TechValidate Research on CrowdStrike

18 Charts


CrowdStrike Customer Research

Will you try other Apps in the CrowdStrike Store?

Yes: 66%
No: 0%
Maybe: 34%

CrowdStrike Customer Research

How did you learn about the CrowdStrike Store?

CrowdStrike representative told me about it
51%
Discovered using the Falcon management console
50%
Release Notes and Tech Alerts
20%
During a webinar
14%
Marketing communications from CrowdStrike
12%
Online search (e.g Press release, website, blog)
10%
Referred by a CrowdStrike Store partner
10%

CrowdStrike Customer Research

What influenced your decision to purchase through the Store?

Easy to setup and use
60%
Could see the benefit immediately
47%
Positive trial experience
47%
Easy to convert from trial to purchase
33%
Strong engagement with CrowdStrike
27%
Strong engagement with the Partner team
13%
Met my budget requirements
7%

CrowdStrike Customer Research

What are your Zero Trust success metrics?

Reduce security complexity
90%
Improve MTTD/R for security teams
67%
Enhance user experience
52%
Eliminate unplanned downtime
29%
Improve ROI (reduce costs)
29%

CrowdStrike Customer Research

Which of the following influenced your current CrowdStrike product purchase(s)?

Cloud-delivered security
95%
Alert fidelity
60%
Frictionless deployment
50%
API integrations with existing tools
30%
CrowdStrike partner ecosystem
30%

CrowdStrike Customer Research

What factors play, or played, a key role in choosing your Zero Trust solution?

Ease of deployment/less friction (for IT and security teams)
76%
Ease of use/less friction (for end users and security analysts)
71%
Security coverage (including legacy/proprietary systems and tools)
71%
Scalability
62%

CrowdStrike Customer Research

Please rate the importance of the following Zero Trust security areas for your business to address in 2021:

Very Important Moderately Important Neutral Somewhat Important Not At All Important
Endpoints (managed and unmanaged)

76%

19%

0%

0%

5%

Identities (human, service, multi-directory)

47%

48%

0%

5%

0%

Workloads (on-prem and cloud workloads)

38%

57%

0%

5%

0%

Containers

35%

45%

5%

10%

5%

CrowdStrike Customer Research

Please rate the importance of the following Zero Trust security areas for your business to address in 2021:

Very Important Moderately Important Neutral Somewhat Important Not At All Important

Endpoints (managed and unmanaged)
Identities (human, service, multi-directory)
Workloads (on-prem and cloud workloads)
Containers

CrowdStrike Customer Research

Please rate how concerned you are about the following cyber threats?

Not Concerned At All Mildly Concerned Neutral Moderately Concerned Very Concerned
Supply chain threats

0%

4%

10%

48%

38%

Active directory hygiene/vulnerabilities

0%

0%

10%

38%

52%

Fileless malware

0%

5%

0%

43%

52%

Ransomware

0%

5%

0%

14%

81%

CrowdStrike Customer Research

Please rate how concerned you are about the following cyber threats?

Not Concerned At All Mildly Concerned Neutral Moderately Concerned Very Concerned

Supply chain threats
Active directory hygiene/vulnerabilities
Fileless malware
Ransomware

CrowdStrike Customer Research

What factors play, or played, a key role in choosing your Zero Trust solution?

Ease of deployment/less friction (for IT and security teams)
76%
Ease of use/less friction (for end users and security analysts)
71%
Security coverage (including legacy/proprietary systems and tools)
71%
Scalability
62%

CrowdStrike Customer Research

Please rate how important the following statements are in your Zero Trust decision making process.

Very Important Moderately Important Neutral Mildly Important Not At All Important

Understanding behavioral data to pinpoint deviations and malicious activity
Limiting the attack surface with segmentation and least privileges
Automating security tied to context to improve the fidelity of alerts and incident response
Continuously verifying access with the least friction for users, IT, and security teams
Attack path visibility across endpoints, identity stores, workloads, and container environments

CrowdStrike Customer Research

Please rate how important the following statements are in your Zero Trust decision making process.

Very Important Moderately Important Neutral Mildly Important Not At All Important
Understanding behavioral data to pinpoint deviations and malicious activity

71%

19%

5%

5%

0%

Limiting the attack surface with segmentation and least privileges

90%

5%

0%

0%

5%

Automating security tied to context to improve the fidelity of alerts and incident response

25%

65%

5%

5%

0%

Continuously verifying access with the least friction for users, IT, and security teams

66%

24%

10%

0%

0%

Attack path visibility across endpoints, identity stores, workloads, and container environments

45%

40%

10%

5%

0%

CrowdStrike Customer Research

Which Zero Trust security framework are you adopting, or considering adopting?

We haven't decided yet: 50%
NIST 800-207: 35%
Gartner CARTA: 10%
Forrester ZTX: 5%

CrowdStrike Customer Research

Which of the following Zero Trust security companies did you evaluate or are currently evaluating?

CrowdStrike
81%
Okta
67%
Microsoft
62%
Palo Alto Networks
62%
Cisco
38%
Illumio
38%
Forcepoint
14%
Guardicore
10%
Blackberry
0%
Unisys
0%

CrowdStrike Customer Research

Where are you in your Zero Trust journey?

Currently in the planning phase: 57%
Currently implementing Zero Trust: 33%
Currently on hold: 0%
Other: 10%

CrowdStrike Customer Research

Where are you in your Zero Trust journey?

Currently on hold: 0%
Currently implementing Zero Trust: 33%
Currently in the planning phase: 57%
Other: 10%

CrowdStrike Customer Research

Which of the following statements do you agree with when making digital transformation decisions?

ROI and overall value to the business are always top of mind.
67%
Removing manual processes and replacing with more automated workflows is critical to digital transformation.
62%
Aligning people, process, and technology is critical to making our organization more efficient and effective.
52%
An essential pillar of digital transformation efforts is driving innovation to meet the evolving needs of the business.
43%
A cornerstone of digital transformation is the ability to substantially improve security for your technology services, team members, and clients globally, 24/7/365.
33%
When evaluating changes to your current solutions and providers, it must solve for minimal impact to the business and require the least disruption as possible.
24%
Before you pull the trigger on a major digital transformation initiative, you need to transform your security first.
10%



More Research on CrowdStrike