TechValidate Research on CrowdStrike Cloud Security

33 Charts – Page 1 of 2


CrowdStrike Customer Research

What were the top purchasing drivers for buying CrowdStrike?

Consolidate security tools
50%
Reduce cost and complexity
38%
Secure sensitive data in the cloud
43%
Support business growth expectations
40%
Support higher uptime SLAs
20%
Lack of cloud security skilled resources
23%
Other
5%

CrowdStrike Customer Research

What were the top purchasing drivers for buying CrowdStrike?

Consolidate security tools
60%
Secure sensitive data in the cloud
42%
Reduce cost and complexity
38%
Support business growth expectations
35%
Support higher uptime SLAs
21%
Lack of cloud security skilled resources
22%

CrowdStrike Customer Research

Benefits SMBs Gain with CrowdStrike

What benefits did you gain following the deployment of CrowdStrike?

Improved the efficiency of our security operations
73%
Delivered faster IT and security performance
70%
Improved data protection of critical information
45%
Found and shut down threats that we had no prior knowledge of
42%
Met regulatory compliance standards
38%
Improved application quality
26%

CrowdStrike Customer Research

Top Reasons SMBs choose CrowdStrike

Why did you choose CrowdStrike over other solutions?

Proven security leader recognized by major analysts and best-in-class protection by independent testing
73%
Simple, single-agent unified platform
59%
World-class technology and intelligence
52%
Deployment flexibility (i.e., offered as a cloud-native service, a customer-managed, on-premises implementation, etc.)
38%
Human expertise and services
31%
It was recommended by a trusted advisor and/or peers at another company
29%
Allows for automation of security controls via integrations with existing or other security tools
21%

CrowdStrike Customer Research

Top Challenges Facing Small Business

Security challenge(s) before choosing CrowdStrike?

Facing increasingly advanced cyber threats (i.e. ransomware, identity-based attacks)
63%
Limited or insufficient amount of security professionals on staff to monitor 24x7
63%
Existing security tools and products not meeting our needs and integrations
52%
Increased complexity and risk due to remote and/or hybrid workforce
49%
Complying with numerous privacy, security and regulatory requirements
39%
Deployment of security keeping pace with company growth and expansion
32%
Time spent on remediation after experiencing a breach
19%

CrowdStrike Customer Research

What are the primary reasons you selected CrowdStrike?

Exploit and malware detection and prevention
86%
Single unified platform for on-prem and cloud infrastructure
64%
Ability to provide continuous visibility across cloud resources regardless of the cloud
48%
Deployment flexibility (i.e., offered as a cloud-delivered service, a customer-managed, on-premises implementation, etc.)
40%
Allows for automation of security controls via integration with existing DevOps tools
19%

CrowdStrike Customer Research

Approximately how many unique public cloud infrastructure service providers (IaaS and/or PaaS) does your organization currently use?

AWS
80%
Azure
71%
Google Cloud
32%
Oracle
2%
Other
7%

CrowdStrike Customer Research

Approximately how many unique public cloud infrastructure service providers (IaaS and/or PaaS) does your organization currently use?

AWS
85%
Azure
76%
Google Cloud
37%
Oracle
4%
Other
5%

CrowdStrike Customer Research

Approximately how many unique public cloud infrastructure service providers (IaaS and/or PaaS) does your organization currently use?

AWS
85%
Azure
76%
Google Cloud
37%
Oracle
4%
Other
5%

CrowdStrike Customer Research

What types of operational benefits did your organization realize following the deployment of CrowdStrike?

Improved data protection of critical information
83%
Met regulatory compliance standards
52%
Delivered faster performance
35%
Improved the efficiency of app deployment
19%
Improved application quality
8%

CrowdStrike Customer Research

Which of the following represents the biggest cloud application security challenges for your organization?

Maintaining security consistency across our own data center and public cloud environments where our cloud-native applications are deployed
53%
Use of multiple cybersecurity controls increases cost and complexity
49%
Meeting prescribed best practices for the configuration of cloud-resident workloads and services
45%
Lack of visibility into public cloud infrastructure hosting our cloud-native applications
44%
Our application development and DevOps teams do not involve our cybersecurity team due to fear of being slowed down
40%
Lack of understanding of the threat model for our cloud-native applications and infrastructure
39%

CrowdStrike Customer Research

What was the reason for your purchase?

To meet an existing security challenge (e.g. whitelisting, SIEM, NDR, etc)
60%
To address a compelling business need (e.g. audits, compliance/regulatory, digital transformation needs)
43%
To enhance workflows and streamline processes (e.g. using Slack to notify, etc)
33%
To help make more informed decisions (RiskIQ, VirusTotal, Horizon, etc)
22%

CrowdStrike Customer Research

Which of the following types of product(s) did you try through the CrowdStrike Store?

CrowdStrike Application (e.g. Falcon Discover, Falcon Spotlight)
85%
Partner Application (e.g. Extrahop, Illumio, Rapid7)
33%
Workflow Plugin (e.g. Slack, PagerDuty)
16%
Context Enrichment (e.g. RiskIQ, DomainTools, VirusTotal, OPSWAT, CyberSixGill)
18%

CrowdStrike Customer Research

How did you learn about the CrowdStrike Store?

Discovered using the Falcon management console
55%
CrowdStrike representative told me about it
47%
Release Notes and Tech Alerts
24%
During a webinar
16%
Marketing communications from CrowdStrike
13%
Online search (e.g Press release, website, blog)
11%
Referred by a CrowdStrike Store partner
9%

CrowdStrike Customer Research

How did you learn about the CrowdStrike Store?

CrowdStrike representative told me about it
75%
Discovered using the Falcon management console
25%
Referred by a CrowdStrike Store partner
13%
Online search (e.g Press release, website, blog)
6%
During a webinar
6%
Marketing communications from CrowdStrike
6%

CrowdStrike Customer Research

Will you try other Apps in the CrowdStrike Store?

Yes: 66%
No: 0%
Maybe: 34%

CrowdStrike Customer Research

How did you learn about the CrowdStrike Store?

CrowdStrike representative told me about it
51%
Discovered using the Falcon management console
50%
Release Notes and Tech Alerts
20%
During a webinar
14%
Marketing communications from CrowdStrike
12%
Online search (e.g Press release, website, blog)
10%
Referred by a CrowdStrike Store partner
10%

CrowdStrike Customer Research

What influenced your decision to purchase through the Store?

Easy to setup and use
60%
Could see the benefit immediately
47%
Positive trial experience
47%
Easy to convert from trial to purchase
33%
Strong engagement with CrowdStrike
27%
Strong engagement with the Partner team
13%
Met my budget requirements
7%

CrowdStrike Customer Research

What are your Zero Trust success metrics?

Reduce security complexity
90%
Improve MTTD/R for security teams
67%
Enhance user experience
52%
Eliminate unplanned downtime
29%
Improve ROI (reduce costs)
29%

CrowdStrike Customer Research

Which of the following influenced your current CrowdStrike product purchase(s)?

Cloud-delivered security
95%
Alert fidelity
60%
Frictionless deployment
50%
API integrations with existing tools
30%
CrowdStrike partner ecosystem
30%

CrowdStrike Customer Research

What factors play, or played, a key role in choosing your Zero Trust solution?

Ease of deployment/less friction (for IT and security teams)
76%
Ease of use/less friction (for end users and security analysts)
71%
Security coverage (including legacy/proprietary systems and tools)
71%
Scalability
62%

CrowdStrike Customer Research

Please rate the importance of the following Zero Trust security areas for your business to address in 2021:

Very Important Moderately Important Neutral Somewhat Important Not At All Important
Endpoints (managed and unmanaged)

76%

19%

0%

0%

5%

Identities (human, service, multi-directory)

47%

48%

0%

5%

0%

Workloads (on-prem and cloud workloads)

38%

57%

0%

5%

0%

Containers

35%

45%

5%

10%

5%

CrowdStrike Customer Research

Please rate the importance of the following Zero Trust security areas for your business to address in 2021:

Very Important Moderately Important Neutral Somewhat Important Not At All Important

Endpoints (managed and unmanaged)
Identities (human, service, multi-directory)
Workloads (on-prem and cloud workloads)
Containers

CrowdStrike Customer Research

Please rate how concerned you are about the following cyber threats?

Not Concerned At All Mildly Concerned Neutral Moderately Concerned Very Concerned
Supply chain threats

0%

4%

10%

48%

38%

Active directory hygiene/vulnerabilities

0%

0%

10%

38%

52%

Fileless malware

0%

5%

0%

43%

52%

Ransomware

0%

5%

0%

14%

81%

CrowdStrike Customer Research

Please rate how concerned you are about the following cyber threats?

Not Concerned At All Mildly Concerned Neutral Moderately Concerned Very Concerned

Supply chain threats
Active directory hygiene/vulnerabilities
Fileless malware
Ransomware

CrowdStrike Customer Research

What factors play, or played, a key role in choosing your Zero Trust solution?

Ease of deployment/less friction (for IT and security teams)
76%
Ease of use/less friction (for end users and security analysts)
71%
Security coverage (including legacy/proprietary systems and tools)
71%
Scalability
62%

CrowdStrike Customer Research

Please rate how important the following statements are in your Zero Trust decision making process.

Very Important Moderately Important Neutral Mildly Important Not At All Important

Understanding behavioral data to pinpoint deviations and malicious activity
Limiting the attack surface with segmentation and least privileges
Automating security tied to context to improve the fidelity of alerts and incident response
Continuously verifying access with the least friction for users, IT, and security teams
Attack path visibility across endpoints, identity stores, workloads, and container environments

CrowdStrike Customer Research

Please rate how important the following statements are in your Zero Trust decision making process.

Very Important Moderately Important Neutral Mildly Important Not At All Important
Understanding behavioral data to pinpoint deviations and malicious activity

71%

19%

5%

5%

0%

Limiting the attack surface with segmentation and least privileges

90%

5%

0%

0%

5%

Automating security tied to context to improve the fidelity of alerts and incident response

25%

65%

5%

5%

0%

Continuously verifying access with the least friction for users, IT, and security teams

66%

24%

10%

0%

0%

Attack path visibility across endpoints, identity stores, workloads, and container environments

45%

40%

10%

5%

0%

CrowdStrike Customer Research

Which Zero Trust security framework are you adopting, or considering adopting?

We haven't decided yet: 50%
NIST 800-207: 35%
Gartner CARTA: 10%
Forrester ZTX: 5%

CrowdStrike Customer Research

Which of the following Zero Trust security companies did you evaluate or are currently evaluating?

CrowdStrike
81%
Okta
67%
Microsoft
62%
Palo Alto Networks
62%
Cisco
38%
Illumio
38%
Forcepoint
14%
Guardicore
10%
Blackberry
0%
Unisys
0%



More Research on CrowdStrike Cloud Security