage, which was quite pinching and brought many of the Windows-related services to a halt just because of one bad configuration push from CrowdStrike tracks.

Except for the incident mentioned above, I have not seen any recent issues with stability.

What do I think about the scalability of the solution?

CrowdStrike Falcon is easy to scale for my company's needs.

How are customer service and support?

I have contacted CrowdStrike for issues, and the response was poor. That particular experience was pretty bad, with people not knowing what was happening, how to mitigate, or what to do. We were in a bad situation, but after a couple of hours, their communication started flowing fine, and things gradually started improving. For that particular instance, I would rate it less than four.

Which solution did I use previously and why did I switch?

Before working with CrowdStrike Falcon, I evaluated options such as Carbon Black and SentinelOne.

How was the initial setup?

CrowdStrike Falcon is fairly easy to set up, according to my experience and our team's experience. Since we have a heterogeneous environment, for Windows it is very straightforward and easy, but for Linux it is a bit complex since you need to automate it. If you have a bulk force, then you have to use some CMF or something similar. Overall, it is still fairly easy.

For deployment, it takes approximately a couple of minutes.

What was our ROI?

As for return on investment after implementing CrowdStrike Falcon, I would say if it is protecting my environment, that itself meets my expectations so far.

What's my experience with pricing, setup cost, and licensing?

CrowdStrike Falcon is pretty expensive.

Which other solutions did I evaluate?

I do not see a lot of advantages in CrowdStrike Falcon; however, because of one particular problem, we had to give away SentinelOne. Otherwise, all three products are quite comparable.

What other advice do I have?

For those who would like to use CrowdStrike Falcon, I recommend negotiating hard on commercial terms because it is not an easy or affordable solution. From a commercial standpoint, you should negotiate hard, but technically, it is not very difficult.

CrowdStrike Falcon is a user-friendly tool.

On a scale of one to ten, I rate CrowdStrike Falcon an eight.


    Rojal Barreto

Advanced AI integration boosts security effectiveness

  • May 20, 2025
  • Review provided by PeerSpot

What is our primary use case?

I am using it for endpoint protection.

What is most valuable?

The features I appreciate the most are numerous; the overall product is very good, actually.

This is an advanced tool in terms of AI which is implemented and integrated. CrowdStrike Falcon has a ransom detection time of less than 50 seconds. Detection and taking down violations and breaches takes a minimum time of 59 seconds. Intelligence is very good, as AI is integrated with this solution. The integration capabilities in CrowdStrike Falcon are very good.

What needs improvement?

If tomorrow is the next release of the product, new features would be helpful, but at the moment, the product is very good. Nothing specific comes to mind about what new features they can add.

For further improvements, I can only think of one example because this is very important for us; they could reduce the price. Then it would deserve a rating of seven.

For how long have I used the solution?

We have been using it for three to four years and have not encountered any issues.

What was my experience with deployment of the solution?

Regarding challenges or problems with the product, I haven't noticed any current drawbacks. The challenge occurred last year in July when there was some patch update failure, which caused many issues. However, we have overcome that situation.

What do I think about the stability of the solution?

The stability is good.

What do I think about the scalability of the solution?

We have been using it for three to four years and have not encountered any issues. More experience with this product might come with increased usage.

How are customer service and support?

The technical support from CrowdStrike Falcon is good.

I would rate the support an eight.

How would you rate customer service and support?

Positive

How was the initial setup?

The installation and deployment are straightforward. It is very good and can be integrated with the management engine.

What was our ROI?

The Return On Investment saves around 30%.

What's my experience with pricing, setup cost, and licensing?

The licensing cost and setup costs are affordable.

What other advice do I have?

I am a computer engineer by profession.

The maintenance is automatic.

I would rate CrowdStrike Falcon as nine overall.


    Mahmoud Younes

User-friendly platform enables streamlined threat management and enhanced endpoint visibility

  • May 15, 2025
  • Review provided by PeerSpot

What is our primary use case?

For our use cases, we are using it to collect IOCs, and we also are using EDR, with injection integrated with our SIM solution to create some use cases.

What I find beneficial about CrowdStrike Falcon is that it performs effectively. We are focusing only on EDR and creating use cases regarding user processes or endpoints, particularly user behavior analytics.

What is most valuable?

The CrowdStrike Falcon has enhanced our cybersecurity posture in our organization by providing full visibility for each endpoint.

The real-time analytics aspect of CrowdStrike performs well because we get all logs in real-time, with no delay, allowing us to take action immediately.

The integration capabilities of CrowdStrike are excellent; we can integrate it with many SIM solutions and SOAR, and we have already integrated with different platforms. While integrating it with other platforms, I do not remember facing any issues, as we have a very good team for custom connectors, and the integration is smooth without any challenges.

What needs improvement?

We do not leverage AI within the CrowdStrike Falcon, as we are using different products LLM, and I am unsure if CrowdStrike has the capability to integrate it with local LLM or if I need to use commercial LLM such as OpenAI.

I am currently investigating SOAR in CrowdStrike because I have seen some articles about it, but I am uncertain if it is operational now or still in development.

I do not have any specific features I would want to see included in CrowdStrike.

For how long have I used the solution?

I have been working with the CrowdStrike Falcon for almost three years.

What do I think about the stability of the solution?

I find CrowdStrike to be stable; there are no issues, although there was one instance when we had an outage for updating the Falcon Agent, but since then, it has been stable without any issues.

What do I think about the scalability of the solution?

In terms of scalability, I find CrowdStrike to be stable, and I have not encountered any limitations with it. CrowdStrike covers around 2,800 endpoints for us.

How are customer service and support?

Regarding maintenance, the service is excellent; if we face any issues, we open a ticket with the CrowdStrike support team.

I would evaluate CrowdStrike tech support as excellent because they have a very fast response.

On a scale of one to ten, I would rate the technical support as a 10 because they resolve many issues for us.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Before CrowdStrike, I worked with other solutions for EDR and XDR, specifically Trend Micro and Microsoft Defender's Endpoint, as we are working in MSSP.

The main differences between CrowdStrike and Trend Micro or Microsoft solutions are that CrowdStrike gives me more visibility, while with Defender, I have to run queries which are not easy to use. Even network telemetry for CrowdStrike is very simple and easy to read, allowing for faster understanding compared to Defender where creating rules requires more tuning. Regarding disadvantages of CrowdStrike in comparison to Defender or Trend Micro, I do not see any.

How was the initial setup?

I was not involved in the implementation part of CrowdStrike in my environment because I arrived after it was already installed, so I did not start from scratch.

What was our ROI?

Currently, I do not see any tangible benefits from CrowdStrike regarding incident improvement time, response time, or cost saving.

What other advice do I have?

Based on my experience, I would recommend CrowdStrike to others because it is user-friendly and easy to manage, unlike other solutions that require experienced personnel; CrowdStrike's documentation is also very clear.

I would recommend it to other users because it is a perfect product.

It is an easy solution that anyone can manage, providing many benefits for endpoint visibility and allowing for the creation of many custom use cases without the need for much fine-tuning to get true positive alerts.

On a scale of one to ten, I would rate CrowdStrike Falcon as a product and solution as an eight.


    Retail

decent EDR if you can afford it

  • March 26, 2025
  • Review provided by G2

What do you like best about the product?
Lots of products with one agent, good data, allows access to systems without needing an elevated account, Good for incident remediations
What do you dislike about the product?
expensive, support can be lacking, modular design
What problems is the product solving and how is that benefiting you?
Protecting assets from threats both complicated and user error. Beings able to remediate issues that arise without needing to remote into them.


    Suman M.

Detection and Protection

  • March 26, 2025
  • Review provided by G2

What do you like best about the product?
Most and important of Crowd strike falcon It is cloud-base product no hassle of hosting in on premise.
Easy to access from anywhere and more user friendly product
What do you dislike about the product?
one of disadvantage of this product is we cannot able to control the USB access in the host base with the time define
Crowd strike only support the device base id for time define
What problems is the product solving and how is that benefiting you?
detection and prevention for the undefined inccident
Response is quick


    Haroon-Rasheed

security analysts handle rules and investigations swiftly with real-time detection

  • February 12, 2025
  • Review from a verified AWS customer

What is our primary use case?

As a security analyst, I primarily focus on creating rules, conducting investigations, and integrating new devices with our CrowdStrike system. After these integrations, I also check the status to ensure everything is functioning properly.

What is most valuable?

For threat detection, CrowdStrike provides queries and searches. If I need to find any IOCs, I would say that is my best option. During a cyber war, once we gather some IOCs, we can ingest them into CrowdStrike. This ensures that if we encounter an attack using those IOCs in the future, we receive alerts, allowing us to investigate further. Also, the detection capability of CrowdStrike is quite real-time. If we enforce a policy preventing users from inserting USBs into the PC and it triggers, it happens in real-time without delay.

What needs improvement?

Currently, users manually input IOCs, and it would be beneficial if IOCs released by major companies were automatically integrated into CrowdStrike. We retrieve files from vendors, which incurs costs. Automating this process could be cost-effective and time-saving.

For how long have I used the solution?

I think I have been using it for around seven and a half years.

What was my experience with deployment of the solution?

There is no maintenance required because I, as a user of CrowdStrike, am part of the security team. I mainly configure new threat detections or explore new dashboards.

What do I think about the stability of the solution?

The stability is quite impressive, and I am enjoying it.

What do I think about the scalability of the solution?

It is stable, and I haven't encountered any issues. It is manageable and comfortable.

Which solution did I use previously and why did I switch?

I am a security analyst, and CrowdStrike is utilized as part of EDR. For websites, other attacks, and banking systems, we have used QRadar, ELK, Sentinel, and some locally built detection systems.

How was the initial setup?

For me, as a security analyst, it doesn't require months or days. Many tasks can be completed in hours. With experience, even critical tasks can be done in minutes.

What about the implementation team?

Whenever our company hires a new employee, they provide him with credentials. He installs the agent and inputs the credentials. The process is entirely console-based.

What was our ROI?

It depends on the size of the company and the tasks we undertake.

What's my experience with pricing, setup cost, and licensing?

I don't have much information about the setup costs, but it was manageable. CrowdStrike offers three or four packages depending on the company's size, and we purchased the most expensive one for better operations.

What other advice do I have?

I would recommend that if you need a quick response against real-time attackers, you should consider purchasing CrowdStrike. Windows Defender doesn't match up, so configuring it on EC2 instances is better for small and large-scale companies as well. Overall rating: nine out of ten.


    Shubham Sinha.

Detects anomalies and helps with fast threat identification and response

  • January 14, 2025
  • Review from a verified AWS customer

What is our primary use case?

We are using it for endpoint protection, as well as for cloud security coverage. It includes monitoring all our critical servers and endpoint devices. We also design workflows for anomaly behavior detection using machine learning techniques for anything malicious or abnormal. We monitor everything suspicious. We either design the workflows or use CrowdStrike to monitor any new detections and anomaly behaviors, as well as do vulnerability management.

How has it helped my organization?

The best benefit of CrowdStrike Falcon is 99% MITRE coverage. It detects suspicious or undetected activities on the system and provides protection for zero-day vulnerabilities. If there is a sudden rise in CPU consumption or abnormal storage use, it helps us by creating a ticket, allowing us to investigate any abnormal behavior present. We can look into the machine and investigate. It reduces the false negatives common with other technologies.

The real-time response helps with MTTR. We achieve faster detection and response times.

It helped prevent breaches. In the past, there was abnormal consumption of RAM along with CPU on a server. It also started communicating with other subnets. CrowdStrike Falcon triggered an alert. We did our investigation and found that we had ransomware. We successfully mitigated it.

What is most valuable?

The machine learning behavior for anomaly detection is a valuable feature. It helps identify any suspicious or unusual activities within the system.

Furthermore, it has impressive MITRE coverage. 

What needs improvement?

Deployment in cloud environments is challenging. Another concern is CrowdStrike's GUI. It changes annually, making it hard to work and find options. After a year, options change or integrate with something else, which is challenging for me as it requires relearning. It is time-consuming.

For how long have I used the solution?

I started working on CrowdStrike in 2018. 

What do I think about the stability of the solution?

We are following N-1 versions across our environment, which is stable. Due to our requirements, we never switch to the N version; we always stick to N-1 and never face anything abnormal while using it.

What do I think about the scalability of the solution?

It has proven to be a good technology for me. It has adequate coverage and is easy to deploy. Its scalability is good.

It is deployed across the globe.

How are customer service and support?

I would rate them a seven out of ten. They take a lot of time to come back to us.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I have used SentinelOne as well. SentinelOne was similar but had major challenges with workflow implementation. Workflow implementation is far easier in CrowdStrike compared to SentinelOne.

How was the initial setup?

We have it in the on-premises environment and cloud environments. For endpoint hosts, it is very easy, but in the cloud environment, there are challenges, especially if we have AWS technologies with Lambda functions, which are serverless.

My implementation strategy was simple. I segregated servers based on criticality, then network, and finally OS level. Anything critical was based on my CMDB asset configuration. Following criticality was the network, determining internal versus public-facing. The last segmentation was on OS configuration. These three categorizations were primarily used in deploying agents across our environment.

In terms of maintenance, there are patches or version upgrades. 

What about the implementation team?

We had a group of five people, which was enough to manage this.

What was our ROI?

It is worth the money.

What's my experience with pricing, setup cost, and licensing?

It is expensive compared to SentinelOne, but as the market leader, it is worth it.

What other advice do I have?

I would rate CrowdStrike Falcon an eight out of ten. They have some challenges with the cloud environment, which is a major drawback, especially with the serverless aspect. Their GUI also causes issues with regular changes.

If anyone has worked with CrowdStrike, they would promote it. However, cloud security presents challenges. Moving from physical to cloud environments is difficult. I have raised 7-8 tickets to resolve cloud issues, especially with AWS.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)


    Sumanth Kandanuru

Enables direct remote investigations with comprehensive analysis features

  • January 14, 2025
  • Review provided by PeerSpot

What is our primary use case?

I am currently using CrowdStrike Falcon as an EDR, which is integrated with SIEM. We also work in a real-time environment with the product. As a Falconist, I perform investigation actions on it. There are three different kinds of alerts I deal with: one based purely on IOCs, another process-oriented IOA, and those based on machine learning alerts. This is what I work on, and it is actually a good tool. It has multiple features, including real-time connection to the RTR environment, allowing direct remote host connection through CrowdStrike. I have multiple options like host search and event search, enabling me to do everything I need. It's a comprehensive package. It's a challenging tool to explore, but once accustomed to it, it is quite excellent.

What is most valuable?

Obviously, when checking in the SIEM, not all logs are available. In CrowdStrike, unlike SIEM, actions are clearly defined. For example, a regular AV like Symantec might indicate a file was quarantined or failed to quarantine, but in CrowdStrike, I can verify the action. As an incident response analyst, I can use CrowdStrike to perform actions like directly wiping a file from a host if given access. I can investigate by accessing the customer's host based on the RTR environment and utilize host search to know details for the past seven days, including logins, processes, file installations, malicious processes, and network connections. Event search also allows for detailed investigations, showing accessed files and remote installations.

What needs improvement?

In CrowdStrike, with the variety of security tools available, learning the different query languages can be challenging. I use KQL queries with Sentinel and AQL with QRadar, and CrowdStrike's query language is different as well. This requires constant learning for security analysts. Simplifying the querying process, such as using double quote queries or directly obtaining logs based on IP addresses or usernames, would be beneficial. The event search tab in CrowdStrike is complex, though the host search is more straightforward and gets details from the past week. The querying system, similar to Splunk, could be made more user-friendly.

For how long have I used the solution?

I have been using it for the past two years.

What do I think about the stability of the solution?

The stability is always great. I have never seen instability in the CrowdStrike tool.

What do I think about the scalability of the solution?

When it comes to scalability, it is entirely based on premium models according to demand. Our log retention is low, but paying more increases it. Scalability is moderate, based on the charges paid to the CrowdStrike product service team. Offering good services, like better log retention at a lower price, would be excellent.

How are customer service and support?

The CrowdStrike team is very efficient; I would rate them ten out of ten. They respond quickly when it comes to providing services.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have worked on Symantec ATP, advanced threat protection, but it is a legacy product. Many companies have moved away from Symantec, and they use legacy antivirus solutions. The integration with Symantec ATP was tough, and event or host searches were based entirely on raw logs.

How was the initial setup?

The current setup is easy, but it could be more natural and make drill-down searches simpler. With advancements in AI, integration could streamline responses further, but there is still room for making the process easier.

What about the implementation team?

The integration task should be done by engineers. I'm interested in the process and have learned something about integration, but we have not fully explored all integration aspects.

What other advice do I have?

CrowdStrike is a great solution. It's a hands-on tool. I have not seen other EDRs like it. Compared to Carbon Black, which is much more difficult with a different UI, CrowdStrike allows direct, detailed investigation with a PID generated for each process. It offers unique abilities not seen in other EDRs. Overall product rating: nine out of ten.


    Peter M.

Total visibility and protection

  • November 26, 2024
  • Review provided by G2

What do you like best about the product?
Crowdstrike Falcon provides enhanced visibility into system activity through their telemetry. This information is crucial for threat hunting or during incident response processes. The management console provides an easy to navigate interface; and the Crowdstrike support portal provides great documentation and training materials.

SIEM integration works well with and can be achieved through API with modern SIEM soultions.
What do you dislike about the product?
The console reporting and dashboards could be improved upon.
What problems is the product solving and how is that benefiting you?
Crowdstrike provides highly effective and customizable detection and prevention against threats and other suspicious activity. One of the major benefits of Crowdstrike is the lack of false-positives.


    Jaikrishna J.

Strong EDR combined with smooth functionality

  • September 24, 2024
  • Review provided by G2

What do you like best about the product?
Quick response times and outstanding customer support
What do you dislike about the product?
The one feature I’d like to see in this product is protection against CVEs and improved signature-based detection.
What problems is the product solving and how is that benefiting you?
It helps protect against advanced cyber threats with real-time detection and response. This improves our security and helps prevent breaches, keeping our important assets safe.