G2 reviewers report that CrowdStrike Falcon Endpoint Protection Platform excels in real-time threat detection, leveraging AI and machine learning to provide strong visibility across all endpoints. Users appreciate its unobtrusive operation, noting that it runs quietly in the background without slowing down their systems.
Users say that CyberArk Workforce Identity shines in its intuitive design and ease of implementation. Recent feedback highlights that the platform significantly speeds up user access review processes, making it a favorite for organizations looking to streamline compliance tasks.
Reviewers mention that CrowdStrike's platform is highly scalable, making it suitable for both servers and endpoints. This flexibility is particularly beneficial for larger enterprises, as it allows for comprehensive protection across diverse environments.
According to verified reviews, CyberArk Workforce Identity is praised for its focus on access reviews, with users noting that it effectively meets their specific needs without trying to be a catch-all solution. This specialization has garnered positive feedback for its straightforward approach.
G2 reviewers highlight that while both products have strong support, CrowdStrike Falcon's support is slightly less favored, with users rating it as good but not exceptional. In contrast, CyberArk's support is noted for being responsive and helpful, particularly during the implementation phase.
Users report that CrowdStrike Falcon's ease of use is a standout feature, with a high rating for its user-friendly interface. In comparison, while CyberArk is also user-friendly, some users have mentioned minor configuration challenges that could impact the overall experience.
Pricing
Entry-Level Pricing
CrowdStrike Falcon Endpoint Protection Platform
Falcon Pro
Free Trial
Provides superior protection from cyber attacks, detects malicious activity, and offers immediate response capabilities for your business.
How to uninstall the CS sensor remotely from any host?
2 Comments
BB
This can be done via RTR if enabled or via deploying CS's uninstall tool through GPO, or whatever other deployment package manager you are using.Read more
How does Falcon prevent work?
1 Comment
EO
Falcon's approach to endpoint protection is centered around prevention. It uses a combination of machine learning, behavioral analysis, and threat...Read more
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.
Your software and services insights are valuable.
Your peers come to G2 to get an inside look at and other business solutions. Adding perspective on will help others pick the right solution based on real user experience.