We performed a comparison between CrowdStrike Falcon Complete and Field Effect MDR based on real PeerSpot user reviews.
Find out in this report how the two Managed Detection and Response (MDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The speed at which their services are reactive is valuable. Nowadays, when a threat hits an endpoint, you've got minutes, not hours or days. Their average response time is about four minutes on an alert. For anything that needs to be sent to us, it's about fourteen minutes, which is pretty good. They're the third SOC that I've used in fifteen years. By far, they are the quickest ones to act. When you're looking at prevention, that's a key factor."
"With Binary Defense, we don't just get an alert, but also a detailed rundown of why they're alerting us on it. They tell us what was executed, or the username, script, or IP. That way, we're not wasting time investigating."
"One of the main benefits of Binary Defense MDR is the ability to easily meet with their support team to discuss any issues we encounter."
"The customization has been the most valuable aspect and was really the reason we ended up selecting Binary Defense. They worked with us to provide exactly the level of support, features, response, and collaboration we needed."
"The most valuable features are the SIEM and the ticketing function; the latter is very smooth and easy to read and understand. We don't have any issues looking at the ticketing information when we're trying to identify what's going on."
"The best part about Binary Defense MDR is that it runs on everything, and they keep an eye on things 24/7."
"The case interface is Binary Defense MDR's most valuable feature."
"Binary Defense has a human service department that provides live monitoring for our systems."
"I would recommend Falcon Complete for anyone looking for a cheaper alternative that's almost the same quality as Cortex."
"The most valuable feature of CrowdStrike Falcon Complete is the lightweight design, easily manageable portal, and minimal IT maintenance required."
"CrowdStrike Falcon Complete's most valuable features are efficient dashboards and their ease of management."
"What's most valuable about CrowdStrike Falcon Complete as an endpoint security solution is that it provides different features against malware outbreaks. The solution is also cloud-based so it offers flexibility in terms of managing it. It's also easy to deploy the agent and you can deploy it through CrowdStrike, your CloudStrike console, or you can take that agent out and you can use different solutions to deploy it through your group policy, your SSCM, or any asset management tool."
"It is a stable solution."
"Technical support is helpful."
"The AI and the group knowledge base that they get from having multiple clients in the cloud is very useful to us."
"The features I have found valuable are artificial intelligence, which protects us against malicious forces of any kind, and device control through the remote execution tool."
"It is easy to manage surveillance."
"There are user notifications about our cloud solutions and access, meaning authentication and possible breaches. Overall, the notifications and alerts are valuable. There are also new features like the DNS protection, which is quite good."
"We now have a single cybersecurity product that protects all of our threat services, and all the endpoints."
"The most valuable features are Action Recommendations of Observations, which keep us informed about existing vulnerabilities so we can proactively update our endpoints and those of our customers against potential threats."
"Covalence's cloud protection element has been excellent. A lot of organizations are using 365. It's hard to find a secure solution for protecting accounts. We've gone down the path of trying to utilize other security solutions for that particular area. We've been disappointed and always come back to trying to implement Covalence when we can so we know people are safe."
"It provides valuable insights into our IT environment, enabling us to improve reselling, upgrades, and customer management."
"The AROs have been incredibly helpful."
"It is very user-friendly. We have regular reports to see what is going on."
"The current reporting system could benefit from improvement."
"We found a couple of bugs in the user interface."
"I would like to see more frequent check-ins with our security status."
"It's hard to think of anything that they need to improve on, but just to point out something, I would like to see them provide advanced XDR."
"Binary Defense MDR could be even better with additional features, like automatic scans and file quarantine."
"We found that an earlier version of the agent had high memory usage and that was a bit concerning, but we raised the concern with their support team and they immediately replied that they had noticed the same thing and had a candidate fix already available... it totally fixed the issue."
"We should be able to isolate devices faster. They should shorten the time between clicking on a device to contain it and carrying out the action. That would be a welcome improvement."
"The most significant area for improvement is in support for non-English speakers; we're a global organization, so many of our users are not English speakers, which can make interacting with them a challenge. There's no Chinese language support, so we must rely on what we can do with the internet. We don't expect Binary Defense to build a language staff, but details can get lost in translation when we assume the whole world speaks English."
"The support from CrowdStrike Falcon Complete is very fast. The support could improve if it was in the French language."
"The downside is that if you are using a device offline, not connected to the internet, you will potentially have exposure."
"The downside that we see with CrowdStrike is that it is not part of a broader ecosystem. It is an endpoint product. They don't sell firewalls or a broader cybersecurity ecosystem. Some of the behavioral detections could be more robust. It does a good job of stopping common tools and techniques, but when it comes to using Windows utilities, such as PowerShell, etc, it doesn't stop them. These are some of the things where we have been able to get past it. An argument there can be that these are administrative tools, not malware, so maybe it is not its job to stop it, but we see some of the competitive products doing a very good job of detecting behaviors as opposed to malware."
"The training provided could be better. There is a need to have more training to allow us to fine-tune our settings. Not that training is not comprehensive; they do provide training in hotels where we can go and see videos and other helpful information. However, they should be providing hands-on experience to the system administrators because this would be more useful. The training is normally for corporations and should be available for personal users as well."
"CrowdStrike Falcon Complete could improve by having advanced features, such as SOC, and HDR. There would have been a lot of processes involved."
"It has a lot of false positives, which can be an issue, but you can verify these false positives."
"What could be improved in CrowdStrike Falcon Complete is the threat hunting feature and the insights it provides, in particular, the variable analysis feature. Protection against zero-day threats and sandboxing could also be improved in CrowdStrike Falcon Complete. If you compare it with other solutions, it can go head-to-head, but the features I mentioned still need improvement."
"It would be nice to have full-scale ESR reporting."
"I would like Covalence to implement patch management as well."
"Covalence should provide a live view of the endpoint because the endpoint view in the portal is 5 to 15 minutes behind the actual status of the endpoint and its vulnerabilities. When it doesn't update with the actual status, it makes managing those things harder because sometimes something gets updated, and one of those vulnerabilities has gone away, but that doesn't appear in the ARO."
"I'd love the price to be a little bit less."
"There are tags for security threats, but I only view them. I do not action anything. I just see what is happening. Sometimes, they are a little bit vague, and I am unsure what they mean, so I leave that to the IT experts. Overall, we are quite satisfied with their product and how it is working."
"It would be more effective if it could surgically isolate the specific malicious process instead of deleting the entire machine."
"It would be incredibly valuable to have the Field Effect team handle some of the third-party application patching they're currently identifying."
"While Covalence addresses our notification and visibility needs, it falls short in keeping information up-to-date, which is where our MSP comes in to supplement its functionality."
"In the "Arrows" tab, if we encounter multiple duplicate recommendations, it would be helpful to be able to select and resolve or dismiss them all at once."
CrowdStrike Falcon Complete is ranked 1st in Managed Detection and Response (MDR) with 75 reviews while Field Effect MDR is ranked 6th in Managed Detection and Response (MDR) with 22 reviews. CrowdStrike Falcon Complete is rated 8.6, while Field Effect MDR is rated 9.2. The top reviewer of CrowdStrike Falcon Complete writes "Great next-generation antivirus with breach warranty and good intrusion protection". On the other hand, the top reviewer of Field Effect MDR writes "Helps to manage cybersecurity vulnerabilities, and improve our security team's efficiency and security posture ". CrowdStrike Falcon Complete is most compared with Arctic Wolf Managed Detection and Response, Blackpoint Cyber MDR, Secureworks Taegis ManagedXDR, Sophos MDR and Rapid7 MDR, whereas Field Effect MDR is most compared with SentinelOne Vigilance, Huntress, Arctic Wolf Managed Detection and Response, Microsoft Defender Experts for Hunting and Bitdefender MDR. See our CrowdStrike Falcon Complete vs. Field Effect MDR report.
See our list of best Managed Detection and Response (MDR) vendors.
We monitor all Managed Detection and Response (MDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.