
The response time and the information of exploits that are wildely hunted in the cyberspace. The endpoint solution is sufficient enough to get us the idea about what to do, when to do. It reduces our manual workload and improve simplicity. Review collected by and hosted on G2.com.
Sometime the cloud workload dashboard does not work, maybe CrowdStrike can work on giving more uptimes in crucial times. Few times, the threat graph lacks some recent updates that happened in minute time. Review collected by and hosted on G2.com.
Our network of Icons are G2 members who are recognized for their outstanding contributions and commitment to helping others through their expertise.
At G2, we prefer fresh reviews and we like to follow up with reviewers. They may not have updated their review text, but have updated their review.
Validated through a business email account
This reviewer was offered a nominal gift card as thank you for completing this review.
Invitation from G2. This reviewer was offered a nominal gift card as thank you for completing this review.


