TechValidate Research on CrowdStrike Cloud Security


CrowdStrike Case Study

Medium Enterprise Professional Services Company

Introduction

This case study of a medium enterprise professional services company is based on a January 2021 survey of CrowdStrike customers by TechValidate, a 3rd-party research service. The profiled company asked to have its name blinded to protect its confidentiality.

“Comprehensive, cutting-edge product with real client engagement and support.”

“Actionable business intelligence”

“Rapid deployment to meet a tight compliance deadline, significantly better visibility of vulnerabilities across the fleet.”

Challenges

Facing the following challenges that will lead to change or enhance their security posture in the future:

  • Complex deployment processes
  • Inadequate security

Used the following endpoint security providers prior to switching to CrowdStrike:

  • TrendMicro

Industry Feedback

Agrees with the following when making digital transformation decisions:

  • Removing manual processes and replacing with more automated workflows is critical to digital transformation
  • Aligning people, process, and technology is critical to making their organization more efficient and effective
  • An essential pillar of digital transformation efforts is driving innovation to meet the evolving needs of the business

Important requirements in the decision-making process when considering cloud security solutions:

  • Meeting and maintaining compliance and enforcing security policies across multi-cloud environments
  • Reducing the time to remediate and eliminate security risks
  • Reducing IT management and configuration overhead

Results

Values the following about CrowdStike:

  • Operationality – it just works
  • Seamless end-user experience (no reboots, no reimaging, etc.)
  • Cloud Native endpoint and cloud workload protection
  • Security from anywhere and everywhere
  • Ability to secure their technology, teams, and clients globally, 24/7/365

Rates CrowdStrike’s cost for value as better compared to other solutions they have used:





About This Data

This data was sourced directly from verified users of CrowdStrike Cloud Security by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on CrowdStrike Cloud Security