Compare Carbon Black Cloud and CrowdStrike Falcon Endpoint Protection Platform

Save your comparisonKeep these tools in one place and come back anytime.
Save to board
At a Glance
Carbon Black Cloud
Carbon Black Cloud
Star Rating
(39)4.1 out of 5
Market Segments
Mid-Market (57.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Carbon Black Cloud
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Star Rating
(398)4.7 out of 5
Market Segments
Enterprise (47.1% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial
Free Trial is available
Browse all 4 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that CrowdStrike Falcon excels in real-time threat detection, leveraging AI and machine learning to provide strong visibility across all endpoints. Users appreciate its unobtrusive operation, noting that it runs quietly in the background without slowing down their systems, which enhances overall user experience.
  • According to verified reviews, Carbon Black Cloud is praised for its ease of installation and effective protection of digital infrastructure. Users highlight the intuitive interface and the ability to maintain block and whitelist lists easily, making it user-friendly for those managing security.
  • Reviewers mention that CrowdStrike Falcon offers a fully scalable functionality that works seamlessly across both servers and endpoints. This flexibility is particularly beneficial for larger enterprises looking for comprehensive endpoint protection.
  • Users say that while Carbon Black Cloud provides solid security features, it sometimes struggles to meet specific workflow needs, with some reviewers noting configuration challenges that could hinder its effectiveness in certain environments.
  • G2 reviewers highlight that CrowdStrike Falcon has a higher overall satisfaction rating, reflecting its strong market presence and user trust. The platform's ability to quickly detect and respond to threats from a single cloud-based console is frequently mentioned as a key advantage.
  • According to recent feedback, Carbon Black Cloud's strengths lie in its advanced security features and 24/7 workload protection. However, it faces challenges in user satisfaction compared to CrowdStrike, particularly in areas like ease of use and support quality, where CrowdStrike tends to receive higher marks.
Pricing
Entry-Level Pricing
Carbon Black Cloud
No pricing available
CrowdStrike Falcon Endpoint Protection Platform
Falcon Pro
Free Trial
Browse all 4 pricing plans
Free Trial
Carbon Black Cloud
No trial information available
CrowdStrike Falcon Endpoint Protection Platform
Free Trial is available
Ratings
Meets Requirements
8.2
32
9.3
286
Ease of Use
8.2
32
9.0
296
Ease of Setup
8.6
27
9.1
251
Ease of Admin
8.1
27
9.0
217
Quality of Support
8.4
31
8.9
285
Has the product been a good partner in doing business?
9.2
27
9.2
215
Product Direction (% positive)
7.8
32
9.7
266
Features by Category
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.3
10
9.1
136
Administration
8.0
5
9.2
80
Not enough data
8.4
75
8.3
6
8.8
79
7.7
5
9.0
81
8.3
6
8.9
84
Functionality
9.1
9
9.4
87
Not enough data
8.5
78
8.9
9
9.4
94
8.7
9
9.6
110
Analysis
7.5
8
9.2
91
7.8
9
9.0
89
8.3
9
9.4
95
ServiceNow Store AppsHide 6 FeaturesShow 6 Features
Not enough data
9.3
23
ServiceNow Apps
Not enough data
8.9
14
Not enough data
9.1
13
Agentic AI - ServiceNow Store Apps
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
Not enough data
9.3
80
Detection & Response
Not enough data
9.4
57
Not enough data
9.3
58
Not enough data
9.5
57
Not enough data
9.8
67
Management
Not enough data
9.0
56
Not enough data
8.8
54
Not enough data
9.1
60
Analytics
Not enough data
9.5
58
Not enough data
9.3
63
Not enough data
9.3
58
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
9.3
10
Not enough data
9.2
11
Not enough data
9.4
11
Services - Extended Detection and Response (XDR)
Not enough data
9.8
11
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
Not enough data
9.3
23
Monitoring
Not enough data
9.5
22
Not enough data
9.7
23
Not enough data
8.7
21
Not enough data
9.0
23
Not enough data
9.2
22
Remediation
Not enough data
9.3
23
Not enough data
9.5
22
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
Not enough data
9.0
26
Platform Features
Not enough data
9.5
21
Not enough data
8.9
19
Not enough data
9.1
18
Not enough data
9.0
17
Not enough data
9.6
23
Not enough data
7.8
18
Not enough data
Not enough data
Automation Capabilities
Not enough data
9.3
18
Not enough data
9.0
18
Not enough data
Not enough data
Not enough data
8.3
38
Generative AI
Not enough data
8.3
34
Not enough data
8.3
34
Endpoint ManagementHide 1 FeatureShow 1 Feature
Not enough data
8.1
25
Generative AI
Not enough data
8.1
24
User and Entity Behavior Analytics (UEBA)Hide 11 FeaturesShow 11 Features
Not enough data
8.9
14
Agentic AI - User and Entity Behavior Analytics (UEBA)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
Not enough data
9.0
10
Not enough data
8.8
10
Not enough data
8.5
9
Not enough data
8.5
9
Detection
Not enough data
9.0
10
Not enough data
9.1
11
Not enough data
9.3
9
Not enough data
Not enough data
Agentic AI - AWS Marketplace
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
9.1
25
Services - Endpoint Detection & Response (EDR)
Not enough data
9.1
25
Not enough data
8.8
104
Orchestration
Not enough data
8.9
72
Not enough data
8.9
73
Not enough data
9.2
79
Not enough data
8.9
70
Information
Not enough data
9.3
80
Not enough data
9.6
89
Not enough data
9.3
80
Personalization
Not enough data
9.4
83
Not enough data
9.4
80
Not enough data
8.8
69
Generative AI
Not enough data
7.7
27
Not enough data
9.0
7
Not enough data
9.0
7
Not enough data
9.2
8
Agentic AI - Threat Intelligence
Not enough data
7.7
14
Not enough data
7.6
13
Not enough data
8.1
13
Not enough data
7.8
13
Not enough data
Not enough data
Response
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Records
Not enough data
8.7
5
Not enough data
Not enough data
Management
Not enough data
9.0
5
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Information and Event Management (SIEM)Hide 14 FeaturesShow 14 Features
Not enough data
9.0
25
Network Management
Not enough data
9.5
19
Not enough data
8.5
16
Not enough data
8.6
16
Incident Management
Not enough data
9.5
19
Not enough data
9.5
21
Not enough data
9.2
15
Security Intelligence
Not enough data
9.6
18
Not enough data
8.4
16
Not enough data
9.3
18
Not enough data
8.8
16
Agentic AI - Security Information and Event Management (SIEM)
Not enough data
9.4
9
Not enough data
8.5
10
Not enough data
9.3
9
Not enough data
8.5
9
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Carbon Black Cloud
Carbon Black Cloud
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Carbon Black Cloud and CrowdStrike Falcon Endpoint Protection Platform are categorized as Extended Detection and Response (XDR) Platforms, Endpoint Protection Platforms, Antivirus, and Endpoint Detection & Response (EDR)
Reviews
Reviewers' Company Size
Carbon Black Cloud
Carbon Black Cloud
Small-Business(50 or fewer emp.)
10.5%
Mid-Market(51-1000 emp.)
57.9%
Enterprise(> 1000 emp.)
31.6%
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Small-Business(50 or fewer emp.)
10.8%
Mid-Market(51-1000 emp.)
42.1%
Enterprise(> 1000 emp.)
47.1%
Reviewers' Industry
Carbon Black Cloud
Carbon Black Cloud
Financial Services
13.2%
Telecommunications
7.9%
Construction
7.9%
Retail
5.3%
Computer Software
5.3%
Other
60.5%
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Information Technology and Services
19.7%
Computer & Network Security
10.6%
Financial Services
8.1%
Hospital & Health Care
5.3%
Computer Software
4.7%
Other
51.7%
Alternatives
Carbon Black Cloud
Carbon Black Cloud Alternatives
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
ThreatLocker Platform
ThreatLocker Platform
Add ThreatLocker Platform
ThreatDown
ThreatDown
Add ThreatDown
SentinelOne Singularity Endpoint
SentinelOne Singularity...
Add SentinelOne Singularity Endpoint
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform Alternatives
Cynet
Cynet
Add Cynet
SentinelOne Singularity Endpoint
SentinelOne Singularity...
Add SentinelOne Singularity Endpoint
ThreatDown
ThreatDown
Add ThreatDown
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
Discussions
Carbon Black Cloud
Carbon Black Cloud Discussions
Monty the Mongoose crying
Carbon Black Cloud has no discussions with answers
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform Discussions
How to uninstall the CS sensor remotely from any host?
2 Comments
Bryan B.
BB
This can be done via RTR if enabled or via deploying CS's uninstall tool through GPO, or whatever other deployment package manager you are using.Read more
How does Falcon prevent work?
1 Comment
Eitan O.
EO
Falcon's approach to endpoint protection is centered around prevention. It uses a combination of machine learning, behavioral analysis, and threat...Read more
Does CrowdStrike offer MFA?
1 Comment
Clarissa N.
CN