TechValidate Research on CrowdStrike

29 Charts


CrowdStrike Customer Research

What are the primary reasons you selected CrowdStrike?

Single unified platform for on-prem and cloud infrastructure
64%
Ability to provide continuous visibility across cloud resources regardless of the cloud
48%
Allows for automation of security controls via integration with existing DevOps tools
19%
Exploit and malware detection and prevention
86%
Deployment flexibility (i.e., offered as a cloud-delivered service, a customer-managed, on-premises implementation, etc.)
40%
Other
5%

CrowdStrike Customer Research

What are the primary reasons you selected CrowdStrike?

Exploit and malware detection and prevention
86%
Single unified platform for on-prem and cloud infrastructure
64%
Ability to provide continuous visibility across cloud resources regardless of the cloud
48%
Deployment flexibility (i.e., offered as a cloud-delivered service, a customer-managed, on-premises implementation, etc.)
40%
Allows for automation of security controls via integration with existing DevOps tools
19%

CrowdStrike Customer Research

Approximately how many unique public cloud infrastructure service providers (IaaS and/or PaaS) does your organization currently use?

AWS
80%
Azure
71%
Google Cloud
32%
Oracle
2%
Other
7%

CrowdStrike Customer Research

Approximately how many unique public cloud infrastructure service providers (IaaS and/or PaaS) does your organization currently use?

AWS
85%
Azure
76%
Google Cloud
37%
Oracle
4%
Other
5%

CrowdStrike Customer Research

Approximately how many unique public cloud infrastructure service providers (IaaS and/or PaaS) does your organization currently use?

AWS
85%
Azure
76%
Google Cloud
37%
Oracle
4%
Other
5%

CrowdStrike Customer Research

What types of operational benefits did your organization realize following the deployment of CrowdStrike?

Improved data protection of critical information
83%
Met regulatory compliance standards
52%
Delivered faster performance
35%
Improved the efficiency of app deployment
19%
Improved application quality
8%

CrowdStrike Customer Research

Which of the following represents the biggest cloud application security challenges for your organization?

Maintaining security consistency across our own data center and public cloud environments where our cloud-native applications are deployed
53%
Use of multiple cybersecurity controls increases cost and complexity
49%
Meeting prescribed best practices for the configuration of cloud-resident workloads and services
45%
Lack of visibility into public cloud infrastructure hosting our cloud-native applications
44%
Our application development and DevOps teams do not involve our cybersecurity team due to fear of being slowed down
40%
Lack of understanding of the threat model for our cloud-native applications and infrastructure
39%

CrowdStrike Customer Research

What was the reason for your purchase?

To meet an existing security challenge (e.g. whitelisting, SIEM, NDR, etc)
60%
To address a compelling business need (e.g. audits, compliance/regulatory, digital transformation needs)
43%
To enhance workflows and streamline processes (e.g. using Slack to notify, etc)
33%
To help make more informed decisions (RiskIQ, VirusTotal, Horizon, etc)
22%

CrowdStrike Customer Research

Which of the following types of product(s) did you try through the CrowdStrike Store?

CrowdStrike Application (e.g. Falcon Discover, Falcon Spotlight)
85%
Partner Application (e.g. Extrahop, Illumio, Rapid7)
33%
Workflow Plugin (e.g. Slack, PagerDuty)
16%
Context Enrichment (e.g. RiskIQ, DomainTools, VirusTotal, OPSWAT, CyberSixGill)
18%

CrowdStrike Customer Research

How did you learn about the CrowdStrike Store?

Discovered using the Falcon management console
55%
CrowdStrike representative told me about it
47%
Release Notes and Tech Alerts
24%
During a webinar
16%
Marketing communications from CrowdStrike
13%
Online search (e.g Press release, website, blog)
11%
Referred by a CrowdStrike Store partner
9%

CrowdStrike Customer Research

How did you learn about the CrowdStrike Store?

CrowdStrike representative told me about it
75%
Discovered using the Falcon management console
25%
Referred by a CrowdStrike Store partner
13%
Online search (e.g Press release, website, blog)
6%
During a webinar
6%
Marketing communications from CrowdStrike
6%

CrowdStrike Customer Research

Will you try other Apps in the CrowdStrike Store?

Yes: 66%
No: 0%
Maybe: 34%

CrowdStrike Customer Research

How did you learn about the CrowdStrike Store?

CrowdStrike representative told me about it
51%
Discovered using the Falcon management console
50%
Release Notes and Tech Alerts
20%
During a webinar
14%
Marketing communications from CrowdStrike
12%
Online search (e.g Press release, website, blog)
10%
Referred by a CrowdStrike Store partner
10%

CrowdStrike Customer Research

What influenced your decision to purchase through the Store?

Easy to setup and use
60%
Could see the benefit immediately
47%
Positive trial experience
47%
Easy to convert from trial to purchase
33%
Strong engagement with CrowdStrike
27%
Strong engagement with the Partner team
13%
Met my budget requirements
7%

CrowdStrike Customer Research

What are your Zero Trust success metrics?

Reduce security complexity
90%
Improve MTTD/R for security teams
67%
Enhance user experience
52%
Eliminate unplanned downtime
29%
Improve ROI (reduce costs)
29%

CrowdStrike Customer Research

Which of the following influenced your current CrowdStrike product purchase(s)?

Cloud-delivered security
95%
Alert fidelity
60%
Frictionless deployment
50%
API integrations with existing tools
30%
CrowdStrike partner ecosystem
30%

CrowdStrike Customer Research

What factors play, or played, a key role in choosing your Zero Trust solution?

Ease of deployment/less friction (for IT and security teams)
76%
Ease of use/less friction (for end users and security analysts)
71%
Security coverage (including legacy/proprietary systems and tools)
71%
Scalability
62%

CrowdStrike Customer Research

Please rate the importance of the following Zero Trust security areas for your business to address in 2021:

Very Important Moderately Important Neutral Somewhat Important Not At All Important
Endpoints (managed and unmanaged)

76%

19%

0%

0%

5%

Identities (human, service, multi-directory)

47%

48%

0%

5%

0%

Workloads (on-prem and cloud workloads)

38%

57%

0%

5%

0%

Containers

35%

45%

5%

10%

5%

CrowdStrike Customer Research

Please rate the importance of the following Zero Trust security areas for your business to address in 2021:

Very Important Moderately Important Neutral Somewhat Important Not At All Important

Endpoints (managed and unmanaged)
Identities (human, service, multi-directory)
Workloads (on-prem and cloud workloads)
Containers

CrowdStrike Customer Research

Please rate how concerned you are about the following cyber threats?

Not Concerned At All Mildly Concerned Neutral Moderately Concerned Very Concerned
Supply chain threats

0%

4%

10%

48%

38%

Active directory hygiene/vulnerabilities

0%

0%

10%

38%

52%

Fileless malware

0%

5%

0%

43%

52%

Ransomware

0%

5%

0%

14%

81%

CrowdStrike Customer Research

Please rate how concerned you are about the following cyber threats?

Not Concerned At All Mildly Concerned Neutral Moderately Concerned Very Concerned

Supply chain threats
Active directory hygiene/vulnerabilities
Fileless malware
Ransomware

CrowdStrike Customer Research

What factors play, or played, a key role in choosing your Zero Trust solution?

Ease of deployment/less friction (for IT and security teams)
76%
Ease of use/less friction (for end users and security analysts)
71%
Security coverage (including legacy/proprietary systems and tools)
71%
Scalability
62%

CrowdStrike Customer Research

Please rate how important the following statements are in your Zero Trust decision making process.

Very Important Moderately Important Neutral Mildly Important Not At All Important

Understanding behavioral data to pinpoint deviations and malicious activity
Limiting the attack surface with segmentation and least privileges
Automating security tied to context to improve the fidelity of alerts and incident response
Continuously verifying access with the least friction for users, IT, and security teams
Attack path visibility across endpoints, identity stores, workloads, and container environments

CrowdStrike Customer Research

Please rate how important the following statements are in your Zero Trust decision making process.

Very Important Moderately Important Neutral Mildly Important Not At All Important
Understanding behavioral data to pinpoint deviations and malicious activity

71%

19%

5%

5%

0%

Limiting the attack surface with segmentation and least privileges

90%

5%

0%

0%

5%

Automating security tied to context to improve the fidelity of alerts and incident response

25%

65%

5%

5%

0%

Continuously verifying access with the least friction for users, IT, and security teams

66%

24%

10%

0%

0%

Attack path visibility across endpoints, identity stores, workloads, and container environments

45%

40%

10%

5%

0%

CrowdStrike Customer Research

Which Zero Trust security framework are you adopting, or considering adopting?

We haven't decided yet: 50%
NIST 800-207: 35%
Gartner CARTA: 10%
Forrester ZTX: 5%

CrowdStrike Customer Research

Which of the following Zero Trust security companies did you evaluate or are currently evaluating?

CrowdStrike
81%
Okta
67%
Microsoft
62%
Palo Alto Networks
62%
Cisco
38%
Illumio
38%
Forcepoint
14%
Guardicore
10%
Blackberry
0%
Unisys
0%

CrowdStrike Customer Research

Where are you in your Zero Trust journey?

Currently in the planning phase: 57%
Currently implementing Zero Trust: 33%
Currently on hold: 0%
Other: 10%

CrowdStrike Customer Research

Where are you in your Zero Trust journey?

Currently on hold: 0%
Currently implementing Zero Trust: 33%
Currently in the planning phase: 57%
Other: 10%

CrowdStrike Customer Research

Which of the following statements do you agree with when making digital transformation decisions?

ROI and overall value to the business are always top of mind.
67%
Removing manual processes and replacing with more automated workflows is critical to digital transformation.
62%
Aligning people, process, and technology is critical to making our organization more efficient and effective.
52%
An essential pillar of digital transformation efforts is driving innovation to meet the evolving needs of the business.
43%
A cornerstone of digital transformation is the ability to substantially improve security for your technology services, team members, and clients globally, 24/7/365.
33%
When evaluating changes to your current solutions and providers, it must solve for minimal impact to the business and require the least disruption as possible.
24%
Before you pull the trigger on a major digital transformation initiative, you need to transform your security first.
10%



More Research on CrowdStrike