Crowdstrike
0 comparisons available
About Crowdstrike
CrowdStrike is a cloud-native cybersecurity platform founded by George Kurtz, Dmitri Alperovitch, and Gregg Marston in 2011, headquartered in Austin, Texas, and publicly traded (NASDAQ: CRWD). CrowdStrike Falcon is a unified security platform delivered through a single lightweight agent, providing endpoint detection and response (EDR), next-gen antivirus (NGAV), threat intelligence, identity protection, cloud security posture management (CSPM), and XDR (Extended Detection and Response) from one cloud-native console. The Threat Graph — CrowdStrike's massive cloud database — processes 3+ trillion events per week from millions of endpoints globally, enabling AI-driven threat detection that identifies novel malware and adversary tactics (TTPs) not seen before. CrowdStrike is the leader in EDR/XDR and is credited with major incident investigations: the 2016 DNC hack attribution to Russian intelligence (Fancy Bear/APT28), the Sony Pictures breach, and numerous other nation-state attack investigations. CrowdStrike became widely known in July 2024 when a faulty content update to the Falcon sensor caused a global IT outage affecting 8.5 million Windows devices — one of the largest IT outages in history. Despite this, CrowdStrike maintains dominant market share in enterprise endpoint security. CrowdStrike serves 29,000+ customers in 170 countries. Pricing: Falcon Go from $59.99/device/year, Falcon Pro $99.99/device/year, Falcon Enterprise $184.99/device/year.
Frequently Asked Questions
What caused the CrowdStrike outage in July 2024?
On July 19, 2024, CrowdStrike pushed a content configuration update (Channel File 291) to its Falcon sensor on Windows systems. The update contained a logic error that caused Windows systems to enter a boot loop (Blue Screen of Death) upon loading the faulty file. Because the Falcon agent runs at kernel level with high system privileges, the error prevented Windows from starting, requiring manual intervention — booting into Safe Mode and deleting the problematic file. Approximately 8.5 million Windows devices were affected globally, disrupting airlines (Delta, United, American), hospitals, banks, broadcasters, and emergency services. The outage demonstrated the systemic risk of widely-deployed endpoint security agents with kernel access and highlighted the need for staged rollout testing for content updates.
CrowdStrike vs SentinelOne: which is better?
Both are top-tier EDR/XDR platforms. CrowdStrike is stronger in threat intelligence depth (Threat Graph, OverWatch threat hunting team, nation-state attribution experience) and has the larger customer base and integration ecosystem. CrowdStrike's cloud-first model means detections benefit from cross-customer threat intelligence. SentinelOne's key differentiator is autonomous response — its AI makes real-time containment decisions on-device without requiring cloud connectivity, which benefits air-gapped environments and reduces response time. SentinelOne also pioneered automated rollback (restoring encrypted files after ransomware without human intervention). For large enterprises prioritizing threat intelligence and hunting, CrowdStrike. For autonomous response and air-gapped environments, SentinelOne.
How much does CrowdStrike Falcon cost?
CrowdStrike pricing is per endpoint per year: Falcon Go (basic AV replacement) ~$59.99/device/year, Falcon Pro (NGAV + EDR) ~$99.99/device/year, Falcon Enterprise (EDR + threat hunting + USB control) ~$184.99/device/year. Premium bundles (Falcon Elite, Complete) add identity protection, cloud security, and 24/7 managed detection for $200–400+/device/year. Enterprise contracts with volume discounts can significantly reduce per-device pricing. A 500-device organization on Falcon Pro would pay ~$50,000/year. CrowdStrike offers a 15-day free trial of Falcon Go. CrowdStrike Complete (MDR — managed service) hands off threat investigation and response to CrowdStrike's OverWatch team for organizations without dedicated SOC staff.
Top Alternatives to Crowdstrike
SentinelOne
Autonomous AI response without cloud dependency — fully on-agent detection
Microsoft Defender
Included with Microsoft 365 E5 — zero additional cost for Microsoft shops
Carbon Black
VMware-owned EDR with strong behavioral analytics and threat hunting
Palo Alto Cortex XDR
Tighter integration with Palo Alto network security for unified visibility
Sophos Intercept X
SMB-friendly pricing with strong ransomware rollback capabilities
Bitdefender GravityZone
European-headquartered with strong privacy compliance and competitive pricing
No comparisons found for Crowdstrike yet.
Search for a comparison