We compared Tanium and CrowdStrike Falcon based on our user's reviews in several parameters.
Tanium and CrowdStrike Falcon offer robust endpoint security solutions with unique strengths. Tanium provides comprehensive visibility, strong security measures, and powerful analytics capabilities, while praised for its customer service but faces concerns over pricing and performance. On the other hand, CrowdStrike Falcon is commended for its threat detection, reliable protection, and seamless integration, with reasonable pricing and positive ROI, but users call for improvements in user interface, reporting, and integration options.
Features: Tanium's valuable features include comprehensive visibility into endpoints, effective security measures, efficient endpoint management, and powerful analytics. In comparison, CrowdStrike Falcon excels in robust threat detection, advanced machine learning technology, and proactive threat hunting capabilities.
Pricing and ROI: Tanium's setup cost is higher compared to other products in the market, requiring additional resources and time. Users find the licensing complex and require negotiation. On the other hand, CrowdStrike Falcon's setup cost is straightforward and hassle-free, requiring minimal effort. Users appreciate the flexible and customizable licensing options., Tanium's ROI is highlighted by improved efficiency, cost savings, and increased productivity through streamlined IT operations, enhanced security measures, and centralized management. Meanwhile, CrowdStrike Falcon delivers positive results with enhanced cybersecurity capabilities, cost savings, and increased productivity through real-time monitoring and user-friendly interface.
Room for Improvement: Tanium users have highlighted the need for better system performance, improved documentation, and more customization options. In comparison, users of CrowdStrike Falcon have suggested enhancing the user interface, reporting capabilities, integration options, and addressing detection issues and customer support efficiency.
Deployment and customer support: The user reviews show that the duration required to establish a new tech solution varies for both Tanium and CrowdStrike Falcon. Tanium users reported spending three months on deployment and an additional week on setup, while some CrowdStrike Falcon users mentioned needing a week for setup and deployment. It is important to carefully evaluate the context in which these terms are used to determine if they refer to the same period or should be evaluated separately., The customer service for Tanium product is highly praised by users, who appreciate the helpful and responsive assistance provided by the knowledgeable and professional support staff. On the other hand, users also found the customer service for CrowdStrike Falcon to be responsive, knowledgeable, and reliable.
The summary above is based on 60 interviews we conducted recently with Tanium and CrowdStrike Falcon users. To access the review's full transcripts, download our report.
"It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
"Forensics is a valuable feature of Fortinet FortiEDR."
"It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward."
"It is very easy to set up. I would rate my experience with the initial setup a ten out of ten, with ten being very easy to set up."
"Fortinet FortiEDR's firewalling, rule creation, monitoring, and inspection profiles are great."
"We have FortiEDR installed on all our systems. This protects them from any threats."
"Fortinet has helped free up around 20 percent of our staff's time to help us out."
"It is stable and scalable."
"Probably the most valuable thing to me is the real-time response piece. The fact that I can connect to an endpoint as long as it is on the Internet, no matter where it is globally. I can remove files from the endpoint, drop files on the endpoint, stop processes, reboot it, run custom scripts, and deploy software. Pretty much no other tool can do all that."
"The initial setup is very simple."
"Overall, what I found most valuable in CrowdStrike Falcon is its good mechanism. It also has a good reporting feature. CrowdStrike Falcon is an invaluable tool because, through it, you can take quick action, for example, when an OS is missing specific patches."
"I value the overall behavior analysis of CrowdStrike. The engine of this product is what drew us to this solution."
"The CrowdStrike Falcon agent is very lightweight. Users never complain about their PCs getting stuck and things like that."
"This solution has made the lives of the IT staff much easier, compared to the previous one."
"From what we have seen, it is very scalable. We have recently acquired a company where someone had a ransomware attack when we joined networks. Within the course of just a few days, we were able to easily get CrowdStrike rolled out to about 300 machines. That also included the removal of that company's legacy anti-malware tool."
"We have a small IT Team, and this allows us to get sleep at night, knowing that someone else is taking care of any incidents that occur."
"The most valuable features of this solution are the consolidation of all historical data on device endpoints, security drivers, firmware, and Software version gaps."
"Tanium's most valuable feature is its instant discovery aspect."
"The solution is scalable and helps to understand how infrastructure works. It helps to improve the health of the organization."
"The security features are very valuable."
"I like the fact that you can create patching campaigns depending on the area of your network that you want to address first. I like the ability it has to make several campaigns that work in parallel."
"The interrogation piece was the most valuable feature because it was very detailed."
"I would say Tanium is the best tool for vulnerability management."
"For incident response tasks, all these tasks can get done in minutes with minimal disruption to the end-user."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"The SIEM could be improved."
"The security should be strong for the cloud. Some applications are on-prem and some are on the cloud. Fortinet should also have strong security for the cloud. There should be more security for the cloud."
"The solution is not stable."
"Making the portal mobile friendly would be helpful when I am out of office."
"The dashboard isn't easy to access and manage."
"They can include the automation for the realtime updates. We have a network infrastructure with remote sites. Whenever they send updates, they are not automated. We have to go into the console and push those updates. I wish it was more automated. The update file is currently around 31 MB. It could be smaller."
"Detections could be improved."
"I think there's an opportunity to enhance the AI or at least the traps to say, if something changes from this baseline, let us know and flag it."
"The solution needs to have integration with on-premises security devices and security facilities. That means all the security products, including the perimeter firewall, the DMZ."
"In the future release of CrowdStrike Falcon, they should add a sandbox feature."
"I would like to see a little bit more in the offline scanning ability. This just comes from my background in what I have done in other positions. They only scan on demand, so I always have this fear that we sometimes maybe email out a dormant virus and can be held liable for that. That is something where I would like to see a little bit more robustness to the tool."
"We'd like to see more integration capabilities."
"We can't do scanning audits or device blocking or application control."
"They don't really have anything when it comes to scanning attachments."
"I would like to see equal support across all versions. Aside from that, I would say most of the features are there."
"The solution lacks mobility."
"Any movement into a SaaS solution has challenges since the processes and data flows are not well defined. Hence, you need to build it at the same time."
"The performance could improve in future releases. We have had performance issues in specialized web environments, but overall I think the problems are less than 2% of the computer systems being used."
"Tanium’s scalability could be improved."
"I would like to have more integrations and custom plugins to input. Integration is always a big deal in a lot of different environments."
"The reporting could be improved."
"It is not really additional functions, or the features that are needed, rather the complexity would be reduced based on the number of modules required to put together a comprehensive operational security and risk compliance model."
"We had some issues with the solution's OS upgrade."
CrowdStrike Falcon is ranked 3rd in Endpoint Detection and Response (EDR) with 105 reviews while Tanium is ranked 26th in Endpoint Detection and Response (EDR) with 15 reviews. CrowdStrike Falcon is rated 8.8, while Tanium is rated 7.4. The top reviewer of CrowdStrike Falcon writes "Easy to set up with good behavior-based analysis but needs a single-click recovery option". On the other hand, the top reviewer of Tanium writes "Useful tool for vulnerability management and deploying applications, needing improvement in its OS upgrade". CrowdStrike Falcon is most compared with Microsoft Defender XDR, Darktrace, Microsoft Defender for Endpoint, Trend Micro Deep Security and Cortex XDR by Palo Alto Networks, whereas Tanium is most compared with Microsoft Defender for Endpoint, Microsoft Configuration Manager, Qualys VMDR, ServiceNow Discovery and BigFix. See our CrowdStrike Falcon vs. Tanium report.
See our list of best Endpoint Detection and Response (EDR) vendors and best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.