We performed a comparison between CrowdStrike Falcon and N-able EDR based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, SentinelOne, CrowdStrike and others in Endpoint Detection and Response (EDR)."Having all monitoring, response, tracking, and mitigation tools in one dashboard provides our analysts and SOC team with a comprehensive view at a glance."
"Ability to get forensics details and also memory exfiltration."
"The stability is very good."
"Fortinet FortiEDR made our clients feel secure and more at ease, knowing that they had an EDR solution that would close the gap in their security posture."
"The price is low and quite competitive with others."
"Fortinet is very user-friendly for customers."
"It is stable and scalable."
"Fortinet FortiEDR's scalability is quite good, and you can add licenses to the solution."
"The detection is very effective."
"We have seen a reduction to the performance hit to our operating systems."
"CrowdStrike Falcon has done an excellent job at detecting breaches. It has allowed us to stay in business and keep our systems up."
"We are now able to find the root cause analysis on any threat. We can figure out where the issue came in versus just dealing with where it is at the moment."
"The automatic alert feature is the most important feature of the solution."
"One of the most valuable features of CrowdStrike Falcon is when there are upgrades there are no additional fees."
"The most valuable features are the complete IPS and IDS."
"Enables us to understand what processes are running on the system, what registry keys have been enabled."
"The most valuable features are the rollback feature, it's important for us. The AI models and are good."
"We find the solution to be a bit expensive."
"Detections could be improved."
"To improve Fortinet, we need to see more features and technology areas at the endpoint level introduced."
"We've encountered challenges during API deployment, occasionally resulting in unstable environments."
"We've had a lot of false positives; things incorrectly flagged that require manual configuration to allow. Even worse, after we allow a legitimate program, it sometimes gets flagged again after an update. This has caused a lot of extra work for my team."
"FortiEDR can be improved by providing more detailed reporting."
"Making the portal mobile friendly would be helpful when I am out of office."
"The dashboard isn't easy to access and manage."
"CrowdStrike Falcon could improve by having an easier way to search and use the interface for extracting queries from the data. The interface could improve."
"I would like them to improve the correlation of data in the search algorithms. When we run an investigation, malware, phishing, etc., I want to look at multiple endpoints at once to correlate that data to see the likenesses, e.g., how are they not alike or what systems and processes are running across those systems? I don't want to have to run the same search in their Spotlight module five, 10, 15, or 100 times to get 100 different results, copy that data out, and then correlate it on my own. In a very simple way, I want to be able to load up a comma-delimited list giving me the spotlight data on these X amount of hosts, letting me search for it quickly. We have had to go back to CrowdStrike, and say, "Our search are taking far too long for even one host." They did bump up the cores and that did improve performance, but it is still kind of slow to get that Spotlight data. That is probably our biggest pain point. I think that needs some help. I understand this kind of information access is probably not the easiest thing to do. It is probably a big ask depending on how their back-end is setup."
"The management reporting functionality needs to be improved."
"CrowdStrike should provide better visibility in its reporting. There should be more forensic details about detected threats."
"In the future release of CrowdStrike Falcon, they should add a sandbox feature."
"The malware analysis could be improved, as that's what we use the solution for the most and that change would make it a better EDR tool."
"The detection time has room for improvement."
"The solution needs to have integration with on-premises security devices and security facilities. That means all the security products, including the perimeter firewall, the DMZ."
"We have a lot of false positives we see in the dashboard. I think this is the only problem we are facing."
Earn 20 points
CrowdStrike Falcon is ranked 3rd in Endpoint Detection and Response (EDR) with 107 reviews while N-able EDR is ranked 56th in Endpoint Detection and Response (EDR). CrowdStrike Falcon is rated 8.8, while N-able EDR is rated 0.0. The top reviewer of CrowdStrike Falcon writes "Easy to set up with good behavior-based analysis but needs a single-click recovery option". On the other hand, the top reviewer of N-able EDR writes "Stable, effective rollback feature, and useful AI models". CrowdStrike Falcon is most compared with Microsoft Defender XDR, Darktrace, Microsoft Defender for Endpoint, Trend Micro Deep Security and VMware Carbon Black Endpoint, whereas N-able EDR is most compared with SentinelOne Singularity Complete, Check Point Harmony Endpoint, Elastic Security, Cisco Secure Endpoint and ESET Inspect.
See our list of best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.