TechValidate Research on CrowdStrike Cloud Security


CrowdStrike Cloud Security Case Study

Repligen

Introduction

This case study of Repligen Corporation is based on a May 2022 survey of CrowdStrike Cloud Security customers by TechValidate, a 3rd-party research service.

“Since implementation, CrowdStrike has freed up my team from having to perform the initial triage of any potential vulnerabilities. Having CrowdStrike be our first line of defense as been immeasurable.”

Challenges

Biggest cloud application security challenges for their organization:

  • Meeting prescribed best practices for the configuration of cloud-resident workloads and services

Top purchasing drivers for buying CrowdStrike Cloud Security with Containers:

  • To consolidate security tools

Vendors evaluated before they chose CrowdStrike:

  • Replaced Sophos and Red Cloak

Use Case

Public cloud infrastructure service providers (IaaS and/or PaaS) their organization currently uses:

  • AWS
  • Azure

Primary reasons for selecting CrowdStrike:

  • Exploit and malware detection and prevention

Results

The surveyed company achieved the following results with CrowdStrike Falcon Cloud Security with Containers:

  • How they rated the capabilities of CrowdStrike Falcon compared to the competition:
    • Performance: Significantly Better
    • Ease of Use: Significantly Better
    • Reliability: Significantly Better
    • Scalability: Significantly Better
    • Breach Prevention: Significantly Better
  • Operational benefits realized following the deployment of CrowdStrike:
    • Improved data protection of critical information
    • Met regulatory compliance standards
  • In your best estimate, by what percent did CrowdStrike improve the following?
    • Reduced Complexity via Single Platform: 100%
    • Reduced Time to Deploy Workload Protection: 75-99%
    • Accelerated Detection and Remediation of Vulnerabilities in CI/CD Pipeline: 100%
    • Accelerated Application Development Cycles: 100%




About This Data

This data was sourced directly from verified users of CrowdStrike Cloud Security by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on CrowdStrike Cloud Security