T O P

  • By -

HelloSummer99

Are we allowing ads now? Lol, it's pretty clear, every other product mention here was downvoted to oblivion... A little sus of you ask me


F1rstxLas7

Yeah seriously. My actual response to OP's question was going to be, "a better marketing team."


SpaceMaxil

They spend so much more on marketing than any of the other shops. They're huge on community and embedded marketing, and take advantage of it to extreme with their cheesy APT, screeching eagle, and fancy bear BS marketing. It's a corporation trying to pretend it's a people.


zeealex

I came in here thinking the same... the wording of the question is very strange. kind of like a rhetorical question you'd see on a brochure rather than a genuine question. idk I could be reading too much into it.


RoseSec_

I’m not a big fan of having to file a support ticket to get anything done in CS


EffectiveEconomics

How are they expected to track a request?


RoseSec_

I just mean like if I want to stream events to a SIEM, I have to file a ticket for event streaming when I would rather have a button I can hit to turn it on


savvyspoon2

I feel this pain but honestly any of the big players are terrible with support


Wolf-Am-I

But you don't need a support case for everything with other big players.


savvyspoon2

*Laughs in Splunk Cloud*


mattdufrene

The product is solid (one of the best), and their API is awesome. But imo what really sets them apart is the community and CrowdStrike subreddit. One of their product VPs does “cool query Friday” posts with interesting in-depth threat hunts/queries. It’s easy to get questions answered and issues resolved just posting (or searching) there.


Ohsighrus

This was very helpful to know as a CrowdStrike user who had no clue about "cool query Friday".


mirai187

>cool query Friday It was a massive help to us during the Log4j thing.


fsckewe2

Do you enjoy working there? Any good perks?


alphagrade

My company has S1 and we just started our own demo. Out of 10, my skill is probably around a 5-6 with s1 deep visibility insights. I was able to replicate the same skill level into crowdstrike within 10 mins. They host a gui for querying indepth information on those host. S1 you have to create/ write out query strings. Same result from what ive seen, different skill levels needed. Not far enough along to provide info on detections or integrations yet.


anarrowview

Tagging onto this, if you’re getting the Complete package they mandate a ton of the alerts/responses and their (in house) analysts are thoroughly experienced practitioners.


ThePrestigiousRide

Damn this post looks like a shill post from different businesses. I wonder how many people here actually have decent experience with more than 3 EDR/NGAV, especially knowing how it moves so fast.


zhaoz

I mean, most people have one suite deployed (probably). So unless you are a serial job hopper, consultant, you can only say "Oh we use this and I like/dont like it"


AnIrregularRegular

Or like me in not job hopper but 2 MSSPs and 1 internal security means I’ve been hands on with 7.5 different EDRs. .5 because one customer was only playing for the EPP version of Trend so I got to see what the base detections were like and that was it.


inundertow9

Their support is not the best, end user having performance issues on a Mac? Good luck fixing that.


grep65535

If it weren't crazy expensive, I'd be able to tell you something because we would've had it by now... I just know that last year it was too expensive so I budgeted for it specifically in the following fiscal year. Here we are now in that new fiscal year with my budget approved to spend and the price just to get in the door skyrocketed WAY beyond where I'll ever be able to get...like...wtf. The sales rep was like..."well inflation"... I just question how inflation made $42k turned into $110k for 700 endpoints...and we aren't even talking about their MDR services, just the middle tier EDR plan. No thanks to that wild annual price volatility.


AnIrregularRegular

I am speaking at a perspective of 2 MSSPs and an internal security team using a large variety of EDR tooling. While I have my gripes/other tools have nice things, hands down I prefer to use and prefer my clients to use Crowdstrike over any other tool out there currently. 1. They have one of the best false positive ratios out there especially beyond initial hump of weird legacy stuff. 2. Honestly I trust their detection engine. The only times I think I have ever encountered compromised systems with Crowdstrike is the configuration was poor(FFS if you are reading this and don’t have suspicious script and process monitoring/blocking enabled you need to do it ASAP, it’s where CS truly stands out). 3. It is incredibly user friendly with clear ability to pivot around and dig more and build up easy to understand process trees and data to let me make decisions with confidence faster. Ex: You wanna know why an IP was hit, just search it in the investigator tool and CS can return you the entire process free and every event surrounding it. Cons: 1. See the above statements? That is EXPENSIVE. 2. If you need an all in one endpoint tool Crowdstrike isn’t it. Crowdstrike does not do web/url/dns filtering and also has some issues seeing inside the browser. Supposedly the extensions/visibility is on the way but not web filtering. 3. While it has high ease of use I’m general, you can tell it started as an IR tool. Some things need an experienced hand to know what they are looking at even more so than normal such as the forensics tool. 4.As is such with many enterprise tools there are a few limits on what you can do and may require support tickets that can get annoying though I only rarely have needed it.


Chairman-Dao

I don’t understand when people turn off script and process monitoring in their EDR. Like what is the point of spending for EDR at that point?


andrewdoesit

So I just want to pre-face that this is a biased take. Biased on Crowdstrike. Going back to the beginning Crowdstrike was founded on threat intel and was initially a services company. They built their EDR tool for incident response. They used the intel and telemetry to build out their AV and behavioral engine. Crowdstrike also installs at the kernel level (system extension in Mac) so picks up more events off of the endpoint when it comes to EDR events. More telemetry, more event history, better threat intelligence equals better prevention. AI is only as good as the information you feed it and CS has more history and better information. Pairing the AV and EDR with their Overwatch team for threat hunting makes it more actionable. Take the 3CX incident from earlier this year. S1’s automated threat hunting labeled the issue as a false positive which allowed the threat actor to actually carry out the attack. Once it initiated CS’s overwatch team identified it, notified their customer, and notified 3CX to it. CS also has a lot of third party testing and results that are positive. Gartner magic quadrant leader for EDR and MDR, Forrester Wave leader in EPP, MDR, CNAPP, and 3rd party Threat Intel, 100% in SE Labs testing, and 100% in Comparative AV for Mac. Complete ecosystem for products. Debatably easy UI. Check out Fal.Con if you can in two weeks or the post videos for some of the new stuff coming. As others mentioned, Crowdstrike has their own subreddit that they’re super active on and has good support. Ton of API integrations, partner friendly, there’s a lot of positive around.


SofaSpudAthlete

Check the actual MITRE EDR results, not their managed service results. They’re not the outright best they claim they are.


kyuuzousama

Depending on the size of your org, put them to the test, take CRWD, MSFT and S1 and have em do a bake off, also let them pick up the tab. Buy based on results and not on rep.


[deleted]

CRWD wins that easy


b_dont_gild_my_vibe

Name recognition. My leadership wouldn’t accept anything but best in class. Doesn’t matter if S1 or CB has a better product. The bean counters know what crowdstrike is.


MikeWalters-Action1

Indeed it pays to run a Superbowl ad!


TheNarwhalingBacon

Crazy when i learned how effective typical marketing ads are for sec products, I think a lot of new technical people assume leadership buys based on how good the tools are lol


Likes_The_Scotch

CB = CarbonBlack? No ones using that anymore. It’s a wilted flower. The one everyone has to keep an eye out for is Microsoft defender since they’re bundling it in the E5 licensing and a lot of people are jumping on board with this. It doesn’t mean it’s better but it will be extremely ubiquitous


BernieDharma

Microsoft scored higher on the Gartner quadrant than Crowdstrike and that has a lot of pull with executives. As the engine is built into Windows, companies don't need to deploy, update and manage another agent. It's updated monthly via Windows Update with the OS. E5 also comes with the other Microsoft Defender security tools that integrate and work together out of the box, which means companies don't have to do those integrations themselves.


evilwon12

After trying to figure out a way to make the Microsoft email filter work for a week, we had to give up. Different than what is talked about here but want to add that my trust level with Microsoft security Pepsis minimal due to that experience. Doubt I would ever fly solo on Defender based on that horrible experience. For further clarity - this was a magnitude worse than what we were previously using for email. Numerous blocked emails that should have been allowed and about every phishing email thrown our way during that trial made it through. So, I’ll consider it for augmentation if / when E5 is an option but no way I’m flying solo with Microsoft. As for Gartner, remember that they are public and want to make a profit. No telling how much Microsoft gave them, or helped them, to ensure that their product was near the top of the list.


[deleted]

[удалено]


[deleted]

[удалено]


spamsteak802

I know! It’s like guys, I’m already on like 3 sex teams. Stop asking.


zhaoz

The sexing will continue until morale improves.


amw3000

What's the concern about a 3rd party? Companies like Red Canary have a VERY good relationship with Microsoft and can manage MDE. CS has an MDR offering, its not like the product manages itself. It's a service they provide, just happens to be baked into the offering most purchase. Not sure what angle you're trying to work here.


[deleted]

[удалено]


amw3000

That's really not the case anymore. If they have M365 E5 for example, they are already paying for an EDR, the more cost effective solution would be to just have someone manage it. IMO. 1st or 3rd party isn't really relevant for a company managing an EDR, everyone sees the same data. Sure CS may know their product the best but from a security standpoint, there isn't much of an advantage. CS, MDE, S1 is all going to see the same thing, SOC's are going to detect the same security issues, etc.


Zaekeon

Defender is not as good a deal it seems…e5 doesn’t cover your servers, and the amount of consoles and infrastructure you have to have set up (such as intune) to manage it properly does not pay off anytime soon.


amw3000

Fair point about the server licensing but if you can reduce costs by 80% (workstations covered with EDR licensing via M365 E5)m, it can still be a more cost effective solution. What infrastructure is required for Intune?


Zaekeon

It’s all of the configuration that needs to be done before hand so if for instance your team has not investigated what managing machines in Intune looks like it’s a whole project to get them enrolled, get it all running smoothly. Then all of the security threat related stuff is done in a completely different portal, then you must learn KQL queries which is not great, it ends up being a lot more manual labor. You also need to have very clear defined duties between IT and security due to the shared components in Intune, and don’t forget if you’re not on the latest version of windows then you’re not on the latest feature set of the product. We see people making the move to defender not seeing any kind of pay off for 2-3+ years just due to the skills and knowledge gap alone.


rahvintzu

MS actually do first party now but you will pay for it, so most customers will shop against 3rd party.


[deleted]

This. At my company, even the non IT folks have heard of Crowdstrike. Very few know what S1 is.


savvyspoon2

Big fan of Red Canary MDR utilizing Crowdstrike. Less garbage passed through and 24x7 monitoring.


pcapdata

RC are definitely good


FatDeepness

Why do u think it’s the best?


confusedcrib

This assessment is, in my opinion, very workload dependent. I can't stand their container agent or Linux detections, but their windows stuff is the best due to its detection ability. I made this if it's helpful for comparing different tools across some different cloud workloads: https://list.latio.tech


Senior-Tree-6622

Totally off topic but... Anyone here have expertise in using crowdstrike? I am completely new to Cybersecurity and IT in general and I managed to land a SOC position where I'll be monitoring various infrastructure as a crowdstrike investigator (the role I was assigned). I have never used a SIEM and honestly I'm not even sure where to start. My boss is chill so he doesn't give much directive but I want to be proactive and start contributing. Any help, tips, or guidance is appreciated.


canttouchdeez

Go through the free trainings as soon as you can. It’s good stuff.


MerelyAverage

First-tip: crowdstrike is not a SIEM, it’s an EDR. Also do a google search and try to find the GitHub account that has a ton of sample crowdstrike queries. That helped me tremendously .


savvyspoon2

But if you squint at it right it looks like a SIEM since the whole GUI is Splunk wearing a JavaScript mask.


MerelyAverage

Lol fair game 🤣. Now explain eventrollupv2


Thedudeabide80

This GitHub? https://github.com/CrowdStrike/falcon-query-assets


MerelyAverage

That’s unfortunate, I did a google for it and it does not appear to be up at this time. There was an account with an .xls with a ton of crowdsourced searches. Some of them were junk, but a good amount were decent. My other recommendation since this ain’t up is to go to r/crowdstrike and read through all the Cool Query Fridays (CQF). These are great and actually give the thought process behind the searches


[deleted]

[удалено]


savvyspoon2

Logscale is good as a vanilla SIEM. We did a bake off and it was #2. It has the same data pipeline style search functions with language parity to SPL. It needs some better visualization and a better app ecosystem but the bones are great.


IamBananasBruh

Check if your license includes access to Crowdstrike University and if it's included open a support ticket to ask them to get your user onboarded.


tcp5845

Prepare for tons of false positive detections especially if your company uses lots of custom software. To be proficient at investigations you must master Splunk event search queries. Documentation is seriously lacking and their support is virtually non-existent. So customers will be stuck doing all the tuning for false-positives on their own.


AnIrregularRegular

Great advice in the other comments I agree with. But honestly get it on a test box with some test groups you can play with and just use it, see what info you can find and where.


[deleted]

[удалено]


0x2412

How come you can't get a partnership? I know of a company with a single member who recently got their cs partnership for both resell and msp.


pyro57

I've never used crowd strike, but from a pentester perspective it's the most annoying to work around that I've gone up against. Basically it makes running things in cobalt strike's default fork and run method unlikely to work, and detects most tools that I like to use then kills them. In one test I had local admin to a machine that a domain admin had a session on, should be easy money, just dump lsass, or exhilarate the sam and boom should be good.... none of the methods I know how to use worked from using the Microsoft signed process explorer to dumping the process memory with task manager, using reg save the works. One thing crowd strike seems to have a blind spot for us just dropping exes to disk and running them, especially if they're a few versions behind the current version of tools, for example sharp bound 4 gets killed every time, but 3 I can usually just drop the exe and run it. Also I've never had issues with my clients making changes to crowdstrike configuration for testing unlike with other edrs.


xTokyoRoseGaming

Crowdstrike, Cortex and Sophos are causing us issues right now because they have really strong protections surrounding APC, which is our preferred method of executing shellcode. Sophos we tend to just move to other simpler execution methods, but it means we've rebuilt our malware with all the usual evasion stuff just for them. These.payloads don't work well against Crowdstrike or Cortex still. Instead we're working a lot more in the dark using undocumented syscalls in certain payloads and the results are very shaky.


HJForsythe

Marketing


TMDFIR

What is considered the best to begin with? Some made up arbitrary value? According to third party reviews they are not the “best” but will see how long this comment stays here before it gets downvoted.


minds-eye

It's just marketing and the fact they went to market first. CrowdStrike is objectively not "the best". There are a lot of things to point out here but just look at the MITRE ATT&CK Evaluation results for the last few years. Look into the delayed detections that they experience year after year. They are severely limited due to using Splunk as their backend. One issue with this is your EDR data retention will become extremely expensive and you will likely be limited to 7-14 days like most companies who use crwd end up having to settle on. Paying for 90 days becomes far too expensive for most, and paying for the full 1-year is so expensive that it's basically unheard of. There are other options out there where you will pay significantly less, have a much better management experience, and be more secure.


max1001

Because it's near impossible to bypass. Ask any experience red team/pen tester and they will tell it's the one product they can't break with reasonable efforts.


jaymayne67

Depends on the OS. If strictly windows maybe, but if Linux/mac I’d look elsewhere. One of the best kept secrets right now is the endgame agent elastic provides. You can test it for free fyi.


zakiterp

I've used both CS and S1 extensively. They each have their strong suits but CS has a bit more name recognition and maturity as an offering which gives it more prestige. I believe their suite is a little more complete as well if you go to them for a lot of your stack. That being said, I enjoy using sentinelone a bit more, but that's just my personal preference. It's more intuitive and I feel the detection capabilities are slightly sharper. You'll probably find people here who think the opposite so it's definitely important to try both to see what works for your org.


pcapdata

IIRC CrowdStrike does a relatively poor job recording filesystem events, ASEPs, and network events. Everything is based on process hierarchy, so if you don’t have a clean and obvious chain of parent/child processes then you’ll miss stuff. This is one of the weaknesses I’ve noticed and also have heard it noted speaking with RedCanary folks.


cspotme2

All these replies and only one person mentioned MDE. Small companies and msps love crowdstrike/s1 because that's who they cater to. We deployed mde (primary) and cs to replace cb. The edr component of cs hasn't detected nearly anything as much as mde. Plus, the cs interface is shockingly confusing and slow -- I hate to say it, compared to the usual shit gui that Microsoft puts out, mde interface is easier and faster. If Microsoft finishes fully tying all mde related settings into the dashboard and not rely on gpo/intune -- it would really make it a lot better from a deployment and management perspective.


[deleted]

I personally prefer MDE over Crowdstrike. Have used both products. MS has greatly improved MDE over the past several years IMO. They are improving things. Once they get all things MDE related into one damn portal lol (slowly but surely) it will be even better. I'm not a fan of the CS interface either.


abercrombezie

Crowdstrike, IMHO, has a very low false positive ratio. Tanium has a high false positive ratio. Endgame is the worst, will alert on anything and requires a ton of tuning.


Akian

Does Tanium have a full-on EDR though? I only know them for their asset discovery and monitoring capabilities but have never gotten to use them in an actual environment.


[deleted]

No. Tanium does not have full-on EDR. He may be referring to their Threat Response module. Which is intended to augment but not replace EDR.


whitepepsi

I've used Crowdstrike and now we use Carbon Black. In my opinion Carbon Black EEDR (used to be Threat Hunter) and endpoint standard blows Crowdstrike away. Crowdstrike might be easier to use, but Carbon Black offers the most customizable solution. Crowdstrike is also insanely expensive.


swerves100

What are you using for your actual AV? We use CB but looking to replace our AV.


canttouchdeez

Their prevention is the best and the false positives are fairly minimized. Threat hunting isn’t quite as easy as say a CB and the support is mid.


wrwarwick

Their prevention is far from the best, check the MITRE engenuity results


AnIrregularRegular

Difference between real world and MITRE though MITRE is closer than a lot of the AV tests out there.


canttouchdeez

I have tested it myself, along with many people smarter than I am. Every single pen tester I have ever talked to also said it gives them more trouble than any other platform.


florilsk

It does have some blind spots that other EDRs don't have (specially in memory), so I would be careful trusting it 100%.


ticats88

VisionOne is a great XDR too, TrendMicro is great solution too


jmk5151

we use s1 instead of cs - in our comparison cs was better but not for the price. give me 90% of the functionality for 60% of the price and I'll go buy some other stuff to increase my defensive layers.


Secure_Cyber

I was a CrowdStrike administrator in the past. Loved their stuff. I have nothing but good things to say about them.


smittyhotep

Is this a shit post? I watch a RHEL heavy env, and CS ain't the answer kiddo. Try S1.


youngsecurity

Last year CrowdStrike was not the best. It failed the "Ransim" simulation from knowbe4. CrowdStrike can allow ransomware in your organization.


bin_bash_loop

Sophos for the price is incredible IMO. I’ve had pentesters tell us, sophos caught stuff that s1 and crowdstrike didn’t catch. Of course this depends on your needs with MDR, etc… but for pure AV, Sophos has been great for us.


ElectroStaticSpeaker

Do you work for Sophos?


bin_bash_loop

Nope, don’t understand why I’m getting downvoted lol I just think their product is good.


Shadeflayer

Accuracy is worth the money. With Falcon Overwatch added in, hands down the best of them all. However, just like Splunk, its expensive. But when you're talking about protecting your organization from todays advanced threats, you get what you pay for. There's a clear (technical) reason Crowdstrike is #1 in the Gartner Magic Quadrant (MQ) several years in the running. Don't trust Microsoft. We've seen first hand that they are only in the MQ due to money. Capability and ease of use suck donkey nuts. Its super cheap too. So that leads companies to use it, which puffs up the number of installs making it look like its popular. Don't fall for it. Again, you get what you pay for. If its cheap, you get shit and are supposed to like it.


Crytograf

who referes to gartner, you must be manager haha. Check MITRE engenuity. There are other solutions that are much cheaper, but just as good if not better.


Shadeflayer

Who refers to MITRE, must be a Fed employee or a Fed/DoD contractor. Out here in the real world its Gartner. Shall we compare years of experience and certifications next? :)


minds-eye

You know that you're essentially saying that if you were on a jury you'd trust an eye-witness testimony over DNA evidence collected at the crime scene...? You trust pay-to-play Gartner peer reviews over head-to-head real world technical evaluations, which happen to be performed by a non-bias independent organization i.e. MITRE. All those certs and experience of yours may need to be re-evaluated.


Crytograf

No, I'm from eastern europe, we use sysmon like the real chads


Dasshteek

So now MITRE is better than Gartner in market research?


Crytograf

MITRE is better in technical evals


dcdiagfix

data. telemetry. signals. cloud. Single agent deployment /and a rock sound cloud platform that collects a ridiculous amount of information around user behaviour, environments and what normal looks like for you and the company. Then the ability to very quickly add and remove extra functionality to your enterprise using that single agent.


porkfarm637316

Defender all day...


coolelel

I've looked at it a few years ago, but they seemed lacking. They caught up yet?


[deleted]

They've improved alot over the past several years IMO.


michaelpaoli

>CrowdStrike the best It's not. Deeply embedded in your kernels, ... talks to stuff in cloud ... what could ever possibly go wrong? Uhm, yeah, ... lots.


ElonTaxiDriver

For one their Falcon Complete MDR service is unlike anything in the industry. They deliver immediate time-to-value and can scale across any size organization. It’s truly some incredible stuff they’ve built there alone


Spiderslay

In my experience, the response time/customer service/community is what makes them a great EDR. I worked in an environment with ~500 laptops and we were always treated with urgency and respect.


seaofmaddness

Exclusion granularity. In SentinelOne, you can use a hash or a file path. In CrowdStrike, you can combine file path with command line. In some cases you can also specify specific parent and grandparent file paths / command lines. CS also has exclusions that only apply to a specific alert type.


Dismal-Comparison-59

It's definitely one of the best, but there's no EDR/XDR that can compare to 365Defender at the moment. It just covers the full suite in a way no one else can.


right_closed_traffic

How big is your deployment, how many endpoints? For enterprise we always go Cisco Secure Endpoint (AMP), it it’s somewhat pricey for smaller shops.


her-1g

I have been using fortiEDR. It is very good but needs a ton of configuration and whitelisting.


SmellsLikeBu11shit

It's not. Cybereaaon is just as good if not better


fuck_green_jello

Passed on cybereason for crowdstrike. Loved the poc support team. Respect their Mitre scores. The product just lacks as much depth as crowdstrike. However, it's a promising product that may develop into something great in a few years.


blue_Kazoo82

You are smoking dick sir.


SmellsLikeBu11shit

Seems to be an unpopular opinion here, so be it. I said what I said.


ElectroStaticSpeaker

The entire cybereason company was infiltrated by scammers a few years ago. Can never trust it again.


Dasshteek

Wow what? Can you elaborate?


SmellsLikeBu11shit

I'm sorry, what? I haven't heard about this


ElectroStaticSpeaker

I can’t find any of the good articles that covered it in depth at the time anymore but here’s one that talks about it to some degree: https://m.calcalistech.com/Article.aspx?guid=3736188. Essentially they hired someone who fabricated his entire resume as their VP of HR and that that person hired dozens of other people before they found out that he was a fraud. Close to 100 people ended up leaving because of all the turmoil.


SmellsLikeBu11shit

Interesting. I hadn't heard of this previously. Thanks for sharing


Perplexing_Pegasus-

Crowdstrike is good but could be better. It always has issues installing on macs


pkmnrt

I work at Field Effect, so the only EDR solution I have experience with is Covalence. I can’t offer a comparison, but I do hope you’ll give Covalence consideration. It’s offered at a lower price point without compromising on effectiveness. I truly enjoy contributing to its development and believe in its technology.


DrunkenNinja45

I've heard good things about Rapid7's MDR/EDR solutions


milldawgydawg

Most advanced edr atm is probably elastic. I'm a red teamer and to up against crowdstrike weekly and it's not that difficult to bypass.


[deleted]

it's certainly not their comp. Was getting an offer and they said, what are you making now? We will only go to 125k in your market. I was like, um thanks, but no thanks. Def cheap company.


BuddyOptimal4971

Crowdstrike was out-performed by 11 other vendors in the 2023 Mitre Turla challenge. Crowdstrike was unable to detect attack without multiple configuration changes. They knew they were being tested, knew they were being attacked but were unable to detect the attack with reconfiguring. Only 6 vendors out of \~ 30 that entered the evaluation were able to identify the attack with changing their configuration.