91制片厂

Latest 91制片厂


This content is currently locked.

Your current 91制片厂 subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
1-888-670-8889 (US/CAN) or
+1-703-340-1171 (International)
CrowdStrike Falcon Identity Protection Logo
CrowdStrike Falcon Identity Protection Logo
Crowdstrike

CrowdStrike Falcon Identity Protection

Composite Score
7.2 /10
CX Score
7.2 /10
Category
CrowdStrike Falcon Identity Protection
7.2 /10

What is CrowdStrike Falcon Identity Protection?

Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

CrowdStrike Falcon Identity Protection Ratings

Real user data aggregated to summarize the product performance and customer experience.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

82 Likeliness to Recommend

90 Plan to Renew

78 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+73 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love CrowdStrike Falcon Identity Protection?

0% Negative
10% Neutral
90% Positive

Pros

  • Enables Productivity
  • Efficient Service
  • Inspires Innovation
  • Includes Product Enhancements

Cons

  • Slower Product Innovation
  • Less Caring
  • Less Friendly Negotiation

Feature Ratings

Average 80

Time to value

90

Discover Human Identities

88

Discover Federated Identities

85

Suspicious activity

83

Authentication support

83

Policy Creation and Right Sizing

80

Discover Machine Identities

80

Forensics

80

TTP detection

78

ZSP support

75

Refactoring

75

Vendor Capability Ratings

Average 76

Ease of Customization

83

Business Value Created

83

Vendor Support

81

Ease of Data Integration

78

Availability and Quality of Training

75

Ease of IT Administration

75

Usability and Intuitiveness

75

Breadth of Features

75

Ease of Implementation

73

Product Strategy and Rate of Improvement

73

Quality of Features

70

CrowdStrike Falcon Identity Protection Reviews

Ben-Eze C.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted May 2025

CrowdStrike F.I.P: The Game Changer

Likeliness to Recommend

9 /10

What differentiates CrowdStrike Falcon Identity Protection from other similar products?

CrowdStrike Falcon Identity Protection stands out by integrating endpoint and identity telemetry鈥攗nlike siloed IAM tools. It detects credential-based attacks (like Pass-the-Hash) in real-time using behavioral analytics, not just rules. The lightweight agent (unlike bulky legacy solutions) won鈥檛 slow systems, and its threat graph correlates identity risks with endpoint activity. However, it lacks deep AD management features鈥攂est paired with CrowdStrike鈥檚 EDR for full coverage.

What is your favorite aspect of this product?

My favorite aspect is Falcon Identity鈥檚 real-time attack chaining鈥攊t doesn鈥檛 just flag suspicious logins, but shows exactly how attackers move from compromised credentials to endpoint exploitation. During our pen tests, it detected stealthy lateral movement (like RDP session hijacking) that SIEMs missed, with clear visual timelines. The lightweight agent (only 1-2% CPU usage) makes it viable for all endpoints, and the automated response actions (like forcing MFA re-auth) saved us hours of manual containment.

What do you dislike most about this product?

The most frustrating limitations are the lack of detailed forensic context within the Identity Protection console - you often need to switch to Falcon OverWatch or EDR for full attack chain analysis. The alert customization is too basic, lacking role-based thresholds (VIP users vs contractors), and cloud identity provider integrations (like Okta/Azure AD) only cover basic scenarios. During large-scale incidents, the UI becomes sluggish when loading 1000+ event timelines. For a premium product, the reporting feels outdated (static PDFs vs interactive dashboards), and the API rate limits complicate SIEM integrations.

What recommendations would you give to someone considering this product?

If you're considering CrowdStrike Falcon Identity Protection, first evaluate how well it fits your existing setup. It works best for companies already using CrowdStrike's EDR, as the integration between the two is seamless. Be prepared to spend time fine-tuning alerts to reduce false positives - we needed about two weeks to get them right. The product excels at detecting Windows Active Directory threats but has limited functionality for cloud identity providers like Okta. You'll need to use their API carefully due to rate limits when connecting to SIEM systems. This solution isn't the best choice if you need full IAM capabilities.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Erick B.

  • Role: Sales Marketing
  • Industry: Technology
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Jan 2025

Complete protection against any malicious program

Likeliness to Recommend

8 /10

What differentiates CrowdStrike Falcon Identity Protection from other similar products?

Since we have had the platform we discovered that its function is powerful and bold, it allows us to cover much more than what was previously in our hands, we automate the process since we can manage the security of all devices and work system from a single console. It makes it much easier to manage our protection and in case of incurring a malicious virus we have been impressed by its quick response, its accurate solutions and by eliminating the slightest trace. Although it can be complex to manage at first, once everything is configured it allows you to maintain an orderly security system and contributes to keeping any malicious entity away

What is your favorite aspect of this product?

CrowdStrike has great telemetry that consists of visibility of system activity, allowing a complete evaluation of all our devices, allowing us to do a complete analysis from one place. It has tools that contribute to the quarantine within various functions in case of malware, protecting each space from the first moment. It has great customer support which answers my questions at any time and solves any problem efficiently. Its integration process makes it much easier to implement a complementary security system, incorporating our entire work system to facilitate the security of these.

What do you dislike most about this product?

Some of the details that we do not understand in depth are its control panel, although it facilitates the fact of managing security on various devices, being able to handle this properly takes time and experience, since its control panel is not very simple, it is difficult to configure and customize for an appropriate implementation. Another feature is the reports, we would like these to be more detailed and with a greater number of specifications to evaluate the path of the damage, magnitude and remaining solutions. It may be more expensive than you would imagine, similar tools offer more affordable plans.

What recommendations would you give to someone considering this product?

Taking the time necessary to configure and customize the platform is essential so that over time it will be the ideal security tool for the work system, it is my best recommendation, to follow the training and ask for help from customer support, it will allow the entire team to recognize the great utility of the platform and to be able to take full advantage of its potential. It is a great platform with centralization of functions and with a high-quality protection and security function.

Pros

  • Performance Enhancing
  • Caring
  • Saves Time
  • Fair

Cons

  • Commodity Features
  • Less Generous
  • Less Friendly Negotiation
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171