Compare CrowdStrike Falcon Endpoint Protection Platform and Wazuh - The Open Source Security Platform

At a Glance
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Star Rating
(385)4.7 out of 5
Market Segments
Enterprise (48.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial
Free Trial is available
Browse all 4 pricing plans
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform
Star Rating
(65)4.5 out of 5
Market Segments
Small-Business (49.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Wazuh - The Open Source Security Platform
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that CrowdStrike Falcon excels in ease of use, with many users appreciating its unobtrusive operation. One user noted that it runs quietly in the background without noticeably slowing down their system, which enhances their overall experience.
  • Users say that Wazuh offers a strong advantage in cost-effectiveness, being an open-source platform that does not incur any licensing fees. Reviewers highlighted its ability to identify outdated patches and vulnerabilities without any financial investment.
  • According to verified reviews, CrowdStrike Falcon stands out for its real-time threat detection capabilities, leveraging AI and machine learning. Users have praised its strong visibility across all endpoints and its quick response to threats from a single cloud-based console.
  • Reviewers mention that Wazuh is particularly effective for users who need customization, as it allows for easy creation of rules and decoders for custom logs. This flexibility is appreciated by those who require tailored security solutions in their environments.
  • G2 reviewers highlight that CrowdStrike Falcon has a significantly higher overall satisfaction score, reflecting its robust support and product direction. Users have noted that it feels like a reliable partner in business, with high marks for its quality of support and ongoing product improvements.
  • Users report that while Wazuh is effective for small businesses, it may face challenges in scalability compared to CrowdStrike Falcon, which is designed to handle enterprise-level demands. This difference is crucial for organizations looking to grow and require a solution that can scale with them.
Pricing
Entry-Level Pricing
CrowdStrike Falcon Endpoint Protection Platform
Falcon Pro
Free Trial
Browse all 4 pricing plans
Wazuh - The Open Source Security Platform
No pricing available
Free Trial
CrowdStrike Falcon Endpoint Protection Platform
Free Trial is available
Wazuh - The Open Source Security Platform
No trial information available
Ratings
Meets Requirements
9.3
280
8.8
48
Ease of Use
9.0
285
8.6
48
Ease of Setup
9.2
243
8.0
29
Ease of Admin
9.0
215
8.6
28
Quality of Support
8.9
275
8.2
46
Has the product been a good partner in doing business?
9.2
213
8.5
23
Product Direction (% positive)
9.7
260
9.0
46
Features by Category
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
9.1
126
Not enough data
Administration
9.2
79
Not enough data
8.4
75
Not enough data
8.8
79
Not enough data
9.0
81
Not enough data
8.8
84
Not enough data
Functionality
9.4
86
Not enough data
8.5
78
Not enough data
9.4
94
Not enough data
9.6
110
Not enough data
Analysis
9.2
91
Not enough data
9.0
88
Not enough data
9.3
94
Not enough data
ServiceNow Store AppsHide 6 FeaturesShow 6 Features
9.3
23
Not enough data
ServiceNow Apps
8.9
14
Not enough data
9.1
13
Not enough data
Agentic AI - ServiceNow Store Apps
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
9.3
75
Not enough data
Detection & Response
9.3
55
Not enough data
9.3
56
Not enough data
9.4
54
Not enough data
9.7
62
Not enough data
Management
9.0
55
Not enough data
8.8
53
Not enough data
9.1
57
Not enough data
Analytics
9.4
57
Not enough data
9.3
61
Not enough data
9.3
57
Not enough data
Agentic AI - Extended Detection and Response (XDR) Platforms
9.3
10
Not enough data
9.2
11
Not enough data
9.4
11
Not enough data
Services - Extended Detection and Response (XDR)
9.8
11
Not enough data
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
9.3
24
Not enough data
Monitoring
9.5
22
Not enough data
9.7
23
Not enough data
8.7
21
Not enough data
9.0
23
Not enough data
9.2
22
Not enough data
Remediation
9.3
23
Not enough data
9.5
22
Not enough data
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
9.0
23
Not enough data
Platform Features
9.5
20
Not enough data
8.8
18
Not enough data
9.1
18
Not enough data
9.0
17
Not enough data
9.5
19
Not enough data
7.6
17
Not enough data
Not enough data
Not enough data
Automation Capabilities
9.2
17
Not enough data
9.0
18
Not enough data
Not enough data
Not enough data
8.3
37
Not enough data
Generative AI
8.3
33
Not enough data
8.3
33
Not enough data
Endpoint ManagementHide 1 FeatureShow 1 Feature
8.1
24
Not enough data
Generative AI
8.1
24
Not enough data
User and Entity Behavior Analytics (UEBA)Hide 11 FeaturesShow 11 Features
8.8
13
Not enough data
Agentic AI - User and Entity Behavior Analytics (UEBA)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
9.0
10
Not enough data
8.8
10
Not enough data
8.5
9
Not enough data
8.5
9
Not enough data
Detection
8.9
9
Not enough data
8.9
9
Not enough data
9.3
9
Not enough data
Not enough data
Not enough data
Agentic AI - AWS Marketplace
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
9.1
26
Not enough data
Services - Endpoint Detection & Response (EDR)
9.1
25
Not enough data
8.8
101
Not enough data
Orchestration
9.0
70
Not enough data
8.9
70
Not enough data
9.2
78
Not enough data
8.8
69
Not enough data
Information
9.3
79
Not enough data
9.5
87
Not enough data
9.3
78
Not enough data
Personalization
9.4
81
Not enough data
9.4
79
Not enough data
8.8
68
Not enough data
Generative AI
7.8
26
Not enough data
9.0
7
Not enough data
9.0
7
Not enough data
9.2
8
Not enough data
Agentic AI - Threat Intelligence
7.7
14
Not enough data
7.6
13
Not enough data
8.1
13
Not enough data
7.8
13
Not enough data
Not enough data
8.0
27
Response
Not enough data
7.9
24
Not enough data
7.9
23
Not enough data
7.8
22
Not enough data
8.5
25
Records
Not enough data
9.1
25
Not enough data
8.2
25
Not enough data
7.9
22
Management
Not enough data
8.8
24
Not enough data
7.9
21
Not enough data
7.9
21
Generative AI
Not enough data
7.0
10
Not enough data
6.7
10
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Information and Event Management (SIEM)Hide 14 FeaturesShow 14 Features
9.1
21
Not enough data
Network Management
9.4
17
Not enough data
8.4
15
Not enough data
8.6
16
Not enough data
Incident Management
9.4
18
Not enough data
9.5
19
Not enough data
9.2
15
Not enough data
Security Intelligence
9.6
16
Not enough data
8.7
15
Not enough data
9.2
16
Not enough data
9.0
15
Not enough data
Agentic AI - Security Information and Event Management (SIEM)
9.4
9
Not enough data
8.5
10
Not enough data
9.3
9
Not enough data
8.5
9
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform
CrowdStrike Falcon Endpoint Protection Platform and Wazuh - The Open Source Security Platform are categorized as Endpoint Detection & Response (EDR)
Reviews
Reviewers' Company Size
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Small-Business(50 or fewer emp.)
10.9%
Mid-Market(51-1000 emp.)
41.1%
Enterprise(> 1000 emp.)
48.0%
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform
Small-Business(50 or fewer emp.)
49.2%
Mid-Market(51-1000 emp.)
36.5%
Enterprise(> 1000 emp.)
14.3%
Reviewers' Industry
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Information Technology and Services
18.6%
Computer & Network Security
10.9%
Financial Services
8.3%
Computer Software
4.9%
Hospital & Health Care
4.9%
Other
52.4%
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform
Information Technology and Services
38.1%
Computer & Network Security
19.0%
Computer Software
11.1%
Security and Investigations
4.8%
Hospital & Health Care
4.8%
Other
22.2%
Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform Alternatives
Cynet
Cynet
Add Cynet
ThreatDown
ThreatDown
Add ThreatDown
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
SentinelOne Singularity Endpoint
SentinelOne Singularity...
Add SentinelOne Singularity Endpoint
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform Alternatives
Datadog
Datadog
Add Datadog
SentinelOne Singularity Endpoint
SentinelOne Singularity...
Add SentinelOne Singularity Endpoint
CrowdSec
CrowdSec
Add CrowdSec
Carbon Black EDR
Carbon Black EDR
Add Carbon Black EDR
Discussions
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform Discussions
How to uninstall the CS sensor remotely from any host?
2 Comments
Bryan B.
BB
This can be done via RTR if enabled or via deploying CS's uninstall tool through GPO, or whatever other deployment package manager you are using.Read more
Crowd strike have UBA??
1 Comment
Bryan B.
BB
No it does not.Read more
How do people see Firewall logs in Crowdstrike . Is it Possible to view Firewall logs or requires a separated application to pull those into CS console.
1 Comment
Bryan B.
BB
You can see firewall changes and rule modifications under the event_SimpleNames "FirewallChangeOption" and "FirewallSetRule". CrowdStrike's Firewall license...Read more
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform Discussions
What is Wazuh - The Open Source Security Platform used for?
1 Comment
Nikhil D.
ND
We use wazuh in Amazon AWS to monitor virtual machines and cloud instances. Apart from it it can be used for endpoint security, we just need to install an...Read more
Monty the Mongoose crying
Wazuh - The Open Source Security Platform has no more discussions with answers