Compare CrowdStrike Falcon Cloud Security and Cyberhaven

At a Glance
CrowdStrike Falcon Cloud Security
CrowdStrike Falcon Cloud Security
Star Rating
(82)4.6 out of 5
Market Segments
Mid-Market (43.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Contact Us 1 Workloads
Free Trial is available
Browse all 3 pricing plans
Cyberhaven
Cyberhaven
Star Rating
(18)4.5 out of 5
Market Segments
Enterprise (61.1% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Cyberhaven
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Cyberhaven excels in providing real-time data tracking and mapping, which offers users clear transparency into data flows. This feature is particularly beneficial for organizations needing to safeguard critical information.
  • Users say that CrowdStrike Falcon Cloud Security stands out for its unified visibility and intelligent protection across cloud environments, making it a reliable choice for businesses looking to enhance their security posture.
  • Reviewers mention that Cyberhaven's user-controlled override functions are a significant advantage, allowing for flexibility in managing data transfers while maintaining robust protection against insider threats.
  • According to verified reviews, CrowdStrike Falcon Cloud Security is praised for its lightweight agent and real-time detection capabilities, which contribute to its reliability and consistent performance in threat management.
  • Users highlight that Cyberhaven's ability to meet and exceed contractual requirements for data loss prevention (DLP) is a key strength, as it goes beyond standard blocking methods to protect intellectual property effectively.
  • G2 reviewers note that while both products offer strong support, CrowdStrike Falcon Cloud Security has a slight edge in terms of overall user satisfaction, with its management console providing intuitive access to threat reports and investigation tools.
Pricing
Entry-Level Pricing
CrowdStrike Falcon Cloud Security
Cloud-Native Application Security (CNAPP)
Contact Us
1 Workloads
Browse all 3 pricing plans
Cyberhaven
No pricing available
Free Trial
CrowdStrike Falcon Cloud Security
Free Trial is available
Cyberhaven
No trial information available
Ratings
Meets Requirements
9.2
72
8.9
17
Ease of Use
8.7
74
8.6
18
Ease of Setup
8.9
67
8.7
18
Ease of Admin
8.9
54
9.0
16
Quality of Support
8.8
66
8.8
17
Has the product been a good partner in doing business?
9.1
54
9.5
16
Product Direction (% positive)
9.5
74
9.3
16
Features by Category
Cloud Workload Protection PlatformsHide 10 FeaturesShow 10 Features
9.2
17
Not enough data
Management
9.1
16
Not enough data
9.2
13
Not enough data
8.9
15
Not enough data
Operations
9.0
14
Not enough data
9.2
14
Not enough data
Feature Not Available
Not enough data
Security Controls
9.6
13
Not enough data
8.6
13
Not enough data
9.2
14
Not enough data
9.1
13
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Protection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Loss Prevention (DLP)Hide 10 FeaturesShow 10 Features
Not enough data
9.2
16
Administration
Not enough data
9.3
12
Not enough data
9.8
11
Not enough data
8.8
13
Governance
Not enough data
8.5
13
Not enough data
9.2
14
Not enough data
9.8
14
Security
Not enough data
9.1
11
Not enough data
8.6
12
Not enough data
9.6
15
Not enough data
9.0
14
8.6
27
Not enough data
Security
8.7
26
Not enough data
8.7
24
Not enough data
Feature Not Available
Not enough data
8.5
23
Not enough data
Compliance
8.6
23
Not enough data
8.5
23
Not enough data
8.3
22
Not enough data
Administration
8.6
21
Not enough data
9.0
21
Not enough data
8.6
21
Not enough data
Not enough data
Not enough data
Data Protection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Protection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Usability
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Performance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Network
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Application
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Vulnerability Scanner
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Security Monitoring and AnalyticsHide 13 FeaturesShow 13 Features
8.4
44
Not enough data
Activity Monitoring
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Security
8.3
40
Not enough data
8.3
40
Not enough data
8.6
40
Not enough data
Administration
8.5
40
Not enough data
8.6
40
Not enough data
8.2
37
Not enough data
Agentic AI - Cloud Security Monitoring and Analytics
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Sensitive Data DiscoveryHide 14 FeaturesShow 14 Features
Not enough data
9.0
6
Functionality
Not enough data
Not enough data
Not enough data
9.7
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.3
5
Not enough data
8.9
6
Not enough data
9.7
6
Not enough data
8.6
6
Not enough data
9.3
5
Not enough data
8.7
5
Agentic AI - Sensitive Data Discovery
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
Not enough data
Not enough data
Detection & Response
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analytics
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Services - Extended Detection and Response (XDR)
Not enough data
Not enough data
Insider Threat Management (ITM)Hide 9 FeaturesShow 9 Features
Not enough data
8.2
11
Functionality
Not enough data
9.3
10
Not enough data
9.6
9
Not enough data
9.2
11
Not enough data
9.0
10
Not enough data
9.8
10
Not enough data
9.2
10
Monitoring
Not enough data
7.0
9
Not enough data
5.0
9
Not enough data
5.6
9
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
9.0
29
Not enough data
Configuration
Feature Not Available
Not enough data
8.9
24
Not enough data
9.1
22
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Visibility
8.9
22
Not enough data
8.8
23
Not enough data
Vulnerability Management
9.1
23
Not enough data
8.8
24
Not enough data
9.1
22
Not enough data
9.0
23
Not enough data
Cloud Infrastructure Entitlement Management (CIEM)Hide 8 FeaturesShow 8 Features
9.2
8
Not enough data
Access control - Cloud Infrastructure Entitlement Management (CIEM)
9.6
8
Not enough data
9.0
8
Not enough data
9.0
8
Not enough data
Feature Not Available
Not enough data
Monitoring - Cloud Infrastructure Entitlement Management (CIEM)
9.2
8
Not enough data
9.2
8
Not enough data
Auditing - Cloud Infrastructure Entitlement Management (CIEM)
9.2
8
Not enough data
9.0
8
Not enough data
Application Security Posture Management (ASPM)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Risk management - Application Security Posture Management (ASPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Integration and efficiency - Application Security Posture Management (ASPM)
Not enough data
Not enough data
Not enough data
Not enough data
Reporting and Analytics - Application Security Posture Management (ASPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Application Security Posture Management (ASPM)
Not enough data
Not enough data
Not enough data
Not enough data
Cloud-Native Application Protection Platform (CNAPP)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Security - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Exposure Management PlatformsHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Generative AI - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Risk Identification and Assessment - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring and Integration - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Data Security Posture Management (DSPM)Hide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Discovery & Classification - Data Security Posture Management (DSPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Prioritization - Data Security Posture Management (DSPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Remediation & Governance - Data Security Posture Management (DSPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Security Posture Management (AI-SPM) ToolsHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Functionality - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Assessment - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Detection and Response (CDR)Hide 4 FeaturesShow 4 Features
Not enough data
Not enough data
Agentic AI - Cloud Detection and Response (CDR)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Services - Cloud Detection and Response (CDR)
Not enough data
Not enough data
Reviews
Reviewers' Company Size
CrowdStrike Falcon Cloud Security
CrowdStrike Falcon Cloud Security
Small-Business(50 or fewer emp.)
14.8%
Mid-Market(51-1000 emp.)
43.2%
Enterprise(> 1000 emp.)
42.0%
Cyberhaven
Cyberhaven
Small-Business(50 or fewer emp.)
11.1%
Mid-Market(51-1000 emp.)
27.8%
Enterprise(> 1000 emp.)
61.1%
Reviewers' Industry
CrowdStrike Falcon Cloud Security
CrowdStrike Falcon Cloud Security
Information Technology and Services
28.4%
Computer & Network Security
12.3%
Banking
7.4%
Logistics and Supply Chain
4.9%
Computer Software
4.9%
Other
42.0%
Cyberhaven
Cyberhaven
Financial Services
33.3%
Manufacturing
22.2%
Law Practice
11.1%
Venture Capital & Private Equity
5.6%
Marketing and Advertising
5.6%
Other
22.2%
Alternatives
CrowdStrike Falcon Cloud Security
CrowdStrike Falcon Cloud Security Alternatives
Wiz
Wiz
Add Wiz
Microsoft Defender for Cloud
Microsoft Defender for Cloud
Add Microsoft Defender for Cloud
Cortex Cloud
Cortex Cloud
Add Cortex Cloud
Orca Security
Orca Security
Add Orca Security
Cyberhaven
Cyberhaven Alternatives
BetterCloud
BetterCloud
Add BetterCloud
Egnyte
Egnyte
Add Egnyte
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Add Acronis Cyber Protect Cloud
Druva Data Security Cloud
Druva Data Security Cloud
Add Druva Data Security Cloud
Discussions
CrowdStrike Falcon Cloud Security
CrowdStrike Falcon Cloud Security Discussions
Monty the Mongoose crying
CrowdStrike Falcon Cloud Security has no discussions with answers
Cyberhaven
Cyberhaven Discussions
Monty the Mongoose crying
Cyberhaven has no discussions with answers