Introducing G2.ai, the future of software buying.Try now

Compare BlackBerry UEM and CrowdStrike Falcon Endpoint Protection Platform

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
BlackBerry UEM
BlackBerry UEM
Star Rating
(376)3.8 out of 5
Market Segments
Enterprise (54.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about BlackBerry UEM
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Star Rating
(339)4.7 out of 5
Market Segments
Enterprise (49.8% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial
Free Trial is available
Browse all 4 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that CrowdStrike Falcon Endpoint Protection Platform excels in malware detection with a score of 9.6, while BlackBerry UEM falls behind with a score of 9.3. Reviewers mention that the real-time detection capabilities of CrowdStrike are particularly impressive, providing a robust defense against emerging threats.
  • Reviewers mention that CrowdStrike's endpoint intelligence feature, rated at 9.4, offers superior insights compared to BlackBerry UEM's score of 9.1. Users on G2 appreciate the actionable intelligence provided by CrowdStrike, which helps in proactive threat management.
  • Users say that the ease of setup is a significant advantage for CrowdStrike, scoring 9.2, while BlackBerry UEM's score of 7.5 indicates a more complex installation process. Reviewers mention that CrowdStrike's straightforward onboarding process allows teams to get up and running quickly.
  • G2 users highlight the quality of support for CrowdStrike, which has a score of 8.9, compared to BlackBerry UEM's 7.9. Users report that CrowdStrike's support team is responsive and knowledgeable, making it easier to resolve issues promptly.
  • Reviewers mention that CrowdStrike's proactive threat hunting feature, rated at 8.9, is a standout capability, whereas BlackBerry UEM's similar feature is less emphasized. Users appreciate the continuous monitoring and threat identification that CrowdStrike provides.
  • Users on G2 report that CrowdStrike's customizable reports (score of 8.0) allow for tailored insights, while BlackBerry UEM's reporting features are seen as less flexible. Reviewers say that the ability to generate specific reports helps organizations meet compliance and operational needs more effectively.
Pricing
Entry-Level Pricing
BlackBerry UEM
No pricing available
CrowdStrike Falcon Endpoint Protection Platform
Falcon Pro
Free Trial
Browse all 4 pricing plans
Free Trial
BlackBerry UEM
No trial information available
CrowdStrike Falcon Endpoint Protection Platform
Free Trial is available
Ratings
Meets Requirements
8.2
306
9.3
244
Ease of Use
8.0
309
9.0
247
Ease of Setup
7.5
67
9.2
207
Ease of Admin
7.8
63
9.0
191
Quality of Support
7.9
275
8.9
240
Has the product been a good partner in doing business?
7.8
63
9.2
192
Product Direction (% positive)
5.7
290
9.7
224
Features by Category
Cloud Content CollaborationHide 22 FeaturesShow 22 Features
7.9
108
Not enough data
File Management
8.2
96
Not enough data
8.0
95
Not enough data
8.0
98
Not enough data
7.7
96
Not enough data
7.9
95
Not enough data
Agentic AI - Cloud Content Collaboration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Collaboration
8.3
89
Not enough data
8.0
96
Not enough data
7.5
93
Not enough data
8.1
90
Not enough data
Administration
7.9
81
Not enough data
7.8
82
Not enough data
8.0
82
Not enough data
7.9
82
Not enough data
8.0
78
Not enough data
8.6
81
Not enough data
Platform
7.4
24
Not enough data
7.8
24
Not enough data
7.6
23
Not enough data
7.5
21
Not enough data
Multi-Factor Authentication (MFA)Hide 13 FeaturesShow 13 Features
Not enough data
Not enough data
Authentication type
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Implementation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
Not enough data
Not enough data
Scope
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Unified Endpoint Management (UEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
Not enough data
9.0
93
Administration
Not enough data
9.1
72
Not enough data
8.4
68
Not enough data
8.7
72
Not enough data
8.9
73
Not enough data
8.9
74
Functionality
Not enough data
9.4
82
Not enough data
8.4
72
Not enough data
9.4
78
Not enough data
9.5
83
Analysis
Not enough data
9.1
80
Not enough data
9.2
77
Not enough data
9.2
79
Not enough data
Not enough data
Login Options
Not enough data
Not enough data
Not enough data
Not enough data
Productivity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Customization
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Unified Workspaces
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Task Creation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Task Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
ServiceNow Store AppsHide 6 FeaturesShow 6 Features
Not enough data
9.3
22
ServiceNow Apps
Not enough data
8.9
14
Not enough data
9.1
13
Agentic AI - ServiceNow Store Apps
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
Not enough data
9.3
63
Detection & Response
Not enough data
9.3
54
Not enough data
9.2
55
Not enough data
9.5
55
Not enough data
9.7
56
Management
Not enough data
9.0
55
Not enough data
8.9
52
Not enough data
9.1
52
Analytics
Not enough data
9.4
56
Not enough data
9.2
55
Not enough data
9.3
56
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
9.3
10
Not enough data
9.2
10
Not enough data
9.3
10
Services - Extended Detection and Response (XDR)
Not enough data
9.8
8
Not enough data
Not enough data
Design
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Collaboration
Not enough data
Not enough data
Not enough data
Not enough data
File Types
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Edit & Revise
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Integrate & Embed
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Operating System
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Document Creation
Not enough data
Not enough data
Application Development PlatformsHide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
Not enough data
9.3
22
Monitoring
Not enough data
9.5
22
Not enough data
9.7
22
Not enough data
8.7
21
Not enough data
8.9
22
Not enough data
9.2
21
Remediation
Not enough data
9.3
22
Not enough data
9.5
22
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
Not enough data
8.9
18
Platform Features
Not enough data
9.4
17
Not enough data
8.8
18
Not enough data
9.1
18
Not enough data
9.0
17
Not enough data
9.4
18
Not enough data
7.6
17
Not enough data
Not enough data
Automation Capabilities
Not enough data
9.2
17
Not enough data
9.0
18
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.2
35
Generative AI
Not enough data
8.2
32
Not enough data
8.2
32
Endpoint ManagementHide 1 FeatureShow 1 Feature
Not enough data
8.0
23
Generative AI
Not enough data
8.0
23
Not enough data
Not enough data
Memory Management - Operating System
Not enough data
Not enough data
Device Management - Operating System
Not enough data
Not enough data
Backup and Recovery - Operating System
Not enough data
Not enough data
Error Detection - Operating System
Not enough data
Not enough data
User and Entity Behavior Analytics (UEBA)Hide 11 FeaturesShow 11 Features
Not enough data
8.8
10
Agentic AI - User and Entity Behavior Analytics (UEBA)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
Not enough data
8.9
9
Not enough data
8.7
9
Not enough data
8.5
9
Not enough data
8.5
9
Detection
Not enough data
8.9
9
Not enough data
8.9
9
Not enough data
9.3
9
Mobile Development PlatformsHide 3 FeaturesShow 3 Features
Not enough data
Not enough data
Agentic AI - Mobile Development Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - AWS Marketplace
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Mobile Application ManagementHide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Agentic AI - Mobile Application Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
9.0
19
Services - Endpoint Detection & Response (EDR)
Not enough data
9.0
19
Not enough data
8.7
90
Orchestration
Not enough data
8.9
69
Not enough data
8.9
69
Not enough data
9.2
74
Not enough data
8.8
69
Information
Not enough data
9.3
77
Not enough data
9.5
80
Not enough data
9.3
78
Personalization
Not enough data
9.4
78
Not enough data
9.4
78
Not enough data
8.8
69
Generative AI
Not enough data
7.5
25
Not enough data
8.9
6
Not enough data
8.9
6
Not enough data
8.9
6
Agentic AI - Threat Intelligence
Not enough data
7.6
13
Not enough data
7.6
13
Not enough data
8.1
13
Not enough data
7.8
13
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Information and Event Management (SIEM)Hide 14 FeaturesShow 14 Features
Not enough data
8.9
13
Network Management
Not enough data
9.2
13
Not enough data
8.2
13
Not enough data
8.7
13
Incident Management
Not enough data
9.2
13
Not enough data
9.2
13
Not enough data
9.1
13
Security Intelligence
Not enough data
9.5
13
Not enough data
8.5
13
Not enough data
9.0
13
Not enough data
8.8
13
Agentic AI - Security Information and Event Management (SIEM)
Not enough data
9.4
9
Not enough data
8.3
9
Not enough data
9.3
9
Not enough data
8.5
9
Not enough data
Not enough data
Encryption
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Desktop as a Service (DaaS)Hide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Platform
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
BlackBerry UEM
BlackBerry UEM
Small-Business(50 or fewer emp.)
26.5%
Mid-Market(51-1000 emp.)
18.8%
Enterprise(> 1000 emp.)
54.7%
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Small-Business(50 or fewer emp.)
10.6%
Mid-Market(51-1000 emp.)
39.5%
Enterprise(> 1000 emp.)
49.8%
Reviewers' Industry
BlackBerry UEM
BlackBerry UEM
Financial Services
19.9%
Information Technology and Services
8.3%
Banking
7.5%
Computer Software
3.6%
Accounting
3.6%
Other
57.2%
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Information Technology and Services
17.4%
Computer & Network Security
11.3%
Financial Services
8.7%
Hospital & Health Care
5.5%
Computer Software
4.8%
Other
52.4%
Alternatives
BlackBerry UEM
BlackBerry UEM Alternatives
Microsoft Intune Enterprise Application Management
Microsoft Intune Enterprise Application Management
Add Microsoft Intune Enterprise Application Management
ManageEngine Endpoint Central
ManageEngine Endpoint Central
Add ManageEngine Endpoint Central
Absolute Secure Endpoint
Absolute Secure Endpoint
Add Absolute Secure Endpoint
Jamf
Jamf
Add Jamf
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform Alternatives
Cynet - All-in-One Cybersecurity Platform
Cynet - All-in-One Cybersecurity Platform
Add Cynet - All-in-One Cybersecurity Platform
ThreatDown
ThreatDown
Add ThreatDown
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Add SentinelOne Singularity Endpoint
Discussions
BlackBerry UEM
BlackBerry UEM Discussions
How do I work my BlackBerry?
1 Comment
Jen G.
JG
Login and choose app (mail, calendar, etc) and use just like on computer Read more
how can I integrate this tool with another colleague's cloud
1 Comment
Qiel 9.
Q9
I need software to store documents securely
1 Comment
ibnu m.
IM
office needs and I am personalRead more
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform Discussions
How to uninstall the CS sensor remotely from any host?
2 Comments
Bryan B.
BB
This can be done via RTR if enabled or via deploying CS's uninstall tool through GPO, or whatever other deployment package manager you are using.Read more
How do people see Firewall logs in Crowdstrike . Is it Possible to view Firewall logs or requires a separated application to pull those into CS console.
1 Comment
Bryan B.
BB
You can see firewall changes and rule modifications under the event_SimpleNames "FirewallChangeOption" and "FirewallSetRule". CrowdStrike's Firewall license...Read more
Crowd strike have UBA??
1 Comment
Bryan B.
BB
No it does not.Read more