Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

Falcon Endpoint Protection


CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.

Work for Falcon Endpoint Protection?

Learning about Falcon Endpoint Protection?

We can help you find the solution that fits you best.

Falcon Endpoint Protection Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • For Category
  • Industry
Company Size
User Role
For Category
Showing 2 Falcon Endpoint Protection reviews
LinkedIn Connections
Falcon Endpoint Protection review by Michel A.
Michel A.
Validated Reviewer
Review Source

"Fly to the safety of Falcon Endpoint Protection"

What do you like best?

The low system consumption, it is almost imperceptible compared to similar tools, its system would follow with the high performance.

Its low and competitive price is also an interesting factor.

What do you dislike?

I would like the Falcon firewall to be more customizable, at times it could disrupt and block actions that should not be blocked and this could be avoided if some firewall settings were available for personalization.

What business problems are you solving with the product? What benefits have you realized?

Falcon Endpoint Protection has been used on all workstations in our company to provide us with protection against viruses and spyware, as well as providing antiphishing protection. It provides protection on the local workstation, occupying a very small area, so that it does not affect the system resources so that it can maintain its high performance. It was also helpful in helping to block the inputs to external drives (especially USB drives) by preventing any company information or advancement of promotional material from being taken out of the work environment.

Sign in to G2 to see what your connections have to say about Falcon Endpoint Protection
Falcon Endpoint Protection review by Administrator
Validated Reviewer
Verified Current User
Review Source

"Most usable of the next gen solutions, imo."

What do you like best?

The agent is very lightweight and covers all operating systems. The UX does not require a high level of expertise to figure out what is going on. And, with Spotlight you don't really have to worry about vulnerabilities anymore.

What do you dislike?

The dashboard graphs can be confusing, especially regarding agent counts. The MAC installer is not work reliably due to changes implemented by Apple (Mojave and higher).

What business problems are you solving with the product? What benefits have you realized?

protecting workstation performance while still protecting the device, and detecting CVEs without expensive scanning.

What Endpoint Detection & Response (EDR) solution do you use?

Thanks for letting us know!

There are not enough reviews of Falcon Endpoint Protection for G2 to provide buying insight. Below are some alternatives with more reviews:

Webroot Endpoint Protection Logo
Webroot Endpoint Protection
Webroot SecureAnywhere Business Endpoint Protection offers a revolutionary approach to malware protection.
FortiClient Logo
Fortinet is a leader in network security appliance solutions and provides real-time network protection to more than 125,000 customers worldwide.
CB Defense (on the PSC) Logo
CB Defense (on the PSC)
CB Defense (on the PSC) is a next-generation anti-virus solution for desktops, laptops, and servers that protects computers from the full spectrum of modern cyber attacks, delivering the best endpoint protection with the least amount of work.
SentinelOne Endpoint Protection Platform Logo
SentinelOne Endpoint Protection Platform
Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, rapidly eliminates threats with a fully-automated incident response protocol, and adapts defenses against the most advanced cyber attacks.
FireEye Endpoint Security Logo
FireEye Endpoint Security
FireEye Endpoint Security (HX series) products provide organizations with the ability to continuously monitor endpoints for advanced malware and indicators of compromise that routinely bypass signature-based and defense-in-depth security systems.
Tanium Logo
An enterprise solution that allows you to query and modify your managed computer assets in seconds, regardless of the size of your network.
Comodo Endpoint Security Manager Logo
Comodo Endpoint Security Manager
Endpoint security management is all about adequately securing such endpoints and thereby securing a network by blocking access attempts and such risky activities at endpoints.
Cybereason Endpoint Detection and Response  Platform Logo
Cybereason Endpoint Detection and Response Platform
Cybereason automatically detects malicious activity and presents it in an intuitive way. It deploys easily with minimal organizational impact and provides end-to-end context of an attack campaign. Most organizations deploy Cybereason and start detecting attacks within 24 to 48 hours.
Symantec Endpoint Detection and Response (EDR) Logo
Symantec Endpoint Detection and Response (EDR)
Detect, isolate, and eliminate intrusions across all endpoints using AI, automated incident generation, and unparalleled threat intelligence.
EnCase Endpoint Security Logo
EnCase Endpoint Security
EnCase Endpoint Security combines two industry-leading products, EnCase Analytics and EnCase Cybersecurity, to detect, validate and prioritize unknown threats, assess the scope and impact of a compromise, and return devices to a trusted state.
Show more
Kate from G2

Learning about Falcon Endpoint Protection?

I can help.
* We monitor all Falcon Endpoint Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.